Malware Analysis Report

2025-06-16 01:04

Sample ID 221123-q4wclsff49
Target 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7
SHA256 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7
Tags
xtremerat persistence rat spyware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7

Threat Level: Known bad

The file 838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7 was found to be: Known bad.

Malicious Activity Summary

xtremerat persistence rat spyware

XtremeRAT

Detect XtremeRAT payload

Modifies Installed Components in the registry

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Windows directory

Enumerates physical storage devices

Program crash

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Checks processor information in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-23 13:49

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-23 13:49

Reported

2022-11-23 14:53

Platform

win7-20220812-en

Max time kernel

150s

Max time network

189s

Command Line

"C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe"

Signatures

Detect XtremeRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

XtremeRAT

persistence spyware rat xtremerat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\svchost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 948 set thread context of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File opened for modification C:\Windows\InstallDir\ C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1952 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 948 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 1164 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe

"C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe"

C:\Users\Admin\AppData\Local\Temp\fumic.exe

"C:\Users\Admin\AppData\Local\Temp\fumic.exe"

C:\Users\Admin\AppData\Local\Temp\fumic.EXE

"C:\Users\Admin\AppData\Local\Temp\fumic.EXE"

C:\Windows\SysWOW64\svchost.exe

svchost.exe

C:\Windows\SysWOW64\explorer.exe

explorer.exe

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp

Files

memory/1952-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/948-60-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

C:\Users\Admin\AppData\Local\Temp\fumic.EXE

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/1164-67-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-68-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-70-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-74-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-72-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-73-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-71-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-76-0x0000000010000000-0x0000000010097000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/1164-77-0x000000001000D0F4-mapping.dmp

memory/1164-79-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-81-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-83-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1164-84-0x0000000010000000-0x0000000010097000-memory.dmp

memory/888-87-0x0000000000000000-mapping.dmp

memory/892-91-0x0000000000000000-mapping.dmp

memory/1036-93-0x0000000000000000-mapping.dmp

memory/1164-94-0x0000000010000000-0x0000000010097000-memory.dmp

memory/892-96-0x00000000749D1000-0x00000000749D3000-memory.dmp

memory/888-97-0x0000000010000000-0x0000000010097000-memory.dmp

memory/892-98-0x0000000010000000-0x0000000010097000-memory.dmp

C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf

MD5 23bbd7c3a81207672ed44de64c7a3289
SHA1 a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256 d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA512 4e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4

C:\Windows\InstallDir\svchost.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/888-101-0x0000000010000000-0x0000000010097000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-11-23 13:49

Reported

2022-11-23 14:53

Platform

win10v2004-20220812-en

Max time kernel

150s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe"

Signatures

Detect XtremeRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

XtremeRAT

persistence spyware rat xtremerat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" C:\Windows\SysWOW64\explorer.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run C:\Windows\SysWOW64\explorer.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" C:\Windows\SysWOW64\explorer.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1192 set thread context of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\InstallDir\ C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A
File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A
File opened for modification C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A
File created C:\Windows\InstallDir\svchost.exe C:\Windows\SysWOW64\explorer.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\fumic.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2704 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 2704 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 2704 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe C:\Users\Admin\AppData\Local\Temp\fumic.exe
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 1192 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\fumic.exe C:\Users\Admin\AppData\Local\Temp\fumic.EXE
PID 64 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 64 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 64 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 64 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\svchost.exe
PID 64 wrote to memory of 1416 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 64 wrote to memory of 1416 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 64 wrote to memory of 1416 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 64 wrote to memory of 1416 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Windows\SysWOW64\explorer.exe
PID 64 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 64 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 64 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\fumic.EXE C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 4888 wrote to memory of 3700 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4888 wrote to memory of 3700 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4888 wrote to memory of 3700 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 3700 wrote to memory of 904 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

Processes

C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe

"C:\Users\Admin\AppData\Local\Temp\838f09135a6741e7dec0e91b348ce34406d0b632897f1caba00fb7eee13d09f7.exe"

C:\Users\Admin\AppData\Local\Temp\fumic.exe

"C:\Users\Admin\AppData\Local\Temp\fumic.exe"

C:\Users\Admin\AppData\Local\Temp\fumic.EXE

"C:\Users\Admin\AppData\Local\Temp\fumic.EXE"

C:\Windows\SysWOW64\svchost.exe

svchost.exe

C:\Windows\SysWOW64\explorer.exe

explorer.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1488 -ip 1488

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 516

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1488 -ip 1488

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 524

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE66B16FA859A9AC5816C146DEC7D4A7 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=300491287C4DF76C5F0866586A6289F3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=300491287C4DF76C5F0866586A6289F3 --renderer-client-id=2 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D431C991C7035AAB6B00293AAAAC703F --mojo-platform-channel-handle=1840 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3026D0E884E3A1759D79091373A9E410 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2B3BD8FD34A34478DEEA16D2EF31A9B3 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

Network

Country Destination Domain Proto
N/A 20.123.104.105:443 tcp
N/A 93.184.220.29:80 tcp
N/A 93.184.220.29:80 tcp
N/A 93.184.220.29:80 tcp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 106.89.54.20.in-addr.arpa udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 104.80.225.205:443 tcp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp
N/A 93.184.220.29:80 tcp
N/A 8.8.8.8:53 alertsdanish.bounceme.net udp

Files

C:\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/1192-132-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/64-137-0x0000000000000000-mapping.dmp

memory/64-138-0x0000000010000000-0x0000000010097000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Fumic.exe

MD5 b1415073293fa408b8c1a31bdc34fcc4
SHA1 37642c6145a1f451c88b710b8573bca7afa7ba81
SHA256 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
SHA512 b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b

memory/64-140-0x0000000010000000-0x0000000010097000-memory.dmp

memory/64-141-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1488-143-0x0000000000000000-mapping.dmp

memory/1416-144-0x0000000000000000-mapping.dmp

memory/64-146-0x0000000010000000-0x0000000010097000-memory.dmp

memory/4888-145-0x0000000000000000-mapping.dmp

memory/1416-148-0x0000000010000000-0x0000000010097000-memory.dmp

memory/64-149-0x0000000010000000-0x0000000010097000-memory.dmp

memory/1488-147-0x0000000010000000-0x0000000010097000-memory.dmp

C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf

MD5 23bbd7c3a81207672ed44de64c7a3289
SHA1 a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256 d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA512 4e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4

memory/3700-151-0x0000000000000000-mapping.dmp

memory/904-153-0x0000000000000000-mapping.dmp

memory/716-156-0x0000000000000000-mapping.dmp

memory/2868-161-0x0000000000000000-mapping.dmp

memory/1640-164-0x0000000000000000-mapping.dmp

memory/1100-167-0x0000000000000000-mapping.dmp

memory/1416-169-0x0000000010000000-0x0000000010097000-memory.dmp