Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    16/07/2020, 18:56

General

  • Target

    838111ab2eddfdd565bf1bd43c7af7c3.exe

  • Size

    703KB

  • MD5

    838111ab2eddfdd565bf1bd43c7af7c3

  • SHA1

    0c3959714516584b1890096d1bee6815b751c392

  • SHA256

    66251b30db7b4c7d47cfcea9872b37d789d3ff7591996b1ddac5ad85106bf381

  • SHA512

    7c53e746502ddebd8b01c96405c883cfe108786e195bfee554e20dedf96937d9356ecfd4b310e1b637fb52d41f402d37ee6e55885be06c4eee38a3163e1feb49

Score
8/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 66 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: MapViewOfSection 127 IoCs
  • Suspicious use of WriteProcessMemory 368 IoCs
  • Executes dropped EXE 90 IoCs
  • Suspicious use of AdjustPrivilegeToken 183 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • NTFS ADS 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2792 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\838111ab2eddfdd565bf1bd43c7af7c3.exe
      "C:\Users\Admin\AppData\Local\Temp\838111ab2eddfdd565bf1bd43c7af7c3.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      PID:3824
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\system32\notepad.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        • NTFS ADS
        • Drops startup file
        PID:3180
        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:512
          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious behavior: EnumeratesProcesses
            PID:820
          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 820 104687
            5⤵
            • Suspicious use of WriteProcessMemory
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:904
            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              • Executes dropped EXE
              PID:1132
              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                7⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1316
              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1316 114812
                7⤵
                • Suspicious use of WriteProcessMemory
                • Executes dropped EXE
                PID:1408
                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                  8⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  • Executes dropped EXE
                  PID:2108
                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                    9⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2176
                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2176 118640
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    • Executes dropped EXE
                    PID:2468
                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                      10⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      • Executes dropped EXE
                      PID:776
                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                        11⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: MapViewOfSection
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1612
                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1612 122718
                        11⤵
                        • Suspicious use of WriteProcessMemory
                        • Executes dropped EXE
                        PID:2160
                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                          12⤵
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          • Executes dropped EXE
                          PID:3604
                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                            13⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3180
                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 3180 132750
                            13⤵
                            • Executes dropped EXE
                            PID:860
                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                              14⤵
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: MapViewOfSection
                              • Executes dropped EXE
                              PID:1364
                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                15⤵
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: MapViewOfSection
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1360
                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1360 142718
                                15⤵
                                • Executes dropped EXE
                                PID:1544
                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                  16⤵
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: MapViewOfSection
                                  • Executes dropped EXE
                                  PID:2152
                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                    17⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: MapViewOfSection
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2208
                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2208 146640
                                    17⤵
                                    • Executes dropped EXE
                                    PID:2108
                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                      18⤵
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: MapViewOfSection
                                      • Executes dropped EXE
                                      PID:2664
                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                        19⤵
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: MapViewOfSection
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3568
                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 3568 150593
                                        19⤵
                                        • Executes dropped EXE
                                        PID:752
                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                          20⤵
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: MapViewOfSection
                                          • Executes dropped EXE
                                          PID:1436
                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                            21⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: MapViewOfSection
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2740
                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2740 160781
                                            21⤵
                                            • Executes dropped EXE
                                            PID:3868
                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                              22⤵
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: MapViewOfSection
                                              • Executes dropped EXE
                                              PID:2988
                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                23⤵
                                                • Suspicious use of SetThreadContext
                                                • Suspicious behavior: MapViewOfSection
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1984
                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1984 164656
                                                23⤵
                                                • Executes dropped EXE
                                                PID:3080
                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                  24⤵
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious behavior: MapViewOfSection
                                                  • Executes dropped EXE
                                                  PID:1000
                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                    25⤵
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Executes dropped EXE
                                                    PID:704
                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 704 168484
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:1052
                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                      26⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Executes dropped EXE
                                                      PID:864
                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                        27⤵
                                                        • Suspicious use of SetThreadContext
                                                        • Suspicious behavior: MapViewOfSection
                                                        • Executes dropped EXE
                                                        PID:2052
                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2052 172656
                                                        27⤵
                                                        • Executes dropped EXE
                                                        PID:1416
                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                          28⤵
                                                          • Suspicious use of SetThreadContext
                                                          • Suspicious behavior: MapViewOfSection
                                                          • Executes dropped EXE
                                                          PID:2164
                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                            29⤵
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious behavior: MapViewOfSection
                                                            • Executes dropped EXE
                                                            PID:3856
                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 3856 177062
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:3556
                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                              30⤵
                                                              • Suspicious use of SetThreadContext
                                                              • Suspicious behavior: MapViewOfSection
                                                              • Executes dropped EXE
                                                              PID:2664
                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                31⤵
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious behavior: MapViewOfSection
                                                                • Executes dropped EXE
                                                                PID:940
                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 940 180937
                                                                31⤵
                                                                • Executes dropped EXE
                                                                PID:1240
                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                  32⤵
                                                                  • Suspicious use of SetThreadContext
                                                                  • Executes dropped EXE
                                                                  PID:1908
                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                    33⤵
                                                                    • Suspicious use of SetThreadContext
                                                                    • Executes dropped EXE
                                                                    PID:4008
                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 4008 185500
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    PID:3244
                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                      34⤵
                                                                      • Suspicious use of SetThreadContext
                                                                      • Executes dropped EXE
                                                                      PID:3848
                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                        35⤵
                                                                        • Suspicious use of SetThreadContext
                                                                        • Executes dropped EXE
                                                                        PID:1824
                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1824 189343
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        PID:504
                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                          36⤵
                                                                          • Suspicious use of SetThreadContext
                                                                          • Executes dropped EXE
                                                                          PID:1148
                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                            37⤵
                                                                            • Suspicious use of SetThreadContext
                                                                            • Executes dropped EXE
                                                                            PID:1004
                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1004 193593
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            PID:908
                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                              38⤵
                                                                              • Suspicious use of SetThreadContext
                                                                              • Executes dropped EXE
                                                                              PID:512
                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                39⤵
                                                                                • Suspicious use of SetThreadContext
                                                                                • Executes dropped EXE
                                                                                PID:1916
                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1916 197500
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                PID:1416
                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                  40⤵
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Executes dropped EXE
                                                                                  PID:2152
                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                    41⤵
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • Executes dropped EXE
                                                                                    PID:3000
                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 3000 207421
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2588
                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                      42⤵
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Executes dropped EXE
                                                                                      PID:2880
                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                        43⤵
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Executes dropped EXE
                                                                                        PID:1444
                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1444 211546
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:3860
                                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                          44⤵
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Executes dropped EXE
                                                                                          PID:3840
                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                            45⤵
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Executes dropped EXE
                                                                                            PID:3956
                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 3956 215562
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:3912
                                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                              46⤵
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • Executes dropped EXE
                                                                                              PID:3396
                                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                47⤵
                                                                                                • Suspicious use of SetThreadContext
                                                                                                PID:1276
                                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1276 219468
                                                                                                47⤵
                                                                                                  PID:3080
                                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                    48⤵
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    PID:1192
                                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                      49⤵
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      PID:1364
                                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1364 223625
                                                                                                      49⤵
                                                                                                        PID:1492
                                                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                          50⤵
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          PID:1132
                                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                            51⤵
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            PID:1408
                                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1408 227625
                                                                                                            51⤵
                                                                                                              PID:1420
                                                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                52⤵
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                PID:3068
                                                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                  53⤵
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  PID:2136
                                                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2136 231656
                                                                                                                  53⤵
                                                                                                                    PID:3808
                                                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                      54⤵
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      PID:2412
                                                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                        55⤵
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        PID:2488
                                                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2488 235562
                                                                                                                        55⤵
                                                                                                                          PID:3960
                                                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                            56⤵
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            PID:3572
                                                                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                              57⤵
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              PID:1552
                                                                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1552 239578
                                                                                                                              57⤵
                                                                                                                                PID:644
                                                                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                                  58⤵
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:4068
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                                    59⤵
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    PID:500
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 500 243796
                                                                                                                                    59⤵
                                                                                                                                      PID:1328
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                                        60⤵
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        PID:3888
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                                          61⤵
                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                          PID:1420
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1420 247703
                                                                                                                                          61⤵
                                                                                                                                            PID:3584
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                                              62⤵
                                                                                                                                                PID:3764
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                                                  63⤵
                                                                                                                                                    PID:3864
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 3864 251984
                                                                                                                                                    63⤵
                                                                                                                                                      PID:1320
                          • C:\Windows\SysWOW64\raserver.exe
                            "C:\Windows\SysWOW64\raserver.exe"
                            2⤵
                            • Suspicious use of SetThreadContext
                            • Adds policy Run key to start application
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            • Suspicious use of AdjustPrivilegeToken
                            • Modifies Internet Explorer settings
                            • Adds Run key to start application
                            PID:372
                            • C:\Windows\SysWOW64\cmd.exe
                              /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                              3⤵
                                PID:1788
                              • C:\Program Files\Mozilla Firefox\Firefox.exe
                                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                                3⤵
                                  PID:2276
                              • C:\Windows\SysWOW64\msiexec.exe
                                "C:\Windows\SysWOW64\msiexec.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1648
                              • C:\Windows\SysWOW64\ipconfig.exe
                                "C:\Windows\SysWOW64\ipconfig.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Gathers network information
                                PID:2792
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\SysWOW64\rundll32.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4040
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\SysWOW64\rundll32.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:360
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\SysWOW64\rundll32.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2056
                              • C:\Windows\SysWOW64\control.exe
                                "C:\Windows\SysWOW64\control.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2700
                              • C:\Windows\SysWOW64\msiexec.exe
                                "C:\Windows\SysWOW64\msiexec.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1324
                              • C:\Windows\SysWOW64\systray.exe
                                "C:\Windows\SysWOW64\systray.exe"
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3280
                              • C:\Windows\SysWOW64\raserver.exe
                                "C:\Windows\SysWOW64\raserver.exe"
                                2⤵
                                  PID:640
                                • C:\Windows\SysWOW64\msdt.exe
                                  "C:\Windows\SysWOW64\msdt.exe"
                                  2⤵
                                    PID:1176
                                  • C:\Windows\SysWOW64\msdt.exe
                                    "C:\Windows\SysWOW64\msdt.exe"
                                    2⤵
                                      PID:1544
                                    • C:\Windows\SysWOW64\help.exe
                                      "C:\Windows\SysWOW64\help.exe"
                                      2⤵
                                        PID:780
                                      • C:\Windows\SysWOW64\explorer.exe
                                        "C:\Windows\SysWOW64\explorer.exe"
                                        2⤵
                                          PID:1948
                                        • C:\Windows\SysWOW64\netsh.exe
                                          "C:\Windows\SysWOW64\netsh.exe"
                                          2⤵
                                            PID:3868
                                          • C:\Windows\SysWOW64\raserver.exe
                                            "C:\Windows\SysWOW64\raserver.exe"
                                            2⤵
                                              PID:3724
                                            • C:\Windows\SysWOW64\raserver.exe
                                              "C:\Windows\SysWOW64\raserver.exe"
                                              2⤵
                                                PID:864
                                              • C:\Windows\SysWOW64\NETSTAT.EXE
                                                "C:\Windows\SysWOW64\NETSTAT.EXE"
                                                2⤵
                                                • Gathers network information
                                                PID:1500
                                              • C:\Windows\SysWOW64\wlanext.exe
                                                "C:\Windows\SysWOW64\wlanext.exe"
                                                2⤵
                                                  PID:496
                                                • C:\Windows\SysWOW64\colorcpl.exe
                                                  "C:\Windows\SysWOW64\colorcpl.exe"
                                                  2⤵
                                                    PID:1908
                                                  • C:\Windows\SysWOW64\wscript.exe
                                                    "C:\Windows\SysWOW64\wscript.exe"
                                                    2⤵
                                                      PID:3832
                                                    • C:\Windows\SysWOW64\colorcpl.exe
                                                      "C:\Windows\SysWOW64\colorcpl.exe"
                                                      2⤵
                                                        PID:3664
                                                      • C:\Windows\SysWOW64\autochk.exe
                                                        "C:\Windows\SysWOW64\autochk.exe"
                                                        2⤵
                                                          PID:1660
                                                        • C:\Windows\SysWOW64\msiexec.exe
                                                          "C:\Windows\SysWOW64\msiexec.exe"
                                                          2⤵
                                                            PID:1912
                                                          • C:\Windows\SysWOW64\control.exe
                                                            "C:\Windows\SysWOW64\control.exe"
                                                            2⤵
                                                              PID:2500
                                                            • C:\Windows\SysWOW64\wscript.exe
                                                              "C:\Windows\SysWOW64\wscript.exe"
                                                              2⤵
                                                                PID:2000
                                                              • C:\Windows\SysWOW64\cmmon32.exe
                                                                "C:\Windows\SysWOW64\cmmon32.exe"
                                                                2⤵
                                                                  PID:1436
                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                  "C:\Windows\SysWOW64\netsh.exe"
                                                                  2⤵
                                                                    PID:3560
                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                    "C:\Windows\SysWOW64\cscript.exe"
                                                                    2⤵
                                                                      PID:1660
                                                                    • C:\Windows\SysWOW64\msdt.exe
                                                                      "C:\Windows\SysWOW64\msdt.exe"
                                                                      2⤵
                                                                        PID:2468

                                                                    Network

                                                                          MITRE ATT&CK Enterprise v6

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • memory/360-61-0x0000000000E10000-0x0000000000E23000-memory.dmp

                                                                            Filesize

                                                                            76KB

                                                                          • memory/360-60-0x0000000000E10000-0x0000000000E23000-memory.dmp

                                                                            Filesize

                                                                            76KB

                                                                          • memory/372-10-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/372-11-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/372-43-0x0000000005F40000-0x000000000608E000-memory.dmp

                                                                            Filesize

                                                                            1.3MB

                                                                          • memory/496-213-0x0000000000380000-0x0000000000397000-memory.dmp

                                                                            Filesize

                                                                            92KB

                                                                          • memory/496-214-0x0000000000380000-0x0000000000397000-memory.dmp

                                                                            Filesize

                                                                            92KB

                                                                          • memory/640-120-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/640-119-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/780-150-0x0000000001190000-0x0000000001197000-memory.dmp

                                                                            Filesize

                                                                            28KB

                                                                          • memory/780-151-0x0000000001190000-0x0000000001197000-memory.dmp

                                                                            Filesize

                                                                            28KB

                                                                          • memory/820-4-0x0000000000400000-0x000000000042D000-memory.dmp

                                                                            Filesize

                                                                            180KB

                                                                          • memory/864-193-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/864-194-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/1176-129-0x0000000000D60000-0x0000000000ED3000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/1176-133-0x0000000000D60000-0x0000000000ED3000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/1324-97-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1324-99-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1436-287-0x0000000000B80000-0x0000000000B8C000-memory.dmp

                                                                            Filesize

                                                                            48KB

                                                                          • memory/1436-288-0x0000000000B80000-0x0000000000B8C000-memory.dmp

                                                                            Filesize

                                                                            48KB

                                                                          • memory/1500-203-0x0000000001150000-0x000000000115B000-memory.dmp

                                                                            Filesize

                                                                            44KB

                                                                          • memory/1500-206-0x0000000001150000-0x000000000115B000-memory.dmp

                                                                            Filesize

                                                                            44KB

                                                                          • memory/1544-139-0x0000000000D60000-0x0000000000ED3000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/1544-141-0x0000000000D60000-0x0000000000ED3000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/1648-24-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1648-32-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1660-310-0x0000000000930000-0x0000000000957000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/1660-312-0x0000000000930000-0x0000000000957000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/1908-224-0x00000000010A0000-0x00000000010B9000-memory.dmp

                                                                            Filesize

                                                                            100KB

                                                                          • memory/1908-227-0x00000000010A0000-0x00000000010B9000-memory.dmp

                                                                            Filesize

                                                                            100KB

                                                                          • memory/1912-257-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1912-258-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                            Filesize

                                                                            72KB

                                                                          • memory/1948-167-0x0000000001370000-0x00000000017AF000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/1948-160-0x0000000001370000-0x00000000017AF000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/2000-278-0x0000000001260000-0x0000000001287000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/2000-277-0x0000000001260000-0x0000000001287000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/2056-71-0x0000000000E10000-0x0000000000E23000-memory.dmp

                                                                            Filesize

                                                                            76KB

                                                                          • memory/2056-70-0x0000000000E10000-0x0000000000E23000-memory.dmp

                                                                            Filesize

                                                                            76KB

                                                                          • memory/2276-58-0x00007FF77C310000-0x00007FF77C3A3000-memory.dmp

                                                                            Filesize

                                                                            588KB

                                                                          • memory/2276-56-0x00007FF77C310000-0x00007FF77C3A3000-memory.dmp

                                                                            Filesize

                                                                            588KB

                                                                          • memory/2276-57-0x00007FF77C310000-0x00007FF77C3A3000-memory.dmp

                                                                            Filesize

                                                                            588KB

                                                                          • memory/2468-321-0x0000000000D60000-0x0000000000ED3000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/2468-323-0x0000000000D60000-0x0000000000ED3000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/2500-268-0x0000000001110000-0x0000000001130000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2500-267-0x0000000001110000-0x0000000001130000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2700-81-0x0000000001110000-0x0000000001130000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2700-83-0x0000000001110000-0x0000000001130000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2792-34-0x0000000000BA0000-0x0000000000BAB000-memory.dmp

                                                                            Filesize

                                                                            44KB

                                                                          • memory/2792-37-0x0000000000BA0000-0x0000000000BAB000-memory.dmp

                                                                            Filesize

                                                                            44KB

                                                                          • memory/3008-90-0x0000000006C00000-0x0000000006D7B000-memory.dmp

                                                                            Filesize

                                                                            1.5MB

                                                                          • memory/3008-307-0x0000000008750000-0x0000000008841000-memory.dmp

                                                                            Filesize

                                                                            964KB

                                                                          • memory/3008-19-0x0000000004C50000-0x0000000004D5C000-memory.dmp

                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/3008-180-0x0000000009240000-0x00000000093A6000-memory.dmp

                                                                            Filesize

                                                                            1.4MB

                                                                          • memory/3008-148-0x00000000090E0000-0x0000000009236000-memory.dmp

                                                                            Filesize

                                                                            1.3MB

                                                                          • memory/3008-296-0x000000000AB00000-0x000000000AC40000-memory.dmp

                                                                            Filesize

                                                                            1.2MB

                                                                          • memory/3008-233-0x0000000009700000-0x000000000981B000-memory.dmp

                                                                            Filesize

                                                                            1.1MB

                                                                          • memory/3008-169-0x0000000006D80000-0x0000000006E3F000-memory.dmp

                                                                            Filesize

                                                                            764KB

                                                                          • memory/3008-191-0x0000000007500000-0x00000000075C1000-memory.dmp

                                                                            Filesize

                                                                            772KB

                                                                          • memory/3280-109-0x0000000000F40000-0x0000000000F46000-memory.dmp

                                                                            Filesize

                                                                            24KB

                                                                          • memory/3280-108-0x0000000000F40000-0x0000000000F46000-memory.dmp

                                                                            Filesize

                                                                            24KB

                                                                          • memory/3560-298-0x0000000000E30000-0x0000000000E4E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/3560-299-0x0000000000E30000-0x0000000000E4E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/3664-247-0x00000000010A0000-0x00000000010B9000-memory.dmp

                                                                            Filesize

                                                                            100KB

                                                                          • memory/3664-246-0x00000000010A0000-0x00000000010B9000-memory.dmp

                                                                            Filesize

                                                                            100KB

                                                                          • memory/3724-182-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/3724-183-0x00000000000F0000-0x000000000010F000-memory.dmp

                                                                            Filesize

                                                                            124KB

                                                                          • memory/3832-236-0x0000000001260000-0x0000000001287000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/3832-235-0x0000000001260000-0x0000000001287000-memory.dmp

                                                                            Filesize

                                                                            156KB

                                                                          • memory/3868-171-0x0000000000E30000-0x0000000000E4E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/3868-172-0x0000000000E30000-0x0000000000E4E000-memory.dmp

                                                                            Filesize

                                                                            120KB

                                                                          • memory/4040-45-0x0000000000E10000-0x0000000000E23000-memory.dmp

                                                                            Filesize

                                                                            76KB

                                                                          • memory/4040-48-0x0000000000E10000-0x0000000000E23000-memory.dmp

                                                                            Filesize

                                                                            76KB