Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 12:19
Static task
static1
Behavioral task
behavioral1
Sample
СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe
Resource
win7-20220901-en
General
-
Target
СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe
-
Size
722KB
-
MD5
0aee1077971fda9cedfc570be5e2c822
-
SHA1
21092ac3f3146688e8bf9b7613c8293b74824970
-
SHA256
97bfd8737b330f409b85e67a43a20edcdc497a63ec9d663692aa8d11e323caf1
-
SHA512
72eb237eb96309d537c70008bbf6fa592e805f6111561ea3370799d14ec61f88743359cd2f614f2ac314d3b625cfe2f32b5119a293dec974783a188f5672265a
-
SSDEEP
12288:kLpeGieN1J53lWwlZ4r+cKkdm2oOJKk1wnjaXBnM33302IgFJN0V3foYcjZnbCkI:6PvN1Nyr+cHm2AMwOBnG30YCoBjZnbCx
Malware Config
Extracted
formbook
4.1
d0a7
ngpjqd.top
provider1.net
themetaverseloyalties.com
tylpp.com
pmjewels.com
87napxxgz8x86a.com
djolobal.com
fmbmaiamelo.com
naijabam.online
networkingbits.com
beesweet.live
sexarab.homes
promptcompete.com
midsouthradio.com
23mk.top
bnhkit.xyz
2ozp56.bond
vehiclesgroups.com
healthycommunitynow.com
cwzmesr.com
qpeqlqb.com
parallelsoundsstudio.com
legacy-lc.com
isedeonline.com
baudtown.com
characting.space
noironclothes.com
pisell.one
comnewcocoffee.com
bitvtag.live
hotelblunt.com
chryslercapitla.com
designrate.art
niacopeland.com
royaltyweb3.com
openai-good.com
mom.rent
brapix.app
pikkwik.com
omilive.com
whdmjse.com
belifprint.com
ncsex6.xyz
vrf70r.online
jbway.com
avtokozmetika.website
info-klar.com
zbk53.com
comfydays.shop
ismagency.biz
shm01.com
horzeplay.com
luxacumen.com
drpathcares.com
steamfulfillmentllc.com
board-evaluations.com
gecreditu.info
aquastarla.net
yjdfw.net
dhjzfs.com
theminco.biz
honeynoel.com
rzkbol.com
anastsy4.tech
botani-yodo1.xyz
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1952-69-0x000000000041F040-mapping.dmp formbook behavioral1/memory/1952-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/760-81-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/760-84-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exeRegSvcs.exemsdt.exedescription pid process target process PID 1444 set thread context of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1952 set thread context of 1344 1952 RegSvcs.exe Explorer.EXE PID 760 set thread context of 1344 760 msdt.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE -
Modifies registry class 64 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\LogicalViewMode = "2" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Mode = "6" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874369" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\GroupByKey:PID = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Rev = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\IconSize = "48" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 14001f806d7a8722a1371a4691b0dbda5aaebc990000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e00000001000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\FFlags = "1092616209" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
RegSvcs.exepowershell.exemsdt.exechrome.exepid process 1952 RegSvcs.exe 1952 RegSvcs.exe 2044 powershell.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe 652 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1344 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RegSvcs.exemsdt.exepid process 1952 RegSvcs.exe 1952 RegSvcs.exe 1952 RegSvcs.exe 760 msdt.exe 760 msdt.exe 760 msdt.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
AUDIODG.EXERegSvcs.exepowershell.exeExplorer.EXEmsdt.exedescription pid process Token: 33 1188 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1188 AUDIODG.EXE Token: 33 1188 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1188 AUDIODG.EXE Token: SeDebugPrivilege 1952 RegSvcs.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeShutdownPrivilege 1344 Explorer.EXE Token: SeShutdownPrivilege 1344 Explorer.EXE Token: SeDebugPrivilege 760 msdt.exe Token: SeShutdownPrivilege 1344 Explorer.EXE Token: SeShutdownPrivilege 1344 Explorer.EXE Token: SeShutdownPrivilege 1344 Explorer.EXE Token: SeShutdownPrivilege 1344 Explorer.EXE -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
Explorer.EXEchrome.exepid process 1344 Explorer.EXE 1344 Explorer.EXE 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe 1088 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Explorer.EXEpid process 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
Explorer.EXEpid process 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE 1344 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exeExplorer.EXEmsdt.exechrome.exedescription pid process target process PID 1444 wrote to memory of 2044 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe powershell.exe PID 1444 wrote to memory of 2044 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe powershell.exe PID 1444 wrote to memory of 2044 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe powershell.exe PID 1444 wrote to memory of 2044 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe powershell.exe PID 1444 wrote to memory of 1244 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe schtasks.exe PID 1444 wrote to memory of 1244 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe schtasks.exe PID 1444 wrote to memory of 1244 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe schtasks.exe PID 1444 wrote to memory of 1244 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe schtasks.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1444 wrote to memory of 1952 1444 СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe RegSvcs.exe PID 1344 wrote to memory of 760 1344 Explorer.EXE msdt.exe PID 1344 wrote to memory of 760 1344 Explorer.EXE msdt.exe PID 1344 wrote to memory of 760 1344 Explorer.EXE msdt.exe PID 1344 wrote to memory of 760 1344 Explorer.EXE msdt.exe PID 760 wrote to memory of 604 760 msdt.exe cmd.exe PID 760 wrote to memory of 604 760 msdt.exe cmd.exe PID 760 wrote to memory of 604 760 msdt.exe cmd.exe PID 760 wrote to memory of 604 760 msdt.exe cmd.exe PID 1344 wrote to memory of 1564 1344 Explorer.EXE explorer.exe PID 1344 wrote to memory of 1564 1344 Explorer.EXE explorer.exe PID 1344 wrote to memory of 1564 1344 Explorer.EXE explorer.exe PID 1344 wrote to memory of 1088 1344 Explorer.EXE chrome.exe PID 1344 wrote to memory of 1088 1344 Explorer.EXE chrome.exe PID 1344 wrote to memory of 1088 1344 Explorer.EXE chrome.exe PID 1088 wrote to memory of 2036 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 2036 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 2036 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe PID 1088 wrote to memory of 524 1088 chrome.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe"C:\Users\Admin\AppData\Local\Temp\СПЕШНА ПОРЪЧКА ЗА ПОКУПКА.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CFLiKwclbcBo.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CFLiKwclbcBo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAF53.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6004f50,0x7fef6004f60,0x7fef6004f703⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1028,8639049422449452160,11735682437769237138,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:23⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1028,8639049422449452160,11735682437769237138,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1300 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1028,8639049422449452160,11735682437769237138,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1748 /prefetch:83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,8639049422449452160,11735682437769237138,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:13⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,8639049422449452160,11735682437769237138,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:13⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpAF53.tmpFilesize
1KB
MD5798c2e4d7ffb3481c6d16cfe54af5ce1
SHA11ad5aed9c0785f43dada21cf757ac5eefba9e71f
SHA2568b1d6bf25e2f6a90b73caeaf277fe40d1bf25729cf3542da992ec0f0ae80e504
SHA512f3c6378916dd4900b6a4ca0fe4b0756acd34b554830beacb32047c4d93cfa3b023156b9219f37809567f409a90ade9cbd5c4617de7e43057bef865141ddb5a7c
-
\??\pipe\crashpad_1088_DMFEDLMAWGMFRKZMMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/516-57-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmpFilesize
8KB
-
memory/604-79-0x0000000000000000-mapping.dmp
-
memory/760-77-0x0000000000000000-mapping.dmp
-
memory/760-84-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/760-83-0x0000000000BB0000-0x0000000000C44000-memory.dmpFilesize
592KB
-
memory/760-82-0x00000000022B0000-0x00000000025B3000-memory.dmpFilesize
3.0MB
-
memory/760-81-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/760-80-0x0000000000DB0000-0x0000000000EA4000-memory.dmpFilesize
976KB
-
memory/1244-61-0x0000000000000000-mapping.dmp
-
memory/1344-75-0x0000000007C90000-0x0000000007D7C000-memory.dmpFilesize
944KB
-
memory/1344-86-0x00000000074A0000-0x00000000075A3000-memory.dmpFilesize
1.0MB
-
memory/1344-85-0x00000000074A0000-0x00000000075A3000-memory.dmpFilesize
1.0MB
-
memory/1444-56-0x00000000003C0000-0x00000000003D8000-memory.dmpFilesize
96KB
-
memory/1444-59-0x00000000053E0000-0x0000000005450000-memory.dmpFilesize
448KB
-
memory/1444-58-0x0000000000290000-0x000000000029C000-memory.dmpFilesize
48KB
-
memory/1444-54-0x00000000002E0000-0x000000000039A000-memory.dmpFilesize
744KB
-
memory/1444-64-0x0000000004560000-0x0000000004596000-memory.dmpFilesize
216KB
-
memory/1444-55-0x0000000075D71000-0x0000000075D73000-memory.dmpFilesize
8KB
-
memory/1564-87-0x0000000000000000-mapping.dmp
-
memory/1952-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1952-71-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1952-74-0x0000000000150000-0x0000000000165000-memory.dmpFilesize
84KB
-
memory/1952-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1952-73-0x0000000000980000-0x0000000000C83000-memory.dmpFilesize
3.0MB
-
memory/1952-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1952-69-0x000000000041F040-mapping.dmp
-
memory/2044-76-0x000000006EAD0000-0x000000006F07B000-memory.dmpFilesize
5.7MB
-
memory/2044-60-0x0000000000000000-mapping.dmp
-
memory/2044-72-0x000000006EAD0000-0x000000006F07B000-memory.dmpFilesize
5.7MB