Analysis
-
max time kernel
146s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe
Resource
win10v2004-20221111-en
General
-
Target
d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe
-
Size
405KB
-
MD5
acb6797410609685f65ce25978fbbc71
-
SHA1
79d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
-
SHA256
d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
-
SHA512
d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
SSDEEP
12288:VkqF3zfVnl6VCB+lHOWbtOBEtV1H8UTAti5:VkqF3hoAyx2Vc5
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds policy Run key to start application 2 TTPs 24 IoCs
Processes:
svchost.exeSkype.exeSkype.exeSkype.exed53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exeSkype.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Skype.exe -
Executes dropped EXE 5 IoCs
Processes:
Skype.exeSkype.exeSkype.exeSkype.exeSkype.exepid process 984 Skype.exe 1932 Skype.exe 1908 Skype.exe 1048 Skype.exe 1652 Skype.exe -
Processes:
resource yara_rule behavioral1/memory/1124-87-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1124-90-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1124-93-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1124-96-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1124-98-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1124-99-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral1/memory/1124-100-0x0000000001610000-0x0000000001720000-memory.dmp upx -
Loads dropped DLL 6 IoCs
Processes:
svchost.exed53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exepid process 1548 svchost.exe 1548 svchost.exe 1548 svchost.exe 1548 svchost.exe 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe 1548 svchost.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
Skype.exeSkype.exeSkype.exeSkype.exed53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Skype.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Skype.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Skype.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Skype.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" Skype.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\google\\Skype.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Skype.exedescription pid process target process PID 1048 set thread context of 1124 1048 Skype.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
explorer.exepid process 1124 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exepid process 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exesvchost.exedescription pid process target process PID 1544 wrote to memory of 1548 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe svchost.exe PID 1544 wrote to memory of 1548 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe svchost.exe PID 1544 wrote to memory of 1548 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe svchost.exe PID 1544 wrote to memory of 1548 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe svchost.exe PID 1544 wrote to memory of 1548 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe svchost.exe PID 1544 wrote to memory of 1720 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1720 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1720 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1720 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 524 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 524 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 524 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 524 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 572 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 572 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 572 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 572 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1280 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1280 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1280 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1280 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1476 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1476 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1476 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1476 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1112 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1112 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1112 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1112 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 676 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 676 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 676 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 676 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 700 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 700 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 700 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 700 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 948 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 948 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 948 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 948 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1488 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1488 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1488 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1488 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 640 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 640 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 640 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 640 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 472 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 472 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 472 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 472 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1332 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1332 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1332 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1332 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe iexplore.exe PID 1544 wrote to memory of 1716 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1716 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1716 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1544 wrote to memory of 1716 1544 d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe explorer.exe PID 1548 wrote to memory of 984 1548 svchost.exe Skype.exe PID 1548 wrote to memory of 984 1548 svchost.exe Skype.exe PID 1548 wrote to memory of 984 1548 svchost.exe Skype.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe"C:\Users\Admin\AppData\Local\Temp\d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\google\Skype.exe"C:\Users\Admin\AppData\Roaming\google\Skype.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\google\Skype.exe"C:\Users\Admin\AppData\Roaming\google\Skype.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Users\Admin\AppData\Roaming\google\Skype.exe"C:\Users\Admin\AppData\Roaming\google\Skype.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Users\Admin\AppData\Roaming\google\Skype.exe"C:\Users\Admin\AppData\Roaming\google\Skype.exe"3⤵
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Users\Admin\AppData\Roaming\google\Skype.exe"C:\Users\Admin\AppData\Roaming\google\Skype.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\VFwig3\VFwig3.nfoFilesize
3KB
MD568b0e56cce929d663e03223b27670144
SHA168bab0d2775dc47529be35876c0aea65ca24ceca
SHA25674e03a39a97b67d6b1cbfc2d947407f58bc9d2b04da05a8f626c86a88748d32e
SHA5123cd41fbe6227e2e0f769f9a68b74143801a45a393d3d75995c1c6ff800b9f17f226be9ee6496df84476c26308eace3e4392b38cc9b034d7e679cc8ca73025a1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\VFwig3\VFwig3.nfoFilesize
3KB
MD568b0e56cce929d663e03223b27670144
SHA168bab0d2775dc47529be35876c0aea65ca24ceca
SHA25674e03a39a97b67d6b1cbfc2d947407f58bc9d2b04da05a8f626c86a88748d32e
SHA5123cd41fbe6227e2e0f769f9a68b74143801a45a393d3d75995c1c6ff800b9f17f226be9ee6496df84476c26308eace3e4392b38cc9b034d7e679cc8ca73025a1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\VFwig3\VFwig3.nfoFilesize
3KB
MD568b0e56cce929d663e03223b27670144
SHA168bab0d2775dc47529be35876c0aea65ca24ceca
SHA25674e03a39a97b67d6b1cbfc2d947407f58bc9d2b04da05a8f626c86a88748d32e
SHA5123cd41fbe6227e2e0f769f9a68b74143801a45a393d3d75995c1c6ff800b9f17f226be9ee6496df84476c26308eace3e4392b38cc9b034d7e679cc8ca73025a1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\VFwig3\VFwig3.svrFilesize
358KB
MD500671f81b85f89f4d846ec178eeff6cb
SHA1c1809712719f84aa6e0ad8cc5ec20cd62aca615a
SHA256f4498728dc99d4e0f67d9c0c3a0272b75f5c9b5e2680e0d7e2a4d8bef9da1b4c
SHA512b31813a82e61d645c32e4f24337803d4ef045439bacc3401d0f724a5ae58d1fa9c17495f7678b09fb3c312f4c012e39f783ee2924461f72b2a05edaea6a4f39c
-
C:\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
C:\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
C:\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
C:\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
C:\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
C:\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
\Users\Admin\AppData\Roaming\google\Skype.exeFilesize
405KB
MD5acb6797410609685f65ce25978fbbc71
SHA179d4daf4cc98668cf62cf6e1d5e3628e6edbd8b2
SHA256d53abe32da6fc5f9fff8a4e5950c934a754beaeec5b4eb0c793583a5219a73af
SHA512d3aa92f9bd9876a00cfd079550e6fa82bd2d3d51fc2aea4ed94bf107da0bf6f1093f3abb6a25702711ce8caf722ba089d520f3111586278fa73ba977a6208d5e
-
memory/984-63-0x0000000000000000-mapping.dmp
-
memory/1048-77-0x0000000000000000-mapping.dmp
-
memory/1124-102-0x0000000001611000-0x00000000016C5000-memory.dmpFilesize
720KB
-
memory/1124-98-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-103-0x00000000016C5000-0x000000000171E000-memory.dmpFilesize
356KB
-
memory/1124-101-0x00000000016C5000-0x000000000171E000-memory.dmpFilesize
356KB
-
memory/1124-100-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-99-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-86-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-87-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-90-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-93-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1124-95-0x000000000171D0A0-mapping.dmp
-
memory/1124-96-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/1544-54-0x0000000075681000-0x0000000075683000-memory.dmpFilesize
8KB
-
memory/1548-60-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1548-55-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/1548-57-0x0000000000000000-mapping.dmp
-
memory/1652-81-0x0000000000000000-mapping.dmp
-
memory/1908-72-0x0000000000000000-mapping.dmp
-
memory/1932-68-0x0000000000000000-mapping.dmp