Analysis
-
max time kernel
129s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe
Resource
win10v2004-20220812-en
General
-
Target
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe
-
Size
490KB
-
MD5
1cadb5225ab18c0ef03ae571b1784087
-
SHA1
40a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
-
SHA256
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
-
SHA512
c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
SSDEEP
12288:4JjWl4tbn/0/n3vC8EOVg7d6UBsOjX0hmLXBconfaps6IOElix90g:siGtT/0/vC8EOVgB6UKOjkhsxconfcbX
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 3 IoCs
Processes:
appinit.exeappinit.exeappinit.exepid process 2040 appinit.exe 1440 appinit.exe 1684 appinit.exe -
Processes:
resource yara_rule behavioral1/memory/1160-142-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1160-145-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1160-148-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1160-151-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1160-153-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1160-155-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1160-154-0x0000000001610000-0x0000000001720000-memory.dmp upx -
Loads dropped DLL 9 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeappinit.exepid process 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 2040 appinit.exe 2040 appinit.exe 2040 appinit.exe 2040 appinit.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
appinit.exeexplorer.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run appinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" appinit.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" appinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run appinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" explorer.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeappinit.exeappinit.exeappinit.exedescription pid process target process PID 1716 set thread context of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 set thread context of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 2040 set thread context of 1440 2040 appinit.exe appinit.exe PID 1440 set thread context of 1684 1440 appinit.exe appinit.exe PID 1684 set thread context of 1160 1684 appinit.exe explorer.exe -
Drops file in Windows directory 5 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeappinit.exedescription ioc process File opened for modification C:\Windows\{90783-8547-9081-90}\appinit.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe File created C:\Windows\{90783-8547-9081-90}\appinit.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe File opened for modification C:\Windows\{90783-8547-9081-90}\ 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe File opened for modification C:\Windows\{90783-8547-9081-90}\appinit.exe appinit.exe File opened for modification C:\Windows\{90783-8547-9081-90}\ appinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
Processes:
resource yara_rule \Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 \Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
explorer.exepid process 1160 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeexplorer.exepid process 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 1160 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exedescription pid process target process PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1716 wrote to memory of 544 1716 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 544 wrote to memory of 1756 544 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 1756 wrote to memory of 1800 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1800 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1800 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1800 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1852 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1852 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1852 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1852 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1816 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1816 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1816 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1816 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 984 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 984 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 984 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 984 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1604 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1604 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1604 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1604 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1364 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1364 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1364 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1364 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1532 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1532 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1532 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1532 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1268 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1268 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1268 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1268 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 372 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 372 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 372 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 372 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 692 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 692 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 692 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 692 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 1756 wrote to memory of 1932 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe PID 1756 wrote to memory of 1932 1756 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\{90783-8547-9081-90}\appinit.exe"C:\Windows\{90783-8547-9081-90}\appinit.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\{90783-8547-9081-90}\appinit.exe"C:\Windows\{90783-8547-9081-90}\appinit.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\{90783-8547-9081-90}\appinit.exe"C:\Windows\{90783-8547-9081-90}\appinit.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe7⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Qenubeq.mupFilesize
407KB
MD56ab85a46773fb0391221c0fcb3baac48
SHA162d8a1464178229bfac86723337f64ff21c53260
SHA256afc3f0da9c05b38e381bca955f563f1b580ecfb712412049648614ea53a3917e
SHA512961cdb5a1a49da9dbf32cc92413fdb864703c67a0eb6773153f794aeabdd54d6e2705eae9804f4d0d895ce646041e36842c2baa28780187bd38c445915beeef6
-
C:\Users\Admin\AppData\Local\Temp\Qenubeq.mupFilesize
407KB
MD56ab85a46773fb0391221c0fcb3baac48
SHA162d8a1464178229bfac86723337f64ff21c53260
SHA256afc3f0da9c05b38e381bca955f563f1b580ecfb712412049648614ea53a3917e
SHA512961cdb5a1a49da9dbf32cc92413fdb864703c67a0eb6773153f794aeabdd54d6e2705eae9804f4d0d895ce646041e36842c2baa28780187bd38c445915beeef6
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\G5lZfyWn78ljg6\G5lZfyWn78ljg6.datFilesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\G5lZfyWn78ljg6\G5lZfyWn78ljg6.nfoFilesize
3KB
MD5f7fae5c69b6ae78f297542f1c1405dcf
SHA1e275446b5bff321022e3833f67f63d1d0cca3883
SHA256c13949237267afdf33459d743748646af80dd77f291f0a0644b9edb7953a0d94
SHA512953f4f55494e58273a0d371db6cfcc10a18e9374d411eb8ae5e469c7a80bf706940ad1569a475a8c52d5e43ab7127c2206831d7aec97f6a3bc8defa67e8c65f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\G5lZfyWn78ljg6\G5lZfyWn78ljg6.nfoFilesize
3KB
MD5f7fae5c69b6ae78f297542f1c1405dcf
SHA1e275446b5bff321022e3833f67f63d1d0cca3883
SHA256c13949237267afdf33459d743748646af80dd77f291f0a0644b9edb7953a0d94
SHA512953f4f55494e58273a0d371db6cfcc10a18e9374d411eb8ae5e469c7a80bf706940ad1569a475a8c52d5e43ab7127c2206831d7aec97f6a3bc8defa67e8c65f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\G5lZfyWn78ljg6\G5lZfyWn78ljg6.svrFilesize
358KB
MD5ad69242f4bf9548496051bd95ac05e1e
SHA1913292f6b83adf41337fd50201ad341500abc8b0
SHA2562663fdfe0fe4c37532f919282d035579bf84a895be5971982437cffbd41bdb1b
SHA51209bed3adc8427e4aeec4e32dfd0640da71d2839b62973e4bae94f0965c5836028511295d99be878af388789fc020117972c3cf51d5a2ef1899aeb9d43c2fd94e
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
\Users\Admin\AppData\Local\Temp\nsj1DC0.tmp\System.dllFilesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
\Users\Admin\AppData\Local\Temp\nsjE024.tmp\System.dllFilesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
memory/544-63-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-62-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-61-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-64-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-65-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-67-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-68-0x0000000000401686-mapping.dmp
-
memory/544-72-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/544-71-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/1160-158-0x00000000016C5000-0x000000000171E000-memory.dmpFilesize
356KB
-
memory/1160-142-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-141-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-145-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-148-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-150-0x000000000171D0D0-mapping.dmp
-
memory/1160-151-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-153-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-155-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-154-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1160-159-0x0000000001611000-0x00000000016C5000-memory.dmpFilesize
720KB
-
memory/1160-161-0x00000000016C5000-0x000000000171E000-memory.dmpFilesize
356KB
-
memory/1440-113-0x0000000000401686-mapping.dmp
-
memory/1684-139-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1684-160-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1684-133-0x0000000000408600-mapping.dmp
-
memory/1716-57-0x00000000003A0000-0x00000000003AD000-memory.dmpFilesize
52KB
-
memory/1716-60-0x00000000003A0000-0x00000000003AD000-memory.dmpFilesize
52KB
-
memory/1716-77-0x00000000003A0000-0x00000000003AD000-memory.dmpFilesize
52KB
-
memory/1716-54-0x00000000765B1000-0x00000000765B3000-memory.dmpFilesize
8KB
-
memory/1756-89-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-85-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-82-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-93-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-92-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-91-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-105-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-88-0x0000000000408600-mapping.dmp
-
memory/1756-87-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-81-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-83-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-84-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-79-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1756-78-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2040-122-0x00000000005F0000-0x00000000005FD000-memory.dmpFilesize
52KB
-
memory/2040-95-0x0000000000000000-mapping.dmp
-
memory/2040-104-0x00000000005F0000-0x00000000005FD000-memory.dmpFilesize
52KB
-
memory/2040-101-0x00000000005F0000-0x00000000005FD000-memory.dmpFilesize
52KB