Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
291KB
-
MD5
d009f95436e5463a7fa7f34777bf144d
-
SHA1
0a6b604a81c747282d8996cc6f525e2d94c894e5
-
SHA256
2232b3ddd3c6f667f5bfc9c9abb15badf9ab9c2f831036db0c6da8b1044f52b7
-
SHA512
7ea930267ca60be4aa04062462b6a072432964b4400addbc64d01dd02c20ab6697ed31302e11d6596c4988c2004be419153ac03d5f5e8f683e460693d5ce1505
-
SSDEEP
3072:gch9BIyfyCLD25S6u5Bmq9JahTQDkrtUytUUVhbizwcur:JBIMLqS6NCJomf0/F
Malware Config
Extracted
djvu
http://fresherlights.com/lancer/get.php
-
extension
.bozq
-
offline_id
oHp5e4SJxdFtxfvKYmeX06F4C5cn0EcsF5Ak9Wt1
-
payload_url
http://uaery.top/dl/build2.exe
http://fresherlights.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-dyi5UcwIT9 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0597Jhyjd
Signatures
-
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral2/memory/2136-169-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2136-172-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1716-175-0x0000000004A10000-0x0000000004B2B000-memory.dmp family_djvu behavioral2/memory/2136-174-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2136-181-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2136-192-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3536-196-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3536-198-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3536-199-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3536-227-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral2/memory/2440-133-0x0000000002D80000-0x0000000002D89000-memory.dmp family_smokeloader behavioral2/memory/3200-166-0x0000000002C70000-0x0000000002C79000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 2604 40B2.exe 3200 4269.exe 1716 4568.exe 2136 4568.exe 3868 4568.exe 3536 4568.exe 4356 build2.exe 2280 build2.exe 776 build3.exe 864 mstsca.exe 1820 E473.exe 1584 EE19.exe 520 CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe 3416 LYKAA.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4568.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation EE19.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation LYKAA.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4568.exe -
Loads dropped DLL 5 IoCs
pid Process 3692 regsvr32.exe 3692 regsvr32.exe 2280 build2.exe 2280 build2.exe 2280 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3204 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\4a3f423a-4f01-4c40-92b2-2fbeaa930a2d\\4568.exe\" --AutoStart" 4568.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.2ip.ua 31 api.2ip.ua 39 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1716 set thread context of 2136 1716 4568.exe 94 PID 3868 set thread context of 3536 3868 4568.exe 98 PID 4356 set thread context of 2280 4356 build2.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1956 2604 WerFault.exe 86 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4269.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4269.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4940 schtasks.exe 4916 schtasks.exe 768 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4336 timeout.exe 3480 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 file.exe 2440 file.exe 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2440 file.exe 2644 Process not Found 2644 Process not Found 2644 Process not Found 2644 Process not Found 3200 4269.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2604 40B2.exe Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found Token: SeDebugPrivilege 520 CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe Token: SeDebugPrivilege 3416 LYKAA.exe Token: SeShutdownPrivilege 2644 Process not Found Token: SeCreatePagefilePrivilege 2644 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2604 2644 Process not Found 86 PID 2644 wrote to memory of 2604 2644 Process not Found 86 PID 2644 wrote to memory of 2604 2644 Process not Found 86 PID 2644 wrote to memory of 3200 2644 Process not Found 87 PID 2644 wrote to memory of 3200 2644 Process not Found 87 PID 2644 wrote to memory of 3200 2644 Process not Found 87 PID 2644 wrote to memory of 4548 2644 Process not Found 88 PID 2644 wrote to memory of 4548 2644 Process not Found 88 PID 2644 wrote to memory of 1716 2644 Process not Found 91 PID 2644 wrote to memory of 1716 2644 Process not Found 91 PID 2644 wrote to memory of 1716 2644 Process not Found 91 PID 4548 wrote to memory of 3692 4548 regsvr32.exe 89 PID 4548 wrote to memory of 3692 4548 regsvr32.exe 89 PID 4548 wrote to memory of 3692 4548 regsvr32.exe 89 PID 2644 wrote to memory of 3940 2644 Process not Found 90 PID 2644 wrote to memory of 3940 2644 Process not Found 90 PID 2644 wrote to memory of 3940 2644 Process not Found 90 PID 2644 wrote to memory of 3940 2644 Process not Found 90 PID 2644 wrote to memory of 1056 2644 Process not Found 92 PID 2644 wrote to memory of 1056 2644 Process not Found 92 PID 2644 wrote to memory of 1056 2644 Process not Found 92 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 1716 wrote to memory of 2136 1716 4568.exe 94 PID 2136 wrote to memory of 3204 2136 4568.exe 95 PID 2136 wrote to memory of 3204 2136 4568.exe 95 PID 2136 wrote to memory of 3204 2136 4568.exe 95 PID 2136 wrote to memory of 3868 2136 4568.exe 96 PID 2136 wrote to memory of 3868 2136 4568.exe 96 PID 2136 wrote to memory of 3868 2136 4568.exe 96 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3868 wrote to memory of 3536 3868 4568.exe 98 PID 3536 wrote to memory of 4356 3536 4568.exe 101 PID 3536 wrote to memory of 4356 3536 4568.exe 101 PID 3536 wrote to memory of 4356 3536 4568.exe 101 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 4356 wrote to memory of 2280 4356 build2.exe 103 PID 3536 wrote to memory of 776 3536 4568.exe 104 PID 3536 wrote to memory of 776 3536 4568.exe 104 PID 3536 wrote to memory of 776 3536 4568.exe 104 PID 776 wrote to memory of 4916 776 build3.exe 105 PID 776 wrote to memory of 4916 776 build3.exe 105 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2440
-
C:\Users\Admin\AppData\Local\Temp\40B2.exeC:\Users\Admin\AppData\Local\Temp\40B2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 12602⤵
- Program crash
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\4269.exeC:\Users\Admin\AppData\Local\Temp\4269.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3200
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\443F.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\443F.dll2⤵
- Loads dropped DLL
PID:3692
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3940
-
C:\Users\Admin\AppData\Local\Temp\4568.exeC:\Users\Admin\AppData\Local\Temp\4568.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\4568.exeC:\Users\Admin\AppData\Local\Temp\4568.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\4a3f423a-4f01-4c40-92b2-2fbeaa930a2d" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\4568.exe"C:\Users\Admin\AppData\Local\Temp\4568.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\4568.exe"C:\Users\Admin\AppData\Local\Temp\4568.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build2.exe"C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build2.exe"C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build2.exe" & exit7⤵PID:892
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:3480
-
-
-
-
-
C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build3.exe"C:\Users\Admin\AppData\Local\351deafd-e937-4472-8d71-f18234d26808\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:4916
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2604 -ip 26041⤵PID:4028
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\E473.exeC:\Users\Admin\AppData\Local\Temp\E473.exe1⤵
- Executes dropped EXE
PID:1820
-
C:\Users\Admin\AppData\Local\Temp\EE19.exeC:\Users\Admin\AppData\Local\Temp\EE19.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:1584 -
C:\Users\Admin\AppData\Roaming\CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe"C:\Users\Admin\AppData\Roaming\CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:520 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF5E4.tmp.bat""3⤵PID:4976
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:4336
-
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"5⤵PID:3340
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"6⤵
- Creates scheduled task(s)
PID:4940
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5b71f097937ef3e6a757cda055babb005
SHA13fb167b8608824592d1707614cce46cfc643dd44
SHA256917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482
SHA512d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa
-
Filesize
837KB
MD5b71f097937ef3e6a757cda055babb005
SHA13fb167b8608824592d1707614cce46cfc643dd44
SHA256917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482
SHA512d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5bf72e427cb37a9eea765a22bd913f4a9
SHA165472f30a9b5e73ab656b220200c08d80aa102f5
SHA2560bb3634c75731c7e50568ec1b894ce832b3a3b42990909c2bb6230c34756b1cc
SHA512681d5f0ef428c2dcb175ac1f4f1c6f944401fbee2eb5932973e47ab05f9a9c55fbbfa8dd6a57ec623cc6c759a743f4c532195eaf9561e6b1e536e7181bf9d140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD538bc9052d67fb7ff388671b512e76cb2
SHA1097e30ab48d6130317a71cd53bd998c662d79171
SHA256427acbd4b71e76709af64c7e94e63649ef51518d632afa3d24f06e5aebf95b9b
SHA512a440c0983bbd454d421458d3203688b119bd56d7942fb6839868e183dcf9a838516aaa05295bf818149c39ce65509297ff8608241f62f82f289c35b17cc2043e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5260e3f9e775347ab7b7e813d4fae021e
SHA1044e759d8379118d2a22f9b7620e20925a5b7c3a
SHA25621af55af62f357e2d9c38b055276acd92bb170ac4b2927946c0e12bea6d1454f
SHA512374ba6a0da884c775a545e3142a4d069231fd047ce3b0857c0569a500c6ae0d3849f6edef3a9e820c79798e4c7dda5289fe4b0af3b7eab391bbdbd9933bdecaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD53294243c01d6ad2b0b6dd748449e1fd0
SHA196c435ade47fa4804009da670a6b28402054f1b4
SHA256d0f9443d2b800d83bd403fb75708302cf5941e8a66112cd255e36914bd01cd18
SHA5129883b561438551ff8795aefba1e642400dc616f1f75dd3eb0e89e47a833bd72d42c5cc0acfc6a6b08b9ae59988c51137fb33be9c991098e3f90550233c180031
-
Filesize
323KB
MD5efcd4db108fc262b0fba4f82692bfdf1
SHA15cc11f23b251c802e2e5497cc40d5702853e4f16
SHA2561aacaadce5954ff321f06df9cf1785902ef0b1806599b8b0aa477ae211ff2976
SHA5126c6cfe51f2686d26477934efe52a861c5a7bbd1baa4edac087c49058bca51d43b5be1214e22761ae63e98cd3e78c8aef51571835ac8e009cdc70c56439f2d15e
-
Filesize
323KB
MD5efcd4db108fc262b0fba4f82692bfdf1
SHA15cc11f23b251c802e2e5497cc40d5702853e4f16
SHA2561aacaadce5954ff321f06df9cf1785902ef0b1806599b8b0aa477ae211ff2976
SHA5126c6cfe51f2686d26477934efe52a861c5a7bbd1baa4edac087c49058bca51d43b5be1214e22761ae63e98cd3e78c8aef51571835ac8e009cdc70c56439f2d15e
-
Filesize
323KB
MD5efcd4db108fc262b0fba4f82692bfdf1
SHA15cc11f23b251c802e2e5497cc40d5702853e4f16
SHA2561aacaadce5954ff321f06df9cf1785902ef0b1806599b8b0aa477ae211ff2976
SHA5126c6cfe51f2686d26477934efe52a861c5a7bbd1baa4edac087c49058bca51d43b5be1214e22761ae63e98cd3e78c8aef51571835ac8e009cdc70c56439f2d15e
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
790KB
MD5afc84a8b4609d2df281fb3490e109bbd
SHA160e14e134728ddb00e519ce1097ee3abdee95459
SHA256428fdf094c58f6dd9eda7f6efafaddcb43b482940bdca405db4b62e3a65c3c95
SHA51211c43645a8f7bd215dd5bcc76286aec7a309d030c83f33ab9903f734535fc376b01f545d05966a7e02c0e9ba4e962c573ad7c2320e03b2aa5adcbacf4136918a
-
Filesize
403KB
MD520fc27e56aeb4d8031e8952f5c367565
SHA123d1e5f43cf5ffcc1b23bdc0dbc82e2ca2c82f8d
SHA25674529df015f3ac14d2a4f9744c8945bdb3998707ac66f47fd20fbb62ed126716
SHA512e0b6ff5ce7fcac646b03c6458a91655aea4d6850010d3501aa1e788add16b4d63b57643ec78fe91e4344d19b75ba63cc7995ef0dfdc2b6b3a62dba181f0f7348
-
Filesize
403KB
MD520fc27e56aeb4d8031e8952f5c367565
SHA123d1e5f43cf5ffcc1b23bdc0dbc82e2ca2c82f8d
SHA25674529df015f3ac14d2a4f9744c8945bdb3998707ac66f47fd20fbb62ed126716
SHA512e0b6ff5ce7fcac646b03c6458a91655aea4d6850010d3501aa1e788add16b4d63b57643ec78fe91e4344d19b75ba63cc7995ef0dfdc2b6b3a62dba181f0f7348
-
Filesize
292KB
MD56b2417eeac6a435ce8ef52ec4b98082b
SHA146a459c36a345038af6cf8ebf2d9bfa4db1a8df0
SHA2569804e56a73b0af43b7b519da92467c63365bf8cdd27090e2b0641616b9992632
SHA51246a395a047075979cc36b3415750c9a837a3975d8b2ddaa86c0c870687e93427a91fcb9192f0caec06bf6724ee060a940272bb0dae185bf920f1fa6ab9616cb4
-
Filesize
292KB
MD56b2417eeac6a435ce8ef52ec4b98082b
SHA146a459c36a345038af6cf8ebf2d9bfa4db1a8df0
SHA2569804e56a73b0af43b7b519da92467c63365bf8cdd27090e2b0641616b9992632
SHA51246a395a047075979cc36b3415750c9a837a3975d8b2ddaa86c0c870687e93427a91fcb9192f0caec06bf6724ee060a940272bb0dae185bf920f1fa6ab9616cb4
-
Filesize
1.4MB
MD59486211add7213605486541cbfade5da
SHA1c58d5b657eae5b006b7b822519ef9611933bf084
SHA256626d94ade37f80de9fd931d58ac8a3a0a841ba4fe6063e26bc80b639db9326b7
SHA512464fcdbebd8d7aeb5931fbc0729a0deeb4d46b4ea8012e5b36909252959979c8e2911221624cfd691027dac210bb4186e7b1f44464fba7d40b8bd1fde2ab06ce
-
Filesize
1.4MB
MD59486211add7213605486541cbfade5da
SHA1c58d5b657eae5b006b7b822519ef9611933bf084
SHA256626d94ade37f80de9fd931d58ac8a3a0a841ba4fe6063e26bc80b639db9326b7
SHA512464fcdbebd8d7aeb5931fbc0729a0deeb4d46b4ea8012e5b36909252959979c8e2911221624cfd691027dac210bb4186e7b1f44464fba7d40b8bd1fde2ab06ce
-
Filesize
1.4MB
MD59486211add7213605486541cbfade5da
SHA1c58d5b657eae5b006b7b822519ef9611933bf084
SHA256626d94ade37f80de9fd931d58ac8a3a0a841ba4fe6063e26bc80b639db9326b7
SHA512464fcdbebd8d7aeb5931fbc0729a0deeb4d46b4ea8012e5b36909252959979c8e2911221624cfd691027dac210bb4186e7b1f44464fba7d40b8bd1fde2ab06ce
-
Filesize
790KB
MD5afc84a8b4609d2df281fb3490e109bbd
SHA160e14e134728ddb00e519ce1097ee3abdee95459
SHA256428fdf094c58f6dd9eda7f6efafaddcb43b482940bdca405db4b62e3a65c3c95
SHA51211c43645a8f7bd215dd5bcc76286aec7a309d030c83f33ab9903f734535fc376b01f545d05966a7e02c0e9ba4e962c573ad7c2320e03b2aa5adcbacf4136918a
-
Filesize
790KB
MD5afc84a8b4609d2df281fb3490e109bbd
SHA160e14e134728ddb00e519ce1097ee3abdee95459
SHA256428fdf094c58f6dd9eda7f6efafaddcb43b482940bdca405db4b62e3a65c3c95
SHA51211c43645a8f7bd215dd5bcc76286aec7a309d030c83f33ab9903f734535fc376b01f545d05966a7e02c0e9ba4e962c573ad7c2320e03b2aa5adcbacf4136918a
-
Filesize
790KB
MD5afc84a8b4609d2df281fb3490e109bbd
SHA160e14e134728ddb00e519ce1097ee3abdee95459
SHA256428fdf094c58f6dd9eda7f6efafaddcb43b482940bdca405db4b62e3a65c3c95
SHA51211c43645a8f7bd215dd5bcc76286aec7a309d030c83f33ab9903f734535fc376b01f545d05966a7e02c0e9ba4e962c573ad7c2320e03b2aa5adcbacf4136918a
-
Filesize
790KB
MD5afc84a8b4609d2df281fb3490e109bbd
SHA160e14e134728ddb00e519ce1097ee3abdee95459
SHA256428fdf094c58f6dd9eda7f6efafaddcb43b482940bdca405db4b62e3a65c3c95
SHA51211c43645a8f7bd215dd5bcc76286aec7a309d030c83f33ab9903f734535fc376b01f545d05966a7e02c0e9ba4e962c573ad7c2320e03b2aa5adcbacf4136918a
-
Filesize
790KB
MD5afc84a8b4609d2df281fb3490e109bbd
SHA160e14e134728ddb00e519ce1097ee3abdee95459
SHA256428fdf094c58f6dd9eda7f6efafaddcb43b482940bdca405db4b62e3a65c3c95
SHA51211c43645a8f7bd215dd5bcc76286aec7a309d030c83f33ab9903f734535fc376b01f545d05966a7e02c0e9ba4e962c573ad7c2320e03b2aa5adcbacf4136918a
-
Filesize
703KB
MD5a86dc505342b4135552551242094b5c3
SHA1b20e0d7a99e6d6332467583c2c3c3c2d3990f99c
SHA25646d20faa23b06de3f06185f97a54726e76b6fca5f06d3d905a7c6ba3a5c9efe2
SHA51285eaffe78a167bc34a22746bc033604dd1e2d91c4a878c1313a2b9a87f900b30bdd0fdb3d2d6142d7490a35ff07aec3fe0df98bd4000304e80c38a397ee59173
-
Filesize
703KB
MD5a86dc505342b4135552551242094b5c3
SHA1b20e0d7a99e6d6332467583c2c3c3c2d3990f99c
SHA25646d20faa23b06de3f06185f97a54726e76b6fca5f06d3d905a7c6ba3a5c9efe2
SHA51285eaffe78a167bc34a22746bc033604dd1e2d91c4a878c1313a2b9a87f900b30bdd0fdb3d2d6142d7490a35ff07aec3fe0df98bd4000304e80c38a397ee59173
-
Filesize
1.1MB
MD5532f80cb0ccfd2fcad21bca6044b2ff7
SHA147d26fb23e4192469fff7693922ef239cea1d5cf
SHA25644673c9ea35c6aa5fcb5481674afe921ae12a2f8f485d38c0ffc0accb0f406de
SHA512d4cc16c884f8ce0792e578ac548d2a3f1fc794bfb83276e8329877bb07067997651405625a4a39993848beea8a46308f2ca6f01ca6b3ca41e9b4c87885e7ebb8
-
Filesize
1.1MB
MD5532f80cb0ccfd2fcad21bca6044b2ff7
SHA147d26fb23e4192469fff7693922ef239cea1d5cf
SHA25644673c9ea35c6aa5fcb5481674afe921ae12a2f8f485d38c0ffc0accb0f406de
SHA512d4cc16c884f8ce0792e578ac548d2a3f1fc794bfb83276e8329877bb07067997651405625a4a39993848beea8a46308f2ca6f01ca6b3ca41e9b4c87885e7ebb8
-
Filesize
153B
MD59524996653cd85dfff1b9aac5db30d72
SHA1104b32fece0367a0d5159b5e3ace027a058d3840
SHA2569fbba2d2e28de30997e978b5988bd3daae931eaf1c6398f1d9f91ed6a51aa1b0
SHA51254dd4c21e1f10e41da6fe70e68f7d831de8ceb18be6a47cb9299a726e55d2304dd2ef3cdb4b1198ddc7260631bb3d48f113f9460985bf588ae48d7cb1b0953d1
-
Filesize
837KB
MD5b71f097937ef3e6a757cda055babb005
SHA13fb167b8608824592d1707614cce46cfc643dd44
SHA256917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482
SHA512d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa
-
Filesize
837KB
MD5b71f097937ef3e6a757cda055babb005
SHA13fb167b8608824592d1707614cce46cfc643dd44
SHA256917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482
SHA512d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a