Analysis
-
max time kernel
163s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2022 07:28
Static task
static1
Behavioral task
behavioral1
Sample
i.exe
Resource
win7-20220812-en
General
-
Target
i.exe
-
Size
3.0MB
-
MD5
365d7fdc34a8c57a60a4d1cd548e507b
-
SHA1
eb635b6e7fa6fe1e3a83026fd47c87bc78753006
-
SHA256
cf2667a5f76796a5ccc9995582737765e20eaf53b70b3688885974877f1d2d75
-
SHA512
ca7e0f0c3aa1034b90bb613908eac6f1aeb443b5dccb4c0c5d315747baa2843b67cfee3ae020c68c9a7cd7e9f197a5a870936f382c1e252aa12333396e403bf2
-
SSDEEP
12288:ny4zXZXBJ+LgSRQTy3pFjIwUOIojNoEFjwqIHGRGvFvaPw+3Y12wW:vrJ+LgTTy3pFjIwUOPVFjv8dvaPNI4D
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3940-163-0x00000000038E0000-0x0000000003A85000-memory.dmp purplefox_rootkit behavioral2/memory/3940-166-0x00000000037A0000-0x00000000038D8000-memory.dmp purplefox_rootkit behavioral2/memory/3940-167-0x00000000038E0000-0x0000000003A85000-memory.dmp purplefox_rootkit behavioral2/memory/3940-168-0x00000000038E0000-0x0000000003A85000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3940-163-0x00000000038E0000-0x0000000003A85000-memory.dmp family_gh0strat behavioral2/memory/3940-166-0x00000000037A0000-0x00000000038D8000-memory.dmp family_gh0strat behavioral2/memory/3940-167-0x00000000038E0000-0x0000000003A85000-memory.dmp family_gh0strat behavioral2/memory/3940-168-0x00000000038E0000-0x0000000003A85000-memory.dmp family_gh0strat -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Public\Pictures\Vrice\vqytap\libeay32.dll acprotect C:\Users\Public\Pictures\Vrice\vqytap\libeay32.dll acprotect -
Executes dropped EXE 2 IoCs
Processes:
snkc.exeblqxgc.exepid process 1020 snkc.exe 3940 blqxgc.exe -
Processes:
resource yara_rule C:\Users\Public\ineng\snkc.exe upx C:\Users\Public\ineng\snkc.exe upx behavioral2/memory/1020-145-0x0000000000400000-0x000000000042B000-memory.dmp upx C:\Users\Public\Pictures\Vrice\vqytap\libeay32.dll upx C:\Users\Public\Pictures\Vrice\vqytap\libeay32.dll upx behavioral2/memory/3940-164-0x0000000010000000-0x00000000101A6000-memory.dmp upx -
Drops startup file 2 IoCs
Processes:
snkc.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Wisle_Updatat.lnk snkc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\Wisle_Updatat.lnk snkc.exe -
Loads dropped DLL 3 IoCs
Processes:
blqxgc.exepid process 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
blqxgc.exedescription ioc process File opened (read-only) \??\P: blqxgc.exe File opened (read-only) \??\S: blqxgc.exe File opened (read-only) \??\W: blqxgc.exe File opened (read-only) \??\I: blqxgc.exe File opened (read-only) \??\J: blqxgc.exe File opened (read-only) \??\N: blqxgc.exe File opened (read-only) \??\M: blqxgc.exe File opened (read-only) \??\O: blqxgc.exe File opened (read-only) \??\Q: blqxgc.exe File opened (read-only) \??\X: blqxgc.exe File opened (read-only) \??\Y: blqxgc.exe File opened (read-only) \??\B: blqxgc.exe File opened (read-only) \??\F: blqxgc.exe File opened (read-only) \??\H: blqxgc.exe File opened (read-only) \??\Z: blqxgc.exe File opened (read-only) \??\E: blqxgc.exe File opened (read-only) \??\K: blqxgc.exe File opened (read-only) \??\U: blqxgc.exe File opened (read-only) \??\T: blqxgc.exe File opened (read-only) \??\V: blqxgc.exe File opened (read-only) \??\G: blqxgc.exe File opened (read-only) \??\L: blqxgc.exe File opened (read-only) \??\R: blqxgc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
blqxgc.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 blqxgc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz blqxgc.exe -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 51 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Music" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\Mode = "4" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7c0031000000000061559a4311005075626c69630000660009000400efbe874fdb4961559a432e000000f80500000000010000000000000000003c0000000000b10eab005000750062006c0069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003600000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 780031000000000061559a4311004d7573696300640009000400efbe874fdb4961559a432e000000fd0500000000010000000000000000003a000000000031d290004d007500730069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380030003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\LogicalViewMode = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\FFlags = "1092616209" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\IconSize = "16" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\GroupByDirection = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\Rev = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\GroupView = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a00000002e37a3569cced2119f0e006097c686f60700000028000000e0859ff2f94f6810ab9108002b27b3d902000000a00000002e37a3569cced2119f0e006097c686f602000000780000002e37a3569cced2119f0e006097c686f60400000088000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\FFlags = "1092616193" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 540031000000000061559a4310006c687268626500003e0009000400efbe61559a4361559a432e000000d4e5010000000200000000000000000000000000000031d290006c0068007200680062006500000016000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{94D6DDCC-4A68-4175-A374-BD584A510B78}\GroupByKey:PID = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000000c55ec981100557365727300640009000400efbe874f774861559a432e000000c70500000000010000000000000000003a000000000012201b0155007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
explorer.exepid process 3300 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
i.exeblqxgc.exepid process 4804 i.exe 4804 i.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe 3940 blqxgc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
blqxgc.exedescription pid process Token: 33 3940 blqxgc.exe Token: SeIncBasePriorityPrivilege 3940 blqxgc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
i.exepid process 4804 i.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
explorer.exeblqxgc.exepid process 3300 explorer.exe 3300 explorer.exe 3940 blqxgc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
i.exeexplorer.exedescription pid process target process PID 4804 wrote to memory of 2756 4804 i.exe explorer.exe PID 4804 wrote to memory of 2756 4804 i.exe explorer.exe PID 3300 wrote to memory of 1020 3300 explorer.exe snkc.exe PID 3300 wrote to memory of 1020 3300 explorer.exe snkc.exe PID 3300 wrote to memory of 1020 3300 explorer.exe snkc.exe PID 3300 wrote to memory of 3940 3300 explorer.exe blqxgc.exe PID 3300 wrote to memory of 3940 3300 explorer.exe blqxgc.exe PID 3300 wrote to memory of 3940 3300 explorer.exe blqxgc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\i.exe"C:\Users\Admin\AppData\Local\Temp\i.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" C:\Users\Public\Music\lhrhbe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\ineng\snkc.exe"C:\Users\Public\ineng\snkc.exe" C:\Users\Public\ineng\fac.zip -d C:\Users\Admin\AppData\Roaming2⤵
- Executes dropped EXE
- Drops startup file
-
C:\Users\Public\Pictures\Vrice\vqytap\blqxgc.exe"C:\Users\Public\Pictures\Vrice\vqytap\blqxgc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SHELL.TXTFilesize
1.2MB
MD56c31255e56b22ff932555778af8798d7
SHA14cd2c651c1bb4d8bf861d6acf379c8f6e7a25b8a
SHA2569bb3e1d29f1527268455a26c640fd09bca608b2bc1559dc9deda94aa2221abcd
SHA5129880a646ae7db6b395a0605f15daaab1f9c7d890167e68b395981f4feefb4c9d824f943fa0b7b692a89622920a034386e4a1540d7c2220db29f00e7f2ca61b4f
-
C:\Users\Public\Music\lhrhbe\akrusq.lnkFilesize
1KB
MD5cb182a9ef681251f067937aa372f0a4d
SHA16aef9fd724115378aa1f76ecdb9b131dec91ae45
SHA2564323bed971efb532829e4381146a4fe57dabca6a15a38f871a9d6eb1ae98e9a4
SHA51237ab7c7ea06e52df6382c23e7b5ffebf60b2f7a8c54c84b2d7df8289fd78ce30bcb2a26d08c1fa78a70ac1c612a1f43d613516e9cf79217ae397856b3950966b
-
C:\Users\Public\Music\lhrhbe\cmgdhpu.urlFilesize
136B
MD5ac76681ba6f60fab1987bb8b3756392b
SHA13de6eb4c4d6196beef424f17daba5d8d37d6bd34
SHA256f55901048ccf7a9ca4311503607d0f535d2e5ad3011afaecc52a242915df3039
SHA512706c600635cf8235315fdbda1dec57d5d23a867cc06838a7d8ecc7d421c3eb8b6d24e22809960a6b162b063c7a9d92d9017596475768cb0124cd7e108b94a40d
-
C:\Users\Public\Music\lhrhbe\cnwfvry.urlFilesize
136B
MD5ac76681ba6f60fab1987bb8b3756392b
SHA13de6eb4c4d6196beef424f17daba5d8d37d6bd34
SHA256f55901048ccf7a9ca4311503607d0f535d2e5ad3011afaecc52a242915df3039
SHA512706c600635cf8235315fdbda1dec57d5d23a867cc06838a7d8ecc7d421c3eb8b6d24e22809960a6b162b063c7a9d92d9017596475768cb0124cd7e108b94a40d
-
C:\Users\Public\Music\lhrhbe\gvdltp.lnkFilesize
1KB
MD51f0ebe29809688099e9cd0795783026c
SHA17f3f46a663092117ea6030b76384477dfea50623
SHA2566050f6a23967f66b06a1c055f97bfa9e3986024771251234e5f57684c0ff8245
SHA5121347f8b8f393cb88e382c66e697c5d976f0765ba95802d3e3c22cff822655e6a6203d2c416745f96ee2582af0ad6ab72b70aaa1543af3718165ddee9807ad65c
-
C:\Users\Public\Music\lhrhbe\ioaypo.lnkFilesize
1KB
MD52df938db6bb42d2ed882f3979729452c
SHA1448a7175d5488ef65020af089c689a8261e6581f
SHA2567c27b7587b54d5995e6c866a99bc13def47f75ba5ba736b35a8b9712e713f848
SHA51222bfe49da9c7b0c82b06ae04f3535b95549766c8e98d5d0cf1acb95b8eef7bced36f9f0416ebba3ffbe0c255919269b0cda277abc41d43c887a0795f4702d93f
-
C:\Users\Public\Music\lhrhbe\mnvrpc.lnkFilesize
1KB
MD5a0e1776f0b16c5a574c79fe5f1a7973b
SHA13081ecb803ff15776cc3be95d890a9cd4c090280
SHA2569661093824ebc5f07cd6a707c9fecf2e69760b637850a6f0df882a787d420f0c
SHA51212122b74bb489f3f229124b5a494a4852030a866824b0363384dfde4c3552423f2787cfa7987734ca7965f6eb555b1859700246fac44c07db4780b06e459f8a0
-
C:\Users\Public\Music\lhrhbe\oofyglu.urlFilesize
136B
MD5ac76681ba6f60fab1987bb8b3756392b
SHA13de6eb4c4d6196beef424f17daba5d8d37d6bd34
SHA256f55901048ccf7a9ca4311503607d0f535d2e5ad3011afaecc52a242915df3039
SHA512706c600635cf8235315fdbda1dec57d5d23a867cc06838a7d8ecc7d421c3eb8b6d24e22809960a6b162b063c7a9d92d9017596475768cb0124cd7e108b94a40d
-
C:\Users\Public\Music\lhrhbe\qbekbn.lnkFilesize
1KB
MD59a4916a6da214d1ac11319ffa16b6523
SHA17497774c036fe4a35988185b5a575ce89c66a645
SHA2569dbad69e513ff0b28712962668193216e7e69bc560f8da3f4823409cac5007ab
SHA5126e578543a67ae733ae28696b582ac5ba161ae22d548f65fd1218e241acdfcbbcf0d0242ebf1499f8a5296f6c90818acb4d3bc69ed61233fcf77878f67cec83a2
-
C:\Users\Public\Music\lhrhbe\qbygybv.urlFilesize
136B
MD5ac76681ba6f60fab1987bb8b3756392b
SHA13de6eb4c4d6196beef424f17daba5d8d37d6bd34
SHA256f55901048ccf7a9ca4311503607d0f535d2e5ad3011afaecc52a242915df3039
SHA512706c600635cf8235315fdbda1dec57d5d23a867cc06838a7d8ecc7d421c3eb8b6d24e22809960a6b162b063c7a9d92d9017596475768cb0124cd7e108b94a40d
-
C:\Users\Public\Music\lhrhbe\tfrgpa.lnkFilesize
1KB
MD55b93c3e80c3d49c5ec25b2c5cda4916a
SHA13856841824ce38d8be350a050606b973d3188750
SHA25663a1eaeb327a6d3bf0c179a4de79af16033246b37e519505ff2ceaed44a7a3e6
SHA512ae5023a11232d96bab74b39bf0c7afa7306bc6d601f6a1a97e9ac2036ab2eecf4ebf4f41cdbfd3325b9bbe6faebb53ae393c89ee38b50608ba6f3b45a713e413
-
C:\Users\Public\Music\lhrhbe\vdxkprv.urlFilesize
136B
MD5ac76681ba6f60fab1987bb8b3756392b
SHA13de6eb4c4d6196beef424f17daba5d8d37d6bd34
SHA256f55901048ccf7a9ca4311503607d0f535d2e5ad3011afaecc52a242915df3039
SHA512706c600635cf8235315fdbda1dec57d5d23a867cc06838a7d8ecc7d421c3eb8b6d24e22809960a6b162b063c7a9d92d9017596475768cb0124cd7e108b94a40d
-
C:\Users\Public\Music\lhrhbe\yhdbqgb.urlFilesize
136B
MD5ac76681ba6f60fab1987bb8b3756392b
SHA13de6eb4c4d6196beef424f17daba5d8d37d6bd34
SHA256f55901048ccf7a9ca4311503607d0f535d2e5ad3011afaecc52a242915df3039
SHA512706c600635cf8235315fdbda1dec57d5d23a867cc06838a7d8ecc7d421c3eb8b6d24e22809960a6b162b063c7a9d92d9017596475768cb0124cd7e108b94a40d
-
C:\Users\Public\Pictures\Vrice\vqytap\blqxgc.exeFilesize
340KB
MD583020e8c25dd7d078733fe74c80d9b46
SHA157aa17d77a4912ed48b086cc86e78ffde7646aaa
SHA25633b1ff750a50970f7646806c41e444ce956566691efe735b2ff541c429c2b2d6
SHA5128b958749c6504874109adda9eb7bcc077e68474abd5fb2914aa1dd1212cf3e4c79c678aee7f23ef99a608fdd24fb39e12e57881db8708935a78999c999a70faa
-
C:\Users\Public\Pictures\Vrice\vqytap\blqxgc.exeFilesize
340KB
MD583020e8c25dd7d078733fe74c80d9b46
SHA157aa17d77a4912ed48b086cc86e78ffde7646aaa
SHA25633b1ff750a50970f7646806c41e444ce956566691efe735b2ff541c429c2b2d6
SHA5128b958749c6504874109adda9eb7bcc077e68474abd5fb2914aa1dd1212cf3e4c79c678aee7f23ef99a608fdd24fb39e12e57881db8708935a78999c999a70faa
-
C:\Users\Public\Pictures\Vrice\vqytap\libeay32.dllFilesize
690KB
MD5f23fb8f6ad1a64c2723bbe997c431ad5
SHA105a3a84f71245bc12d8d6e43d3dab86dbe4f3a2e
SHA25647900ae4431426ae1ea6b4010c8e5f683c62fc001b76a887ac035d69634fbe5a
SHA51282afbb1f19e55e8d7dbd4db652e41a80eefdff21e59a94a62c7f0d289adae32153000f6c87e2b6b655e68b93bed49af4d71f4018b433c41b81765250b52838f4
-
C:\Users\Public\Pictures\Vrice\vqytap\libeay32.dllFilesize
690KB
MD5f23fb8f6ad1a64c2723bbe997c431ad5
SHA105a3a84f71245bc12d8d6e43d3dab86dbe4f3a2e
SHA25647900ae4431426ae1ea6b4010c8e5f683c62fc001b76a887ac035d69634fbe5a
SHA51282afbb1f19e55e8d7dbd4db652e41a80eefdff21e59a94a62c7f0d289adae32153000f6c87e2b6b655e68b93bed49af4d71f4018b433c41b81765250b52838f4
-
C:\Users\Public\Pictures\Vrice\vqytap\ssleay32.dllFilesize
425KB
MD568e32ca1d7031ff1bfeaef5080a7806c
SHA18b43f487401145e188b9ee4bfdcfd263f0c50a5f
SHA256702c06cd8b4d10340ce1e5064183c28146cea864a606db416e29c2edd38c2d63
SHA512a13c33c0a25faf54816436585c3250f50df1c685495ef1ae51417fc4489e9d527e30ad03c4f2b4f3d17cdbb1abd1c820b154faa55705e588921d8fb392a033ae
-
C:\Users\Public\Pictures\Vrice\vqytap\ssleay32.dllFilesize
425KB
MD568e32ca1d7031ff1bfeaef5080a7806c
SHA18b43f487401145e188b9ee4bfdcfd263f0c50a5f
SHA256702c06cd8b4d10340ce1e5064183c28146cea864a606db416e29c2edd38c2d63
SHA512a13c33c0a25faf54816436585c3250f50df1c685495ef1ae51417fc4489e9d527e30ad03c4f2b4f3d17cdbb1abd1c820b154faa55705e588921d8fb392a033ae
-
C:\Users\Public\Pictures\Vrice\vqytap\wc.xmlFilesize
136KB
MD51059e69d1c7ac07ba7cb078772b58857
SHA11a18272e515c8ab533dc496fd14c14bdf1241e9c
SHA25637f88d448e084378dca4a5e6223c17dae389607c062c51903f7e132d4e65b4fe
SHA51210220d3ec431acdc416073bb9ac4e5a6aac54323071787dd3bf1dd83c3771af1bc095b665b246cd0c3db10f5a2c2e70a34953e750b6c74efd9caf27ed7489c77
-
C:\Users\Public\Pictures\Vrice\vqytap\zlib1.dllFilesize
98KB
MD5d90dad5eea33a178bac56fff2847d4c2
SHA1cbbce727fd8447487c7fc68051b24df17d043649
SHA256104162a59e7784e1fe2ec0b7db8836e1eb905abfd1602a05d86debe930b40cbf
SHA5128dbe57e32554d049a0779c40645dfbad2eaa1eeaf746898cd44f8686265f1fd4f84d6f857ba40644294d817d5c5eab6ba6271df55c56047fd16c10b8478184eb
-
C:\Users\Public\Pictures\Vrice\vqytap\zlib1.dllFilesize
98KB
MD5d90dad5eea33a178bac56fff2847d4c2
SHA1cbbce727fd8447487c7fc68051b24df17d043649
SHA256104162a59e7784e1fe2ec0b7db8836e1eb905abfd1602a05d86debe930b40cbf
SHA5128dbe57e32554d049a0779c40645dfbad2eaa1eeaf746898cd44f8686265f1fd4f84d6f857ba40644294d817d5c5eab6ba6271df55c56047fd16c10b8478184eb
-
C:\Users\Public\ineng\fac.zipFilesize
1KB
MD5ecefe248fc6060abeabb1284c97ed387
SHA18b97a1ecbe3ec02dd8ff1bac361aa175d4a3ba01
SHA256dbc9fb5b23d6a888a5f94bbd427eba461c3f9185638bb7100eb018ef1ce4d5bd
SHA512765fe11209c8555515ad6e0b9d54816a7383d0e65d61d91d95603191ca8a0efcc8d0bb86df754bc920538bf097656c44ba1c33b6b2b3e7ee3a01710f626f26fc
-
C:\Users\Public\ineng\snkc.exeFilesize
40KB
MD5d3ed82f676591a9c47037a7b66908832
SHA149533ea0b019b76131c14936814f99b9794d506b
SHA2560ef64a90dad0929f282fa1425422b2ffd70bf2ac803371fe3c780afefad66455
SHA512c79e09b8f47200acec33042cf183ead8cb3f7f87380e2ee4b3a2d6a05d96305277dea13974714d3e8ff8dd7c4733a2e4e93e137408de66ef60b6ec6f3e862986
-
C:\Users\Public\ineng\snkc.exeFilesize
40KB
MD5d3ed82f676591a9c47037a7b66908832
SHA149533ea0b019b76131c14936814f99b9794d506b
SHA2560ef64a90dad0929f282fa1425422b2ffd70bf2ac803371fe3c780afefad66455
SHA512c79e09b8f47200acec33042cf183ead8cb3f7f87380e2ee4b3a2d6a05d96305277dea13974714d3e8ff8dd7c4733a2e4e93e137408de66ef60b6ec6f3e862986
-
memory/1020-142-0x0000000000000000-mapping.dmp
-
memory/1020-145-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2756-132-0x0000000000000000-mapping.dmp
-
memory/3940-153-0x0000000000000000-mapping.dmp
-
memory/3940-163-0x00000000038E0000-0x0000000003A85000-memory.dmpFilesize
1.6MB
-
memory/3940-164-0x0000000010000000-0x00000000101A6000-memory.dmpFilesize
1.6MB
-
memory/3940-165-0x0000000000760000-0x0000000000783000-memory.dmpFilesize
140KB
-
memory/3940-166-0x00000000037A0000-0x00000000038D8000-memory.dmpFilesize
1.2MB
-
memory/3940-167-0x00000000038E0000-0x0000000003A85000-memory.dmpFilesize
1.6MB
-
memory/3940-168-0x00000000038E0000-0x0000000003A85000-memory.dmpFilesize
1.6MB
-
memory/4804-140-0x0000000005DA0000-0x0000000005E32000-memory.dmpFilesize
584KB
-
memory/4804-139-0x0000000006430000-0x00000000069D4000-memory.dmpFilesize
5.6MB