Analysis
-
max time kernel
152s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe
Resource
win7-20220812-en
General
-
Target
7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe
-
Size
479KB
-
MD5
a17e4519a6e005f7fd867703639a15a7
-
SHA1
23e6bc4906b190a33203cd489ede1d499e819cad
-
SHA256
7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9
-
SHA512
e47a3eae65661119b7900d95c1a8f5edc80d55a6d1110aea53d13aaf408447eef73165e866ee74907ad1483c53396835143c1534a956b933fe224f3da4d28a04
-
SSDEEP
12288:tzPC0M438po70VxFFVJYCNp18mXxt2p7mOEvdwmQEd7bOuf+eube:hFs+ITxtK46Ywh
Malware Config
Extracted
cybergate
v1.18.0 - Trial version
Victime
tarik775.no-ip.org:81
XO6853ER546413
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
BOOT
-
install_file
msnmsgr.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
008
-
regkey_hkcu
Windows Live Messenger
Signatures
-
Adds policy Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Live Messenger = "C:\\Program Files (x86)\\BOOT\\msnmsgr.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Live Messenger = "C:\\Users\\Admin\\AppData\\Roaming\\BOOT\\msnmsgr.exe" vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Live Messenger = "C:\\Program Files (x86)\\BOOT\\msnmsgr.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Live Messenger = "C:\\Users\\Admin\\AppData\\Roaming\\BOOT\\msnmsgr.exe" vbc.exe -
Executes dropped EXE 2 IoCs
pid Process 5096 msnmsgr.exe 1748 msnmsgr.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{G5CM43AU-R0BN-3OW8-K1X3-J0FQ1HPD61JI} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{G5CM43AU-R0BN-3OW8-K1X3-J0FQ1HPD61JI}\StubPath = "C:\\Program Files (x86)\\BOOT\\msnmsgr.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{G5CM43AU-R0BN-3OW8-K1X3-J0FQ1HPD61JI} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{G5CM43AU-R0BN-3OW8-K1X3-J0FQ1HPD61JI}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\BOOT\\msnmsgr.exe Restart" vbc.exe -
resource yara_rule behavioral2/memory/4896-147-0x0000000010410000-0x0000000010482000-memory.dmp upx behavioral2/memory/444-160-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/4896-159-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/4732-165-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/2132-166-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/4732-169-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral2/memory/2132-170-0x0000000010490000-0x0000000010502000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msnmsgr.exe vbc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msnmsgr.exe vbc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Live Messenger = "C:\\Program Files (x86)\\BOOT\\msnmsgr.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Live Messenger = "C:\\Users\\Admin\\AppData\\Roaming\\BOOT\\msnmsgr.exe" vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2820 set thread context of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 4888 set thread context of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\BOOT\msnmsgr.exe vbc.exe File created C:\Program Files (x86)\BOOT\msnmsgr.exe vbc.exe File opened for modification C:\Program Files (x86)\BOOT\msnmsgr.exe vbc.exe File opened for modification C:\Program Files (x86)\BOOT\msnmsgr.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4532 4732 WerFault.exe 88 3560 4732 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe Token: SeDebugPrivilege 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe Token: SeBackupPrivilege 2132 vbc.exe Token: SeRestorePrivilege 2132 vbc.exe Token: SeBackupPrivilege 4732 vbc.exe Token: SeRestorePrivilege 4732 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 444 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 83 PID 2820 wrote to memory of 4888 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 84 PID 2820 wrote to memory of 4888 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 84 PID 2820 wrote to memory of 4888 2820 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 84 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 4888 wrote to memory of 4896 4888 7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe 85 PID 444 wrote to memory of 2308 444 vbc.exe 87 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 444 wrote to memory of 2308 444 vbc.exe 87 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86 PID 4896 wrote to memory of 3532 4896 vbc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe"C:\Users\Admin\AppData\Local\Temp\7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Program Files (x86)\BOOT\msnmsgr.exe"C:\Program Files (x86)\BOOT\msnmsgr.exe"3⤵
- Executes dropped EXE
PID:5096
-
-
-
C:\Users\Admin\AppData\Local\Temp\7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe"C:\Users\Admin\AppData\Local\Temp\7b91902e1732e68a968eada5bb219dbffa319899c7c09435e3090693260d77c9.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3532
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 10285⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 10365⤵
- Program crash
PID:3560
-
-
-
C:\Users\Admin\AppData\Roaming\BOOT\msnmsgr.exe"C:\Users\Admin\AppData\Roaming\BOOT\msnmsgr.exe"4⤵
- Executes dropped EXE
PID:1748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4732 -ip 47321⤵PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4732 -ip 47321⤵PID:3556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
236KB
MD566bf50f7037bdfe47fd8dabd64acb269
SHA1a622bf7f740036200013e537b69b4cd91c5f10fe
SHA2563b918d55f1a7536ceeb045cdcb21265dae18cced81acbe1adfb4665317cba050
SHA51258752fc14cbbb382c47b3340a81db6febe7e26e9ccff3c621951b3c67685052c42507ff46f411f6fa9d27678c57de625c81cf8d38fc446046bf0f456e136565f
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34