Analysis
-
max time kernel
280s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 13:52
Static task
static1
Behavioral task
behavioral1
Sample
12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe
Resource
win7-20220414-en
General
-
Target
12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe
-
Size
929KB
-
MD5
93b07745eaf59eb167bfd31d9fd2d57c
-
SHA1
832b665f85fb2ff1161ee8e11ec668c099e3dc2f
-
SHA256
12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a
-
SHA512
350267c3f59b39280f649e0ca3bfbfe0d1b3637002d4e866c7af88d6acd82509ca1d0c7e08ac5d0fe6628fa17d777ab9d37d5b1cd48fa140ac9675d6b88e8577
Malware Config
Extracted
xloader
2.6
uj3c
copimetro.com
choonchain.com
luxxwireless.com
fashionweekofcincinnati.com
campingshare.net
suncochina.com
kidsfundoor.com
testingnyc.co
lovesoe.com
vehiclesbeenrecord.com
socialpearmarketing.com
maxproductdji.com
getallarticle.online
forummind.com
arenamarenostrum.com
trisuaka.xyz
designgamagazine.com
chateaulehotel.com
huangse5.com
esginvestment.tech
intercontinentalship.com
moneytaoism.com
agardenfortwo.com
trendiddas.com
fjuoomw.xyz
dantvilla.com
shopwithtrooperdavecom.com
lanwenzong.com
xpertsrealty.com
gamelabsmash.com
nomaxdic.com
chillyracing.com
mypleasure-blog.com
projectkyla.com
florurbana.com
oneplacemexico.com
gografic.com
giantht.com
dotombori-base.com
westlifinance.online
maacsecurity.com
lydas.info
instapandas.com
labustiadepaper.net
unglue52.com
onurnet.net
wellkept.info
6111.site
platinumroofingsusa.com
bodyplex.fitness
empireapothecary.com
meigsbuilds.online
garygrover.com
nicholasnikas.com
yd9992.com
protections-clients.info
sueyhzx.com
naturathome.info
superinformatico.net
printsgarden.com
xn--qn1b03fy2b841b.com
preferable.info
ozzyconstructionma.com
10stopp.online
nutricognition.com
Extracted
formbook
4.1
n7ak
modischoolcbse.com
theneverwinter.com
rszkjx-vps-hosting.website
fnihil.com
1pbet.com
nnowzscorrez.com
uaotgvjl.icu
starmapsqatar.com
ekisilani.com
extradeepsheets.com
jam-nins.com
buranly.com
orixentertainment.com
rawtech.energy
myol.guru
utex.club
jiapie.com
wowig.store
wweidlyyl.com
systaskautomation.com
citromudas3a.com
plasticstone.icu
pawchamamapet.com
beautybybby.com
mor-n-mor.com
getoffyourhighhorses.com
chieucaochoban9.xyz
grahamevansmp.com
amplaassessoria.net
nutricookindia.com
wazymbex.icu
joansironing.com
hallforless.com
mycourseprofits.com
precps.com
cookislandstourismpodcast.com
bestonlinedealslive.com
bug.chat
ptjbtoqonjtrwpvkfgmjvwp.com
tortniespodzianka.store
qxkbjgj.icu
aurashape.com
guinealive.com
mondialeresources.com
offthebreak.site
maxamproductivity.com
thebiztip.com
thelocalrea.com
laeducacionadistancia.com
inpakgroup.com
lvgang360.com
allvegangoods.com
tymudanzaramos.com
simpleframeswork.com
thehappycars.com
directfenetres.net
norskatferdsterapi.com
hostingcnx.com
ksmh5x.com
thespiritworldinvitational.com
jetsetwilly3.com
gameflexdev.com
tryhuge.com
vaporvspaper.com
kmresults.com
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1492-179-0x0000000000000000-mapping.dmp formbook behavioral1/memory/1492-183-0x0000000010410000-0x000000001043E000-memory.dmp formbook behavioral1/memory/1840-191-0x0000000000080000-0x00000000000AE000-memory.dmp formbook behavioral1/memory/1840-197-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
ModiLoader Second Stage 50 IoCs
Processes:
resource yara_rule behavioral1/memory/1972-65-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-66-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-67-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-68-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-71-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-70-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-69-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-72-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-76-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-75-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-74-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-73-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-90-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-89-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-88-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-87-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-86-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-85-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-84-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-83-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-82-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-81-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-80-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-79-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-78-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-77-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-96-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-98-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-97-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-99-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-100-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-108-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-107-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-109-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-112-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-111-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-113-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1972-114-0x0000000004630000-0x0000000004682000-memory.dmp modiloader_stage2 behavioral1/memory/1548-149-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-150-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-151-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-152-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-154-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-155-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-156-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-153-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-158-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-159-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-160-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 behavioral1/memory/1548-157-0x0000000004030000-0x0000000004084000-memory.dmp modiloader_stage2 -
Xloader Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1972-92-0x0000000010410000-0x000000001043B000-memory.dmp xloader behavioral1/memory/1168-95-0x0000000000000000-mapping.dmp xloader behavioral1/memory/1168-116-0x0000000010410000-0x000000001043B000-memory.dmp xloader behavioral1/memory/596-122-0x00000000001B0000-0x00000000001DB000-memory.dmp xloader behavioral1/memory/596-126-0x00000000001B0000-0x00000000001DB000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\JR8XNT2HKTE = "C:\\Program Files (x86)\\Gmnupd\\vgaebgx.exe" cscript.exe -
Executes dropped EXE 3 IoCs
Processes:
nrxhw.exevgaebgx.exezdmtqht.exepid process 1548 nrxhw.exe 1912 vgaebgx.exe 1308 zdmtqht.exe -
Loads dropped DLL 2 IoCs
Processes:
cscript.exepid process 596 cscript.exe 596 cscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exenrxhw.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ixknjgjdxi = "C:\\Users\\Public\\Libraries\\ixdjgjnkxI.url" 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gsnaatekuq = "C:\\Users\\Public\\Libraries\\quketaansG.url" nrxhw.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
logagent.execscript.exeDpiScaling.execontrol.exedescription pid process target process PID 1168 set thread context of 1416 1168 logagent.exe Explorer.EXE PID 596 set thread context of 1416 596 cscript.exe Explorer.EXE PID 1492 set thread context of 1416 1492 DpiScaling.exe Explorer.EXE PID 1840 set thread context of 1416 1840 control.exe Explorer.EXE -
Drops file in Program Files directory 2 IoCs
Processes:
cscript.exeExplorer.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Gmnupd\vgaebgx.exe cscript.exe File created C:\Program Files (x86)\Gmnupd\vgaebgx.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
cscript.exedescription ioc process Key created \Registry\User\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
logagent.execscript.exeDpiScaling.execontrol.exepid process 1168 logagent.exe 1168 logagent.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 1492 DpiScaling.exe 1492 DpiScaling.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 1840 control.exe 596 cscript.exe 596 cscript.exe 1840 control.exe -
Suspicious behavior: MapViewOfSection 12 IoCs
Processes:
logagent.execscript.exeDpiScaling.execontrol.exepid process 1168 logagent.exe 1168 logagent.exe 1168 logagent.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 596 cscript.exe 1492 DpiScaling.exe 1492 DpiScaling.exe 1492 DpiScaling.exe 1840 control.exe 1840 control.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
logagent.execscript.exeDpiScaling.execontrol.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1168 logagent.exe Token: SeDebugPrivilege 596 cscript.exe Token: SeDebugPrivilege 1492 DpiScaling.exe Token: SeDebugPrivilege 1840 control.exe Token: SeShutdownPrivilege 1416 Explorer.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exeExplorer.EXEcscript.exenrxhw.execontrol.exedescription pid process target process PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1972 wrote to memory of 1168 1972 12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe logagent.exe PID 1416 wrote to memory of 596 1416 Explorer.EXE cscript.exe PID 1416 wrote to memory of 596 1416 Explorer.EXE cscript.exe PID 1416 wrote to memory of 596 1416 Explorer.EXE cscript.exe PID 1416 wrote to memory of 596 1416 Explorer.EXE cscript.exe PID 596 wrote to memory of 1620 596 cscript.exe cmd.exe PID 596 wrote to memory of 1620 596 cscript.exe cmd.exe PID 596 wrote to memory of 1620 596 cscript.exe cmd.exe PID 596 wrote to memory of 1620 596 cscript.exe cmd.exe PID 596 wrote to memory of 1136 596 cscript.exe Firefox.exe PID 596 wrote to memory of 1136 596 cscript.exe Firefox.exe PID 596 wrote to memory of 1136 596 cscript.exe Firefox.exe PID 596 wrote to memory of 1136 596 cscript.exe Firefox.exe PID 596 wrote to memory of 1136 596 cscript.exe Firefox.exe PID 596 wrote to memory of 1548 596 cscript.exe nrxhw.exe PID 596 wrote to memory of 1548 596 cscript.exe nrxhw.exe PID 596 wrote to memory of 1548 596 cscript.exe nrxhw.exe PID 596 wrote to memory of 1548 596 cscript.exe nrxhw.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1548 wrote to memory of 1492 1548 nrxhw.exe DpiScaling.exe PID 1416 wrote to memory of 1840 1416 Explorer.EXE control.exe PID 1416 wrote to memory of 1840 1416 Explorer.EXE control.exe PID 1416 wrote to memory of 1840 1416 Explorer.EXE control.exe PID 1416 wrote to memory of 1840 1416 Explorer.EXE control.exe PID 1840 wrote to memory of 668 1840 control.exe cmd.exe PID 1840 wrote to memory of 668 1840 control.exe cmd.exe PID 1840 wrote to memory of 668 1840 control.exe cmd.exe PID 1840 wrote to memory of 668 1840 control.exe cmd.exe PID 1416 wrote to memory of 1912 1416 Explorer.EXE vgaebgx.exe PID 1416 wrote to memory of 1912 1416 Explorer.EXE vgaebgx.exe PID 1416 wrote to memory of 1912 1416 Explorer.EXE vgaebgx.exe PID 1416 wrote to memory of 1912 1416 Explorer.EXE vgaebgx.exe PID 596 wrote to memory of 1308 596 cscript.exe zdmtqht.exe PID 596 wrote to memory of 1308 596 cscript.exe zdmtqht.exe PID 596 wrote to memory of 1308 596 cscript.exe zdmtqht.exe PID 596 wrote to memory of 1308 596 cscript.exe zdmtqht.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe"C:\Users\Admin\AppData\Local\Temp\12fd21cbec194aad7f97eb21ca373742d6992b18c7f54eab1c71ecef3d874f3a.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\logagent.exeC:\Windows\System32\logagent.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\logagent.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\nrxhw.exe"C:\Users\Admin\AppData\Local\Temp\nrxhw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\zdmtqht.exe"C:\Users\Admin\AppData\Local\Temp\zdmtqht.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DpiScaling.exe"3⤵
-
C:\Program Files (x86)\Gmnupd\vgaebgx.exe"C:\Program Files (x86)\Gmnupd\vgaebgx.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Gmnupd\vgaebgx.exeFilesize
93KB
MD5ea7d55e6964aa852bc7ae6f1c3349a55
SHA153359c8e8931277285906a434c390b572c44727d
SHA2569f62d26179d0f61ee5bc2aa53507579c009dc28f916a32a557d6e0dfe0e0d1ea
SHA5125c121555745a27708767547131b213344085fb7e75928b6caabccc0e398be39c64cebdacd0e2a888a37f609d2a8cad95255aae163b3b5cc28f28ce75afdd0124
-
C:\Program Files (x86)\Gmnupd\vgaebgx.exeFilesize
93KB
MD5ea7d55e6964aa852bc7ae6f1c3349a55
SHA153359c8e8931277285906a434c390b572c44727d
SHA2569f62d26179d0f61ee5bc2aa53507579c009dc28f916a32a557d6e0dfe0e0d1ea
SHA5125c121555745a27708767547131b213344085fb7e75928b6caabccc0e398be39c64cebdacd0e2a888a37f609d2a8cad95255aae163b3b5cc28f28ce75afdd0124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442Filesize
1KB
MD521cd26f84067808d04d9cc2612519723
SHA1ff4b88b954eb688f9a509fce25a1b9a758b7b833
SHA256d64140cdb8de87a068eccd819a98c89c6bfbc39c0e62082f309070fc80760dda
SHA5124a1093382dc198dbf1bc1bf2a6804f474170d837edbdfc1b85f1a2c3e8c5120c0c8b16452463a55fc817e5e32f15df4ff4de4ddc3d501e033bbef388e3f42615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442Filesize
416B
MD5615ff38d00bf64eee6d305281ca6c100
SHA13526922f741178097991069c622025469b0b435e
SHA256f39bac3cff9e2e24ac431d8303233560a6b4945224026a79321254f3c4c329cb
SHA512e3bc8bd0f7f140d75a94e55a7183e36b02bc3320481211fc5bc9b3bd498f0116d41f49da587082e908f069498642fc2d53bb46003888ed65be14c30132b6e3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bd5bc6f8d292343f8c8756c4c6cca277
SHA1c47f11b40cc1947900487251d0b70c9ea3449eff
SHA256dc40914098089cfddc2a0f78e0429c07ac5fbb104733427d113cb6b4d05841f8
SHA5123a53901e5ae2928f989a4fc9ac4534e725c6920c20bfbe2c5d42e63ef86f91dd15b1643640db062fe699d30ac638e4765e0809ea4573beb9b0422d918806c157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD51a1fb57e3c9d274e7cc9ee4a277cf954
SHA1af3a97bf23184a5e1eb9ac6da7d8e2f47b488467
SHA25646ba98e84f85253890452c878d9b2c32892b1b9005e1be75306f5842d6b27da0
SHA512dc5ffdc62aa17df037d780370dd8e280c6b062b31fa49453821e77029e5e540aae3a660232067d7b84bbc2cc9e103b777eabd5e552eab271debd6920f57886a3
-
C:\Users\Admin\AppData\Local\Temp\nrxhw.exeFilesize
892KB
MD51586ba86228b75478e39c18a4414cea0
SHA175467b96d2a138df8ee42355dd228212d60c6c51
SHA2567a33326911b7cc7ba3dc7c64feeda67e8b396f261bc5789833dfac686c4d7748
SHA512a6ac5b85d5c0960e04c80c86c4347c7a6d8751920ef02d8c058fb81a4ec86779d38a1beb7564c36f0926f8f57045610b7e5a5bed9a128df54b722a0ed56eb667
-
C:\Users\Admin\AppData\Local\Temp\nrxhw.exeFilesize
892KB
MD51586ba86228b75478e39c18a4414cea0
SHA175467b96d2a138df8ee42355dd228212d60c6c51
SHA2567a33326911b7cc7ba3dc7c64feeda67e8b396f261bc5789833dfac686c4d7748
SHA512a6ac5b85d5c0960e04c80c86c4347c7a6d8751920ef02d8c058fb81a4ec86779d38a1beb7564c36f0926f8f57045610b7e5a5bed9a128df54b722a0ed56eb667
-
C:\Users\Admin\AppData\Local\Temp\zdmtqht.exeFilesize
892KB
MD51586ba86228b75478e39c18a4414cea0
SHA175467b96d2a138df8ee42355dd228212d60c6c51
SHA2567a33326911b7cc7ba3dc7c64feeda67e8b396f261bc5789833dfac686c4d7748
SHA512a6ac5b85d5c0960e04c80c86c4347c7a6d8751920ef02d8c058fb81a4ec86779d38a1beb7564c36f0926f8f57045610b7e5a5bed9a128df54b722a0ed56eb667
-
C:\Users\Admin\AppData\Local\Temp\zdmtqht.exeFilesize
892KB
MD51586ba86228b75478e39c18a4414cea0
SHA175467b96d2a138df8ee42355dd228212d60c6c51
SHA2567a33326911b7cc7ba3dc7c64feeda67e8b396f261bc5789833dfac686c4d7748
SHA512a6ac5b85d5c0960e04c80c86c4347c7a6d8751920ef02d8c058fb81a4ec86779d38a1beb7564c36f0926f8f57045610b7e5a5bed9a128df54b722a0ed56eb667
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O4FP06L1.txtFilesize
64B
MD588387e43accb0e7fb02ac26053cd074e
SHA180369a828d32aabc4a9869a5f69f1e8689f2833b
SHA2562e8a877166bf4962c9c689453726dccfaf9434d1df7cd64a581b08a7d35fa1e4
SHA5128e948402b4788a09e56a364bcb5a42b0deb1520f4823207a876ecaef417b05e81db43dd227385e5591df0a495fb13143d7856ac1e1163967ac8b72107ead2fd5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UCOEORC3.txtFilesize
64B
MD522644a93e69824608a7ea149c717d348
SHA1d50e37f154aed546e884fdec101573c6519b76c4
SHA25654931cd00aeeea4799a3f47bb1d4c2458b1076705e8583ace9896f2fed5f949b
SHA512c1df07e5df678d528dae8ac482aea19dbcc1057edce002f676c5b68b12302dc634a0fd6e3cdbce637ab6bbeda6fb209301e30ebe71842758614afcc137d211ba
-
\Users\Admin\AppData\Local\Temp\nrxhw.exeFilesize
892KB
MD51586ba86228b75478e39c18a4414cea0
SHA175467b96d2a138df8ee42355dd228212d60c6c51
SHA2567a33326911b7cc7ba3dc7c64feeda67e8b396f261bc5789833dfac686c4d7748
SHA512a6ac5b85d5c0960e04c80c86c4347c7a6d8751920ef02d8c058fb81a4ec86779d38a1beb7564c36f0926f8f57045610b7e5a5bed9a128df54b722a0ed56eb667
-
\Users\Admin\AppData\Local\Temp\zdmtqht.exeFilesize
892KB
MD51586ba86228b75478e39c18a4414cea0
SHA175467b96d2a138df8ee42355dd228212d60c6c51
SHA2567a33326911b7cc7ba3dc7c64feeda67e8b396f261bc5789833dfac686c4d7748
SHA512a6ac5b85d5c0960e04c80c86c4347c7a6d8751920ef02d8c058fb81a4ec86779d38a1beb7564c36f0926f8f57045610b7e5a5bed9a128df54b722a0ed56eb667
-
memory/596-123-0x0000000002030000-0x0000000002333000-memory.dmpFilesize
3.0MB
-
memory/596-121-0x00000000002F0000-0x0000000000312000-memory.dmpFilesize
136KB
-
memory/596-120-0x0000000000000000-mapping.dmp
-
memory/596-122-0x00000000001B0000-0x00000000001DB000-memory.dmpFilesize
172KB
-
memory/596-125-0x00000000003B0000-0x0000000000440000-memory.dmpFilesize
576KB
-
memory/596-126-0x00000000001B0000-0x00000000001DB000-memory.dmpFilesize
172KB
-
memory/668-189-0x0000000000000000-mapping.dmp
-
memory/1168-95-0x0000000000000000-mapping.dmp
-
memory/1168-93-0x0000000010410000-0x000000001043B000-memory.dmpFilesize
172KB
-
memory/1168-117-0x00000000021C0000-0x00000000024C3000-memory.dmpFilesize
3.0MB
-
memory/1168-118-0x00000000002A0000-0x00000000002B1000-memory.dmpFilesize
68KB
-
memory/1168-116-0x0000000010410000-0x000000001043B000-memory.dmpFilesize
172KB
-
memory/1308-199-0x0000000000000000-mapping.dmp
-
memory/1416-128-0x0000000006FA0000-0x000000000707F000-memory.dmpFilesize
892KB
-
memory/1416-119-0x0000000006C50000-0x0000000006D51000-memory.dmpFilesize
1.0MB
-
memory/1416-187-0x0000000009540000-0x0000000009681000-memory.dmpFilesize
1.3MB
-
memory/1416-127-0x0000000006FA0000-0x000000000707F000-memory.dmpFilesize
892KB
-
memory/1492-186-0x0000000000200000-0x0000000000214000-memory.dmpFilesize
80KB
-
memory/1492-184-0x0000000002030000-0x0000000002333000-memory.dmpFilesize
3.0MB
-
memory/1492-179-0x0000000000000000-mapping.dmp
-
memory/1492-183-0x0000000010410000-0x000000001043E000-memory.dmpFilesize
184KB
-
memory/1548-159-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-155-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-157-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-160-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-158-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-153-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-156-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-131-0x0000000000000000-mapping.dmp
-
memory/1548-154-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-152-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-151-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-150-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1548-149-0x0000000004030000-0x0000000004084000-memory.dmpFilesize
336KB
-
memory/1620-124-0x0000000000000000-mapping.dmp
-
memory/1840-192-0x0000000001EB0000-0x00000000021B3000-memory.dmpFilesize
3.0MB
-
memory/1840-185-0x0000000000000000-mapping.dmp
-
memory/1840-197-0x0000000000080000-0x00000000000AE000-memory.dmpFilesize
184KB
-
memory/1840-195-0x0000000001D20000-0x0000000001DB3000-memory.dmpFilesize
588KB
-
memory/1840-191-0x0000000000080000-0x00000000000AE000-memory.dmpFilesize
184KB
-
memory/1840-190-0x00000000003E0000-0x00000000003FF000-memory.dmpFilesize
124KB
-
memory/1912-193-0x0000000000000000-mapping.dmp
-
memory/1972-87-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-89-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-84-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-85-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-86-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-77-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-96-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-98-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-97-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-99-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-100-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-108-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-107-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-114-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-113-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/1972-111-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-112-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-88-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-83-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-90-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-82-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-73-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-74-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-75-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-92-0x0000000010410000-0x000000001043B000-memory.dmpFilesize
172KB
-
memory/1972-109-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-81-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-80-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-76-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-79-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-72-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-78-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-69-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-70-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-71-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-68-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-67-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-66-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB
-
memory/1972-65-0x0000000004630000-0x0000000004682000-memory.dmpFilesize
328KB