Analysis
-
max time kernel
581s -
max time network
564s -
platform
windows7_x64 -
resource
win7-en -
submitted
14-09-2021 09:06
Static task
static1
Behavioral task
behavioral1
Sample
lv.exe
Resource
win7-en
General
-
Target
lv.exe
-
Size
4.2MB
-
MD5
1919bd531e95d9195dc53ee6af79ffc8
-
SHA1
65c2dfb3ad6ff0b3f1b33db143ec9a65ea64e2b0
-
SHA256
eb50c5447c789b7cab2a404cfbbd049c55fa70bc58783f2bb27df7d169474d27
-
SHA512
b00029cdfeac8266653f2fefe07e40815c14c811dce68fc95b821a408f8cf60489366a461a1def3d423747a2f5559ce6c1acaee16a795d893036d2a8226ae9c6
Malware Config
Extracted
danabot
2033
4
23.229.29.48:443
5.9.224.204:443
192.255.166.212:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
Signatures
-
Danabot Loader Component 17 IoCs
resource yara_rule behavioral1/files/0x0001000000012f3b-125.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-126.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-127.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-128.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-129.dat DanabotLoader2021 behavioral1/memory/968-130-0x0000000002200000-0x0000000002362000-memory.dmp DanabotLoader2021 behavioral1/memory/1612-138-0x0000000000AC0000-0x0000000000C22000-memory.dmp DanabotLoader2021 behavioral1/files/0x0001000000012f3b-137.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-136.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-135.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-134.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-148.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-147.dat DanabotLoader2021 behavioral1/files/0x0001000000012f3b-146.dat DanabotLoader2021 behavioral1/memory/1928-150-0x00000000020A0000-0x0000000002202000-memory.dmp DanabotLoader2021 behavioral1/files/0x0001000000012f3b-149.dat DanabotLoader2021 behavioral1/memory/2024-163-0x0000000001F30000-0x0000000002B7A000-memory.dmp DanabotLoader2021 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 8 IoCs
flow pid Process 23 1768 WScript.exe 25 1768 WScript.exe 27 1768 WScript.exe 29 1768 WScript.exe 31 1768 WScript.exe 34 968 rundll32.exe 35 1612 RUNDLL32.EXE 40 1612 RUNDLL32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 1700 wakingvp.exe 1432 fulzie.exe 1868 Estremita.exe.com 332 IntelRapid.exe 916 Estremita.exe.com 1008 ipconfig.exe 1432 uwxkgep.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fulzie.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fulzie.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk fulzie.exe -
Loads dropped DLL 31 IoCs
pid Process 1928 lv.exe 1928 lv.exe 1700 wakingvp.exe 1700 wakingvp.exe 1928 lv.exe 1928 lv.exe 1700 wakingvp.exe 1432 fulzie.exe 280 cmd.exe 1432 fulzie.exe 1432 fulzie.exe 1868 Estremita.exe.com 916 Estremita.exe.com 1008 ipconfig.exe 1008 ipconfig.exe 1008 ipconfig.exe 1008 ipconfig.exe 1432 uwxkgep.exe 1432 uwxkgep.exe 968 rundll32.exe 968 rundll32.exe 968 rundll32.exe 968 rundll32.exe 1612 RUNDLL32.EXE 1612 RUNDLL32.EXE 1612 RUNDLL32.EXE 1612 RUNDLL32.EXE 1928 RUNDLL32.EXE 1928 RUNDLL32.EXE 1928 RUNDLL32.EXE 1928 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0001000000012f23-62.dat themida behavioral1/files/0x0001000000012f23-65.dat themida behavioral1/files/0x0001000000012f23-63.dat themida behavioral1/memory/1432-66-0x000000013F970000-0x0000000140284000-memory.dmp themida behavioral1/files/0x0001000000012f23-68.dat themida behavioral1/files/0x0001000000012f29-71.dat themida behavioral1/files/0x0001000000012f29-90.dat themida behavioral1/files/0x0001000000012f29-85.dat themida behavioral1/files/0x0001000000012f29-84.dat themida behavioral1/memory/332-92-0x000000013FAC0000-0x00000001403D4000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fulzie.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1432 fulzie.exe 332 IntelRapid.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 916 set thread context of 1008 916 Estremita.exe.com 40 PID 1928 set thread context of 1056 1928 RUNDLL32.EXE 50 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll lv.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll lv.exe File created C:\Program Files (x86)\foler\olader\acledit.dll lv.exe File created C:\PROGRA~3\Gskyj.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
resource yara_rule behavioral1/files/0x0001000000012f22-55.dat nsis_installer_1 behavioral1/files/0x0001000000012f22-55.dat nsis_installer_2 behavioral1/files/0x0001000000012f22-57.dat nsis_installer_1 behavioral1/files/0x0001000000012f22-57.dat nsis_installer_2 behavioral1/files/0x0001000000012f22-59.dat nsis_installer_1 behavioral1/files/0x0001000000012f22-59.dat nsis_installer_2 behavioral1/files/0x0001000000012f22-60.dat nsis_installer_1 behavioral1/files/0x0001000000012f22-60.dat nsis_installer_2 behavioral1/files/0x0001000000012f22-61.dat nsis_installer_1 behavioral1/files/0x0001000000012f22-61.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 44 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ipconfig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform ID RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform ID RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Signature RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ipconfig.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1008 ipconfig.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5612ADFE9336101B8D3D610EAAE370182123AC3B RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\5612ADFE9336101B8D3D610EAAE370182123AC3B\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1768 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 332 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 RUNDLL32.EXE 1612 RUNDLL32.EXE 1612 RUNDLL32.EXE 1928 RUNDLL32.EXE 2024 powershell.exe 1612 RUNDLL32.EXE 1612 RUNDLL32.EXE 1584 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 916 Estremita.exe.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1612 RUNDLL32.EXE Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1868 Estremita.exe.com 1868 Estremita.exe.com 1868 Estremita.exe.com 916 Estremita.exe.com 916 Estremita.exe.com 916 Estremita.exe.com 1056 rundll32.exe 1612 RUNDLL32.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1868 Estremita.exe.com 1868 Estremita.exe.com 1868 Estremita.exe.com 916 Estremita.exe.com 916 Estremita.exe.com 916 Estremita.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1700 1928 lv.exe 26 PID 1928 wrote to memory of 1432 1928 lv.exe 27 PID 1928 wrote to memory of 1432 1928 lv.exe 27 PID 1928 wrote to memory of 1432 1928 lv.exe 27 PID 1928 wrote to memory of 1432 1928 lv.exe 27 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1700 wrote to memory of 1616 1700 wakingvp.exe 28 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 1616 wrote to memory of 280 1616 cmd.exe 30 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 912 280 cmd.exe 31 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1868 280 cmd.exe 32 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 280 wrote to memory of 1768 280 cmd.exe 33 PID 1432 wrote to memory of 332 1432 fulzie.exe 34 PID 1432 wrote to memory of 332 1432 fulzie.exe 34 PID 1432 wrote to memory of 332 1432 fulzie.exe 34 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 1868 wrote to memory of 916 1868 Estremita.exe.com 35 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40 PID 916 wrote to memory of 1008 916 Estremita.exe.com 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\lv.exe"C:\Users\Admin\AppData\Local\Temp\lv.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe"C:\Users\Admin\AppData\Local\Temp\picoid\wakingvp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Giu.vst3⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^xUlNXJkiuCtOHCFKpjDKUUxBRFKQlgBZHHJmaqfsJHlshynlliqvvnNmAJWsYcXSwtiqTyaoWjqjKehMumFehtDoUpZItXagJafpYnsyOSmlnAPbcpkmPVEXBYyJy$" Ape.vst5⤵PID:912
-
-
C:\Users\Admin\AppData\Roaming\Estremita.exe.comEstremita.exe.com o5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\Estremita.exe.comC:\Users\Admin\AppData\Roaming\Estremita.exe.com o6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Roaming\ipconfig.exeC:\Users\Admin\AppData\Roaming\ipconfig.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Gathers network information
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\uwxkgep.exe"C:\Users\Admin\AppData\Local\Temp\uwxkgep.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\UWXKGE~1.DLL,s C:\Users\Admin\AppData\Local\Temp\uwxkgep.exe9⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
PID:968 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\UWXKGE~1.DLL,gzZNTzM=10⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1612 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\UWXKGE~1.DLL,PCoR11⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 1582612⤵
- Suspicious use of FindShellTrayWindow
PID:1056 -
C:\Windows\system32\ctfmon.exectfmon.exe13⤵PID:2040
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpFF55.tmp.ps1"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1B8E.tmp.ps1"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost12⤵PID:1756
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask11⤵PID:1228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask11⤵PID:872
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ibsittmsmsv.vbs"8⤵PID:1020
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vdajqilx.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1768
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping KJUCCLUP5⤵
- Runs ping.exe
PID:1768
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe"C:\Users\Admin\AppData\Local\Temp\picoid\fulzie.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
PID:332
-
-