Malware Analysis Report

2024-11-30 20:00

Sample ID 210310-tksjsa4ck6
Target 3fad84ee18e4583656019ae08b317607.exe
SHA256 273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374
Tags
betabot backdoor botnet evasion persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374

Threat Level: Known bad

The file 3fad84ee18e4583656019ae08b317607.exe was found to be: Known bad.

Malicious Activity Summary

betabot backdoor botnet evasion persistence spyware trojan

BetaBot

Modifies firewall policy service

Sets file execution options in registry

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Checks BIOS information in registry

Adds Run key to start application

Drops desktop.ini file(s)

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Enumerates physical storage devices

Suspicious behavior: RenamesItself

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Enumerates system info in registry

Modifies Internet Explorer Protected Mode

Modifies Internet Explorer Protected Mode Banner

Modifies Internet Explorer settings

Suspicious behavior: MapViewOfSection

Suspicious use of WriteProcessMemory

NTFS ADS

Checks processor information in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2021-03-10 09:25

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2021-03-10 09:25

Reported

2021-03-10 09:27

Platform

win10v20201028

Max time kernel

150s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe"

Signatures

BetaBot

trojan backdoor botnet betabot

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A

Sets file execution options in registry

persistence

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\explorer.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe N/A

Reads user/profile data of web browsers

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\q9y197755.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\q9y197755.exe\"" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\q9y197755.exe\"" C:\Windows\SysWOW64\explorer.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\ProgramData\Google Updater 2.0\desktop.ini C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 636 set thread context of 2612 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1304 set thread context of 0 N/A C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\SysWOW64\explorer.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode Banner

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\DownloadVersionList = "0" C:\Windows\SysWOW64\explorer.exe N/A

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe:14EDFC78 C:\Windows\SysWOW64\explorer.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe:14EDFC78 C:\Windows\SysWOW64\explorer.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A
N/A N/A C:\Windows\SysWOW64\explorer.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 636 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 636 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 636 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 636 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 636 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 2612 wrote to memory of 3832 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 2612 wrote to memory of 3832 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 2612 wrote to memory of 3832 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 3832 wrote to memory of 1304 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe
PID 3832 wrote to memory of 1304 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe
PID 3832 wrote to memory of 1304 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe
PID 3832 wrote to memory of 3728 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe
PID 3832 wrote to memory of 3728 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe
PID 3832 wrote to memory of 3728 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe
PID 3728 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 728 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 728 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 3684 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3728 wrote to memory of 3684 N/A C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3832 wrote to memory of 4204 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe
PID 3832 wrote to memory of 4204 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe
PID 3832 wrote to memory of 4204 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe

"C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe"

C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe

"C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe"

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe

/suac

C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe

"C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\sysnative\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\sysnative\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\sysnative\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\ProgramData\Google Updater 2.0\'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\sysnative\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\'

C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe

"C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 windowsupdate.microsoft.com udp
N/A 52.185.71.28:80 windowsupdate.microsoft.com tcp
N/A 8.8.8.8:53 rusianlover.icu udp
N/A 8.8.8.8:53 rusianlover.icu udp
N/A 212.114.52.43:80 rusianlover.icu tcp
N/A 8.8.8.8:53 zakriasons.co udp
N/A 104.21.55.228:80 zakriasons.co tcp
N/A 104.21.55.228:443 zakriasons.co tcp
N/A 8.8.8.8:53 ctldl.windowsupdate.com udp
N/A 8.8.8.8:53 estrelladamm.icu udp
N/A 8.210.47.214:80 estrelladamm.icu tcp
N/A 212.114.52.43:80 rusianlover.icu tcp
N/A 8.8.8.8:53 ctldl.windowsupdate.com udp
N/A 212.114.52.43:80 rusianlover.icu tcp

Files

memory/2612-2-0x0000000000400000-0x0000000000435000-memory.dmp

memory/2612-3-0x00000000004015C6-mapping.dmp

memory/2612-4-0x0000000000400000-0x0000000000435000-memory.dmp

memory/2612-5-0x0000000002280000-0x00000000022E6000-memory.dmp

memory/2612-6-0x00000000005B0000-0x00000000005BD000-memory.dmp

memory/2612-7-0x0000000002780000-0x0000000002781000-memory.dmp

memory/2612-8-0x00000000027B0000-0x00000000027BC000-memory.dmp

memory/3832-9-0x0000000000000000-mapping.dmp

memory/3832-10-0x0000000001340000-0x0000000001780000-memory.dmp

memory/3832-11-0x0000000000E80000-0x0000000000F9B000-memory.dmp

memory/2612-15-0x00000000027A0000-0x00000000027A1000-memory.dmp

memory/3832-17-0x0000000005170000-0x0000000005172000-memory.dmp

memory/1304-18-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe

MD5 3fad84ee18e4583656019ae08b317607
SHA1 fb719a92039d2892fc6a7d91de15454554215543
SHA256 273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374
SHA512 496d0359641b844042af175ce4bda3801150af9ee720fad8d43a6a7cdf6ab4de96ac263525aa1c36dec89be71a71ce9f28b5a0017798b5c40ef8d2602bf66378

C:\Users\Admin\AppData\Local\Temp\q9y197755_1.exe

MD5 3fad84ee18e4583656019ae08b317607
SHA1 fb719a92039d2892fc6a7d91de15454554215543
SHA256 273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374
SHA512 496d0359641b844042af175ce4bda3801150af9ee720fad8d43a6a7cdf6ab4de96ac263525aa1c36dec89be71a71ce9f28b5a0017798b5c40ef8d2602bf66378

C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe

MD5 08cdfd0d3a406601c42f087da16ec6c8
SHA1 48fd8eef568d2372e2a883283e58e5def81fef07
SHA256 eb7cea525ecef555356c13b6948c21ddad4b8a622ff4c027f285c0c096570253
SHA512 d522fc9c5815c93a1dc114c63db53879346e435397cad79a105a412cb18459335a1bfc3cfc9e7f6469cd703e2014538aa3c649442b80214a945e76ed50d26940

C:\Users\Admin\AppData\Local\Temp\9cg555owe5.exe

MD5 08cdfd0d3a406601c42f087da16ec6c8
SHA1 48fd8eef568d2372e2a883283e58e5def81fef07
SHA256 eb7cea525ecef555356c13b6948c21ddad4b8a622ff4c027f285c0c096570253
SHA512 d522fc9c5815c93a1dc114c63db53879346e435397cad79a105a412cb18459335a1bfc3cfc9e7f6469cd703e2014538aa3c649442b80214a945e76ed50d26940

memory/3728-21-0x0000000000000000-mapping.dmp

memory/2744-26-0x0000000000000000-mapping.dmp

memory/1020-27-0x0000000000000000-mapping.dmp

memory/728-28-0x0000000000000000-mapping.dmp

memory/3684-29-0x0000000000000000-mapping.dmp

memory/3684-33-0x00007FFA00610000-0x00007FFA00FFC000-memory.dmp

memory/1020-30-0x00007FFA00610000-0x00007FFA00FFC000-memory.dmp

memory/728-32-0x00007FFA00610000-0x00007FFA00FFC000-memory.dmp

memory/2744-31-0x00007FFA00610000-0x00007FFA00FFC000-memory.dmp

memory/3684-34-0x000002F1F19E0000-0x000002F1F19E1000-memory.dmp

memory/3684-37-0x000002F1F1F90000-0x000002F1F1F92000-memory.dmp

memory/3684-38-0x000002F1F1F93000-0x000002F1F1F95000-memory.dmp

memory/728-39-0x000002366C0C0000-0x000002366C0C2000-memory.dmp

memory/728-40-0x000002366C0C3000-0x000002366C0C5000-memory.dmp

memory/1020-41-0x0000022E7C240000-0x0000022E7C242000-memory.dmp

memory/2744-42-0x000001D273480000-0x000001D273482000-memory.dmp

memory/1020-43-0x0000022E7C243000-0x0000022E7C245000-memory.dmp

memory/2744-44-0x000001D273483000-0x000001D273485000-memory.dmp

memory/1020-45-0x0000022E7E500000-0x0000022E7E501000-memory.dmp

memory/728-48-0x000002366C0C6000-0x000002366C0C8000-memory.dmp

memory/1020-49-0x0000022E7C246000-0x0000022E7C248000-memory.dmp

memory/2744-50-0x000001D273486000-0x000001D273488000-memory.dmp

memory/3684-51-0x000002F1F1F96000-0x000002F1F1F98000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 2c2bb338a40d907fd93662f5996065f9
SHA1 81612d05a4ad9c22ada48b2885fc4d0e33d3848e
SHA256 c7d84f4988e43f32ed99ffeb651869fb103dc2229df5d817f3ba167ed85a171e
SHA512 99d729219f58343545dd70d1abda12785a93f8763f229ea478aac0f7c9a9ac254bbacd918967dbcbf935246770b92ec05adf8ab91b9e0770b1fac26d21013ed4

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 8592ba100a78835a6b94d5949e13dfc1
SHA1 63e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256 fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA512 87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5a3bceac4b13131180aa230e7d8a138f
SHA1 e9edc3f5d14f2dafe7b56e9faa51a9964ddb9315
SHA256 6d09c2dc3c599a60c2586e27eebd080a6927db686d07d9bf8506bc351fc08511
SHA512 0b56a9ed279db4504f2da96c4255f3079f8f3747694759b2c4fec79bf8d15c154d41873b104d1cf46a5f237640956e274b10b81dcf8cd07d56127106828cbfc5

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 6436c6aa9e332ce6b355481efe35f861
SHA1 c091e4a5b7957ff515888bc58b0b3a3a88956c75
SHA256 ecea4426d5d3f6e26fad2acc420fe479c9b1dc4b9f3524039062956a1e52a002
SHA512 ec42ed0bcc34287c4e9d8059a5faf5930f6814c9cc28dda7bed73f50142b3b6ae35d95db4623e7efe350b1cae6538cd175e65851ff83760204e90cd93607927e

memory/3684-56-0x000002F1F1F98000-0x000002F1F1F99000-memory.dmp

memory/728-57-0x000002366C0C8000-0x000002366C0C9000-memory.dmp

memory/1020-58-0x0000022E7C248000-0x0000022E7C249000-memory.dmp

memory/2744-59-0x000001D273488000-0x000001D273489000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe

MD5 50803bdba827e6ae4600da26b5e81800
SHA1 e3650665dd57b79514d33fe8e8d8ff8429b52c55
SHA256 02dce269070bfec91e4f01a67d774167f8208f17211e8027d8a7fe3dc62a356b
SHA512 c641b6937d93b76e592f69b35d8e0f8236c985a56bae41b78fca29a1b6f16f2c75fb25941d6957a1e761a64d66acbdf9673cf13434d3cc6f7901904105e19c50

memory/4204-60-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\3o9ai9793m.exe

MD5 50803bdba827e6ae4600da26b5e81800
SHA1 e3650665dd57b79514d33fe8e8d8ff8429b52c55
SHA256 02dce269070bfec91e4f01a67d774167f8208f17211e8027d8a7fe3dc62a356b
SHA512 c641b6937d93b76e592f69b35d8e0f8236c985a56bae41b78fca29a1b6f16f2c75fb25941d6957a1e761a64d66acbdf9673cf13434d3cc6f7901904105e19c50

memory/4204-63-0x0000000002980000-0x0000000002981000-memory.dmp

\Users\Admin\AppData\Local\Temp\Costura\1ACF592E7018DA88DDC32B96D203A4BE\32\sqlite3.dll

MD5 0a855f27a1e48991d14c593cb930d2b2
SHA1 01935b77a59ab90be4af37bb4e8bc57fbdcf23a1
SHA256 43d11ddfa64be9a2eeb94574f21fd45334e4598506f3d5ae1446c7a0add10300
SHA512 bfc680d50d043c438c0c4bc97f7830010bf302e9e81296c57b1a06e3e87a2000444e44fadec20ca2025260bf745629971bfca02ff59469085fc7eada7912e873

Analysis: behavioral1

Detonation Overview

Submitted

2021-03-10 09:25

Reported

2021-03-10 09:27

Platform

win7v20201028

Max time kernel

150s

Max time network

144s

Command Line

C:\Windows\Explorer.EXE

Signatures

BetaBot

trojan backdoor botnet betabot

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" C:\Windows\SysWOW64\explorer.exe N/A

Sets file execution options in registry

persistence

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\explorer.exe N/A

Reads user/profile data of web browsers

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\u5yo171gs9.exe\"" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\u5yo171gs9.exe\"" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\u5yo171gs9.exe" C:\Windows\SysWOW64\explorer.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\ProgramData\Google Updater 2.0\desktop.ini C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1340 set thread context of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 336 set thread context of 0 N/A C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\SysWOW64\explorer.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Windows\SysWOW64\explorer.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer Protected Mode Banner

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" C:\Windows\SysWOW64\explorer.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\VersionManager C:\Windows\SysWOW64\explorer.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\VersionManager\DownloadVersionList = "0" C:\Windows\SysWOW64\explorer.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe:14EDFC78 C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe:14EDFC78 C:\Windows\SysWOW64\explorer.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\explorer.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1340 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1340 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1340 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1340 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1340 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1340 wrote to memory of 1240 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1240 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe C:\Windows\SysWOW64\explorer.exe
PID 1540 wrote to memory of 1164 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1540 wrote to memory of 1164 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1540 wrote to memory of 1164 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1540 wrote to memory of 1164 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1540 wrote to memory of 1164 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1540 wrote to memory of 1164 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\Dwm.exe
PID 1540 wrote to memory of 1196 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\Explorer.EXE
PID 1540 wrote to memory of 1196 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\Explorer.EXE
PID 1540 wrote to memory of 1196 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\Explorer.EXE
PID 1540 wrote to memory of 1196 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\Explorer.EXE
PID 1540 wrote to memory of 1196 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\Explorer.EXE
PID 1540 wrote to memory of 1196 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\Explorer.EXE
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 336 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1112 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe
PID 1540 wrote to memory of 1612 N/A C:\Windows\SysWOW64\explorer.exe C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe

"C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe"

C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe

"C:\Users\Admin\AppData\Local\Temp\3fad84ee18e4583656019ae08b317607.exe"

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe

/suac

C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe

"C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe"

C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe

"C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 update.microsoft.com udp
N/A 40.70.224.146:80 update.microsoft.com tcp
N/A 8.8.8.8:53 rusianlover.icu udp
N/A 8.8.8.8:53 rusianlover.icu udp
N/A 212.114.52.43:80 rusianlover.icu tcp
N/A 8.8.8.8:53 zakriasons.co udp
N/A 104.21.55.228:80 zakriasons.co tcp
N/A 104.21.55.228:443 zakriasons.co tcp
N/A 8.8.8.8:53 estrelladamm.icu udp
N/A 8.210.47.214:80 estrelladamm.icu tcp
N/A 8.8.8.8:53 rusianlover.icu udp
N/A 212.114.52.43:80 rusianlover.icu tcp
N/A 212.114.52.43:80 rusianlover.icu tcp

Files

memory/1240-2-0x0000000000400000-0x0000000000435000-memory.dmp

memory/1240-3-0x00000000004015C6-mapping.dmp

memory/1240-4-0x0000000076691000-0x0000000076693000-memory.dmp

memory/1240-5-0x0000000000400000-0x0000000000435000-memory.dmp

memory/1240-6-0x00000000005B0000-0x00000000005BC000-memory.dmp

memory/1240-9-0x00000000002B0000-0x00000000002BD000-memory.dmp

memory/1240-10-0x0000000000500000-0x0000000000501000-memory.dmp

memory/1240-8-0x00000000002A0000-0x00000000002A1000-memory.dmp

memory/1240-7-0x0000000000230000-0x0000000000296000-memory.dmp

memory/1540-11-0x0000000000000000-mapping.dmp

memory/1540-13-0x0000000075061000-0x0000000075063000-memory.dmp

memory/1540-14-0x0000000077A30000-0x0000000077BB1000-memory.dmp

memory/1540-15-0x00000000001D0000-0x00000000002EB000-memory.dmp

memory/1540-19-0x00000000003B0000-0x00000000003BC000-memory.dmp

memory/1240-20-0x0000000000520000-0x0000000000521000-memory.dmp

memory/1540-22-0x0000000000680000-0x0000000000682000-memory.dmp

memory/1876-23-0x000007FEF7D20000-0x000007FEF7F9A000-memory.dmp

\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe

MD5 3fad84ee18e4583656019ae08b317607
SHA1 fb719a92039d2892fc6a7d91de15454554215543
SHA256 273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374
SHA512 496d0359641b844042af175ce4bda3801150af9ee720fad8d43a6a7cdf6ab4de96ac263525aa1c36dec89be71a71ce9f28b5a0017798b5c40ef8d2602bf66378

memory/336-25-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe

MD5 3fad84ee18e4583656019ae08b317607
SHA1 fb719a92039d2892fc6a7d91de15454554215543
SHA256 273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374
SHA512 496d0359641b844042af175ce4bda3801150af9ee720fad8d43a6a7cdf6ab4de96ac263525aa1c36dec89be71a71ce9f28b5a0017798b5c40ef8d2602bf66378

C:\Users\Admin\AppData\Local\Temp\u5yo171gs9_1.exe

MD5 3fad84ee18e4583656019ae08b317607
SHA1 fb719a92039d2892fc6a7d91de15454554215543
SHA256 273811e7b3de14abc8cfbbb28be4ab3c39922ff09c869f1a4b6b357577f0d374
SHA512 496d0359641b844042af175ce4bda3801150af9ee720fad8d43a6a7cdf6ab4de96ac263525aa1c36dec89be71a71ce9f28b5a0017798b5c40ef8d2602bf66378

\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe

MD5 08cdfd0d3a406601c42f087da16ec6c8
SHA1 48fd8eef568d2372e2a883283e58e5def81fef07
SHA256 eb7cea525ecef555356c13b6948c21ddad4b8a622ff4c027f285c0c096570253
SHA512 d522fc9c5815c93a1dc114c63db53879346e435397cad79a105a412cb18459335a1bfc3cfc9e7f6469cd703e2014538aa3c649442b80214a945e76ed50d26940

C:\Users\Admin\AppData\Local\Temp\smgokaswoci577.exe

MD5 08cdfd0d3a406601c42f087da16ec6c8
SHA1 48fd8eef568d2372e2a883283e58e5def81fef07
SHA256 eb7cea525ecef555356c13b6948c21ddad4b8a622ff4c027f285c0c096570253
SHA512 d522fc9c5815c93a1dc114c63db53879346e435397cad79a105a412cb18459335a1bfc3cfc9e7f6469cd703e2014538aa3c649442b80214a945e76ed50d26940

memory/1112-29-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe

MD5 50803bdba827e6ae4600da26b5e81800
SHA1 e3650665dd57b79514d33fe8e8d8ff8429b52c55
SHA256 02dce269070bfec91e4f01a67d774167f8208f17211e8027d8a7fe3dc62a356b
SHA512 c641b6937d93b76e592f69b35d8e0f8236c985a56bae41b78fca29a1b6f16f2c75fb25941d6957a1e761a64d66acbdf9673cf13434d3cc6f7901904105e19c50

C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe

MD5 50803bdba827e6ae4600da26b5e81800
SHA1 e3650665dd57b79514d33fe8e8d8ff8429b52c55
SHA256 02dce269070bfec91e4f01a67d774167f8208f17211e8027d8a7fe3dc62a356b
SHA512 c641b6937d93b76e592f69b35d8e0f8236c985a56bae41b78fca29a1b6f16f2c75fb25941d6957a1e761a64d66acbdf9673cf13434d3cc6f7901904105e19c50

memory/1612-34-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\m79oi5c5sw79ysa.exe

MD5 50803bdba827e6ae4600da26b5e81800
SHA1 e3650665dd57b79514d33fe8e8d8ff8429b52c55
SHA256 02dce269070bfec91e4f01a67d774167f8208f17211e8027d8a7fe3dc62a356b
SHA512 c641b6937d93b76e592f69b35d8e0f8236c985a56bae41b78fca29a1b6f16f2c75fb25941d6957a1e761a64d66acbdf9673cf13434d3cc6f7901904105e19c50

\Users\Admin\AppData\Local\Temp\Costura\1ACF592E7018DA88DDC32B96D203A4BE\32\sqlite3.dll

MD5 0a855f27a1e48991d14c593cb930d2b2
SHA1 01935b77a59ab90be4af37bb4e8bc57fbdcf23a1
SHA256 43d11ddfa64be9a2eeb94574f21fd45334e4598506f3d5ae1446c7a0add10300
SHA512 bfc680d50d043c438c0c4bc97f7830010bf302e9e81296c57b1a06e3e87a2000444e44fadec20ca2025260bf745629971bfca02ff59469085fc7eada7912e873

memory/1612-39-0x0000000000B50000-0x0000000000B51000-memory.dmp

memory/1196-40-0x0000000002A50000-0x0000000002A56000-memory.dmp