Analysis Overview
SHA256
5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d
Threat Level: Known bad
The file 5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d was found to be: Known bad.
Malicious Activity Summary
NetWire RAT payload
Netwire family
WarzoneRat, AveMaria
Netwire
Warzone RAT Payload
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
autoit_exe
Suspicious use of SetThreadContext
Drops file in Windows directory
Enumerates physical storage devices
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Checks processor information in registry
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-02-17 02:51
Signatures
NetWire RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Netwire family
autoit_exe
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2022-02-17 02:51
Reported
2022-02-17 03:07
Platform
win7-en-20211208
Max time kernel
166s
Max time network
165s
Command Line
Signatures
NetWire RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Netwire
WarzoneRat, AveMaria
Warzone RAT Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Blasthost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Blasthost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Blasthost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
Loads dropped DLL
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1428 set thread context of 1216 | N/A | C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe | C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe |
| PID 2036 set thread context of 1912 | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe |
| PID 1188 set thread context of 1964 | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe |
autoit_exe
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe
"C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe"
C:\Users\Admin\AppData\Roaming\Blasthost.exe
"C:\Users\Admin\AppData\Roaming\Blasthost.exe"
C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe
"C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe"
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {961FEB21-5EF7-44F0-94EF-90AA33219891} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\Blasthost.exe
"C:\Users\Admin\AppData\Roaming\Blasthost.exe"
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\Blasthost.exe
"C:\Users\Admin\AppData\Roaming\Blasthost.exe"
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
Network
| Country | Destination | Domain | Proto |
| US | 8.8.4.4:443 | tcp | |
| US | 34.104.35.123:80 | tcp | |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| NL | 142.251.36.3:443 | tcp | |
| NL | 142.250.179.131:443 | tcp | |
| NL | 142.250.179.173:443 | tcp | |
| NL | 142.250.179.206:443 | tcp | |
| NL | 172.217.168.193:443 | tcp | |
| US | 8.8.4.4:443 | tcp | |
| NL | 142.250.179.170:443 | tcp | |
| US | 8.8.4.4:443 | tcp | |
| NL | 142.251.36.3:443 | tcp | |
| NL | 142.250.179.195:443 | tcp |
Files
memory/1428-55-0x0000000076641000-0x0000000076643000-memory.dmp
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
memory/1428-61-0x0000000000D10000-0x0000000000D11000-memory.dmp
memory/1216-62-0x00000000001E0000-0x00000000001FD000-memory.dmp
memory/1216-63-0x00000000001E0000-0x00000000001FD000-memory.dmp
memory/1216-72-0x00000000001E0000-0x00000000001FD000-memory.dmp
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Imgburn\Host.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Imgburn\Host.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
memory/872-78-0x0000000000030000-0x0000000000031000-memory.dmp
memory/872-79-0x0000000000030000-0x0000000000031000-memory.dmp
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | 744a26637381c48b7489fa497f938935 |
| SHA1 | e1c2a3fac75bf78cba813e5e176d79b4246a90fa |
| SHA256 | 362dde96aa2163d4ddcc33a042737548147c3f92cd50c0d66c80408c87bbdf0b |
| SHA512 | 87e9f90b8b71f023f331ebc0c9b45ff69b51addcf1e2ffb7d61b5070667bce5e9c14bd08d26d411190147772b857dda8c14fb34bd16b85a0b142e45b8456b28d |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | 744a26637381c48b7489fa497f938935 |
| SHA1 | e1c2a3fac75bf78cba813e5e176d79b4246a90fa |
| SHA256 | 362dde96aa2163d4ddcc33a042737548147c3f92cd50c0d66c80408c87bbdf0b |
| SHA512 | 87e9f90b8b71f023f331ebc0c9b45ff69b51addcf1e2ffb7d61b5070667bce5e9c14bd08d26d411190147772b857dda8c14fb34bd16b85a0b142e45b8456b28d |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
memory/1912-92-0x00000000000C0000-0x00000000000DD000-memory.dmp
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | 744a26637381c48b7489fa497f938935 |
| SHA1 | e1c2a3fac75bf78cba813e5e176d79b4246a90fa |
| SHA256 | 362dde96aa2163d4ddcc33a042737548147c3f92cd50c0d66c80408c87bbdf0b |
| SHA512 | 87e9f90b8b71f023f331ebc0c9b45ff69b51addcf1e2ffb7d61b5070667bce5e9c14bd08d26d411190147772b857dda8c14fb34bd16b85a0b142e45b8456b28d |
memory/1912-102-0x00000000000C0000-0x00000000000DD000-memory.dmp
memory/2036-101-0x0000000000200000-0x0000000000201000-memory.dmp
memory/1668-104-0x0000000000160000-0x0000000000161000-memory.dmp
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | 744a26637381c48b7489fa497f938935 |
| SHA1 | e1c2a3fac75bf78cba813e5e176d79b4246a90fa |
| SHA256 | 362dde96aa2163d4ddcc33a042737548147c3f92cd50c0d66c80408c87bbdf0b |
| SHA512 | 87e9f90b8b71f023f331ebc0c9b45ff69b51addcf1e2ffb7d61b5070667bce5e9c14bd08d26d411190147772b857dda8c14fb34bd16b85a0b142e45b8456b28d |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | 744a26637381c48b7489fa497f938935 |
| SHA1 | e1c2a3fac75bf78cba813e5e176d79b4246a90fa |
| SHA256 | 362dde96aa2163d4ddcc33a042737548147c3f92cd50c0d66c80408c87bbdf0b |
| SHA512 | 87e9f90b8b71f023f331ebc0c9b45ff69b51addcf1e2ffb7d61b5070667bce5e9c14bd08d26d411190147772b857dda8c14fb34bd16b85a0b142e45b8456b28d |
memory/1052-126-0x00000000001B0000-0x00000000001B1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-02-17 02:51
Reported
2022-02-17 03:07
Platform
win10v2004-en-20220112
Max time kernel
169s
Max time network
180s
Command Line
Signatures
NetWire RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Netwire
WarzoneRat, AveMaria
Warzone RAT Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Blasthost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Blasthost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Blasthost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3080 set thread context of 2796 | N/A | C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe | C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe |
| PID 2624 set thread context of 2936 | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe |
| PID 2928 set thread context of 2084 | N/A | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe | C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe |
autoit_exe
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\WinSxS\pending.xml | C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe | N/A |
| File opened for modification | C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\Logs\CBS\CBS.log | C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Windows\system32\MusNotifyIcon.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\system32\MusNotifyIcon.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.037147" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4212" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4116" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132897171536881405" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4368" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.038168" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" | C:\Windows\System32\svchost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" | C:\Windows\System32\svchost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.535333" | C:\Windows\System32\svchost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings | C:\Windows\System32\svchost.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe
"C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe"
C:\Users\Admin\AppData\Roaming\Blasthost.exe
"C:\Users\Admin\AppData\Roaming\Blasthost.exe"
C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe
"C:\Users\Admin\AppData\Local\Temp\5ea63c4a2c542c7b4ba62995a05ced17358b02728323365ec924c7d42e88e00d.exe"
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\system32\MusNotifyIcon.exe
%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\Blasthost.exe
"C:\Users\Admin\AppData\Roaming\Blasthost.exe"
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
C:\Users\Admin\AppData\Roaming\Blasthost.exe
"C:\Users\Admin\AppData\Roaming\Blasthost.exe"
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
Network
| Country | Destination | Domain | Proto |
| NL | 92.123.77.56:80 | tcp | |
| NL | 67.26.105.254:80 | tcp | |
| NL | 104.80.224.57:443 | tcp | |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | geo.prod.do.dsp.mp.microsoft.com | udp |
| IE | 51.104.167.186:443 | geo.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | kv801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | kv801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | cp801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | cp801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | cp801.prod.do.dsp.mp.microsoft.com | udp |
| NL | 184.29.205.60:443 | cp801.prod.do.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | Wealthy2019.com.strangled.net | udp |
| US | 8.8.8.8:53 | wealth.warzonedns.com | udp |
| US | 8.8.8.8:53 | wealthyme.ddns.net | udp |
Files
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
memory/2796-133-0x0000000000400000-0x000000000041D000-memory.dmp
memory/3080-140-0x00000000048F0000-0x00000000048F1000-memory.dmp
memory/2796-142-0x0000000000400000-0x000000000041D000-memory.dmp
memory/1432-143-0x0000000002650000-0x0000000002651000-memory.dmp
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | dc77e91b1391fd8a02c9551e7e21e045 |
| SHA1 | f59efe36a7527b6f6f67d00be0022910e9e5df8a |
| SHA256 | 7c77c097101ebb349a7274c1bbb44558c78ecc985bfa8c67edbc4e064c130390 |
| SHA512 | f5873e3f4d96b65db6b5ba50edf8e9be172a6369fb7784dccbaa56b018ff55b698854920cd970c38d0c43bf9d7e0db77175717b5c5fc73388aec7f2dd65a70e7 |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | dc77e91b1391fd8a02c9551e7e21e045 |
| SHA1 | f59efe36a7527b6f6f67d00be0022910e9e5df8a |
| SHA256 | 7c77c097101ebb349a7274c1bbb44558c78ecc985bfa8c67edbc4e064c130390 |
| SHA512 | f5873e3f4d96b65db6b5ba50edf8e9be172a6369fb7784dccbaa56b018ff55b698854920cd970c38d0c43bf9d7e0db77175717b5c5fc73388aec7f2dd65a70e7 |
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | dc77e91b1391fd8a02c9551e7e21e045 |
| SHA1 | f59efe36a7527b6f6f67d00be0022910e9e5df8a |
| SHA256 | 7c77c097101ebb349a7274c1bbb44558c78ecc985bfa8c67edbc4e064c130390 |
| SHA512 | f5873e3f4d96b65db6b5ba50edf8e9be172a6369fb7784dccbaa56b018ff55b698854920cd970c38d0c43bf9d7e0db77175717b5c5fc73388aec7f2dd65a70e7 |
memory/928-156-0x0000000003610000-0x0000000003611000-memory.dmp
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | dc77e91b1391fd8a02c9551e7e21e045 |
| SHA1 | f59efe36a7527b6f6f67d00be0022910e9e5df8a |
| SHA256 | 7c77c097101ebb349a7274c1bbb44558c78ecc985bfa8c67edbc4e064c130390 |
| SHA512 | f5873e3f4d96b65db6b5ba50edf8e9be172a6369fb7784dccbaa56b018ff55b698854920cd970c38d0c43bf9d7e0db77175717b5c5fc73388aec7f2dd65a70e7 |
C:\Users\Admin\AppData\Roaming\Blasthost.exe
| MD5 | 6087bf6af59b9c531f2c9bb421d5e902 |
| SHA1 | 8bc0f1596c986179b82585c703bacae6d2a00316 |
| SHA256 | 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c |
| SHA512 | c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292 |
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
| MD5 | dc77e91b1391fd8a02c9551e7e21e045 |
| SHA1 | f59efe36a7527b6f6f67d00be0022910e9e5df8a |
| SHA256 | 7c77c097101ebb349a7274c1bbb44558c78ecc985bfa8c67edbc4e064c130390 |
| SHA512 | f5873e3f4d96b65db6b5ba50edf8e9be172a6369fb7784dccbaa56b018ff55b698854920cd970c38d0c43bf9d7e0db77175717b5c5fc73388aec7f2dd65a70e7 |
memory/3440-169-0x0000000002630000-0x0000000002631000-memory.dmp