Analysis

  • max time kernel
    27s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2023 22:30

General

  • Target

    kujik.exe

  • Size

    32.9MB

  • MD5

    a96513026d7c3abdeb5f31abb91dc86f

  • SHA1

    85a0327efaa990584591029f61ee9cb8d2eebd84

  • SHA256

    c9f747866b3808056c29656c2ed8dc9c74364e09604fe77a1984bd1247605842

  • SHA512

    d426a4437a12636c8abb833d870ded636cc4bc332a724558fc0773d856ff101099c28fa5bbe40bf46dfc91052b650fabe18c5988fbf322bac05cf1241f7f81ed

  • SSDEEP

    786432:uhNBs1A4fLzRgQCwhcdiUOSqq+vcG9DQSEfrJ7VllwjEcBSZo/Ed0kVNZMTUo:uzQTL6xdiPSqq+v3Ef/llDc0Gy0kVNIZ

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

kijuk

C2

76t7hh-51153.portmap.host:51153

craciton.duckdns.org:7771

Mutex

1cfe7ed6-9001-490c-9121-6234ae195f28

Attributes
  • encryption_key

    2C0C62BDD42E42BC77F98F8E1EE713B43F791267

  • install_name

    SiHost64.exe

  • log_directory

    MicrosoftWindows32

  • reconnect_delay

    69

  • startup_key

    Microsoft Helper

  • subdirectory

    WindowsHTR

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 6 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kujik.exe
    "C:\Users\Admin\AppData\Local\Temp\kujik.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\runneddown.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsHardExtention.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsHardExtention.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX1\run345.vbs"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsFileOcso.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsFileOcso.exe"
            5⤵
            • Executes dropped EXE
            PID:1324
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX2\ru4n.vbs"
              6⤵
                PID:1216
                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\svchost.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\svchost.exe"
                  7⤵
                    PID:1196
                    • C:\Windows\system32\schtasks.exe
                      "schtasks" /create /tn "Microsoft Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\RarSFX2\svchost.exe" /rl HIGHEST /f
                      8⤵
                      • Creates scheduled task(s)
                      PID:1500
              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsViser.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsViser.exe"
                5⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:1328
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                  6⤵
                    PID:1776
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 65001
                      7⤵
                        PID:1972
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh wlan show profile
                        7⤵
                          PID:1924
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr All
                          7⤵
                            PID:1836
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd.exe" /C chcp 65001 && netsh wlan show profile name=65001 key=clear | findstr Key
                          6⤵
                            PID:2016
                            • C:\Windows\SysWOW64\chcp.com
                              chcp 65001
                              7⤵
                                PID:1928
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr Key
                                7⤵
                                  PID:1084
                                • C:\Windows\SysWOW64\netsh.exe
                                  netsh wlan show profile name=65001 key=clear
                                  7⤵
                                    PID:1812
                              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KujikTools2.exe
                                "C:\Users\Admin\AppData\Local\Temp\RarSFX1\KujikTools2.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:1820
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.5&gui=true
                                  6⤵
                                  • Modifies Internet Explorer settings
                                  PID:1012
                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:2
                                    7⤵
                                      PID:668
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:1660
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2112
                                    6⤵
                                    • Program crash
                                    PID:1452

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Scheduled Task

                        1
                        T1053

                        Persistence

                        Scheduled Task

                        1
                        T1053

                        Privilege Escalation

                        Scheduled Task

                        1
                        T1053

                        Defense Evasion

                        Virtualization/Sandbox Evasion

                        1
                        T1497

                        Modify Registry

                        1
                        T1112

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        Query Registry

                        2
                        T1012

                        Virtualization/Sandbox Evasion

                        1
                        T1497

                        System Information Discovery

                        3
                        T1082

                        Collection

                        Data from Local System

                        1
                        T1005

                        Command and Control

                        Web Service

                        1
                        T1102

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          12d2af08acc56fbc32608c14533333bc

                          SHA1

                          699bd8deef1e355d5c61f08a3d5af3f1ccf893d6

                          SHA256

                          37c39a8c015bd844ad577574ad9b1ed96b966473f5ed584dfe6d4643041c2b7b

                          SHA512

                          5b2b0ca790be0372148a794564933b3c135470ab95f065e10d905b3721c15af0a1d7681f72643ed95279461ac1d0a1b8fa49bc8cf581073708e9af22a9ecd9b3

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          71aa84ed6caee571ac5af1933f4f79ab

                          SHA1

                          5042e4ac7440f34ff0c2585bb939b2b6a9e212ab

                          SHA256

                          6e94bfad677aa220ae52a2da00823fe13541b72fa94c94b1c85bfe509e0ea9af

                          SHA512

                          5d6764c5bc3105d5ab5d905cab459eac7ee04946200a2c7a34223ee552081ba9252b5468a2d5c95055360cd9c3f7906af355f8bbd3cfb7f4248e278313a49d6d

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          d52811d9e19c09e4582079c851c26bb0

                          SHA1

                          d003c493c6568627cb027e1dab848f9c75960d23

                          SHA256

                          5566bb20ab7dfb0b85542fb13cc3e49449b25e6f7e53d1bb62c38a4a707cb62c

                          SHA512

                          ce48db28edaa4bc5143340ebd68661fad80927dcc4a3c8bb365f77328d6ffa38241f7d822e2824671f00870db9121b784524930bd270e13e60d4fa122821135c

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          8e50da13a946bcf22f87d63d6e256fab

                          SHA1

                          1b03988539fa65095bf7e0e4315afd081face84a

                          SHA256

                          0591a5b786f52bf5b049244a3208c2b6c048a51aee9f6090be92f7b4dffeae8a

                          SHA512

                          2597a846b468d710c2e2ed893d000bfb2779b94592d531c130fb1fba378e1bc73e7d0041b7437983a6bd7e30a1ae54959fd5566d912792f61a3b2f174ea03959

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          6a192da1aad03ac5ff62a56059410b76

                          SHA1

                          94a5cdcc0af520221f8b8f4df6a168d8cc5cff0d

                          SHA256

                          4483ada93a2cb4d29a3578b10280148b5642cb58d3c4b2407b93b659c3f61dc0

                          SHA512

                          8169b3d309e364c6f26924669f77ae507ca0d7ed47a5105435c2b9aea678d184483d700c10e35f50a8ede996611dc2f7e1646d0e6191f89ac4dcf09462fef1c5

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          8f39e3a5dcdbaea9e0120cc578a6c313

                          SHA1

                          ae6e8ecae596a166d60e0d1c1d0de4b95f1a4911

                          SHA256

                          861a9bfc25ad04e1732f47056ee22a4cb5443cd71ffd7ac00fcebbeca108fc84

                          SHA512

                          5d5a94e857b31e58172759ba73182b8b38ab277abb1142be57aba83c1949bbf6092a814439a27396bfd782ec90a9a53a3d982b481a6f3ce56b2a4926ae0dda96

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          d3bad142ac395ec602c8cbbbcabb8828

                          SHA1

                          3172cf56aea78dd715cef4c6da62a66313447f4e

                          SHA256

                          5b651dadcc6cc1ef22c0628395b343a91e927c6c8a31a7318e965f53ff728c1d

                          SHA512

                          c08c1b782fe36d4822e4620f5b282f4c0ccd083fe280db93669ba21b84743fbba9a0e855368fbf3d19090a52bb1e54a51962c24b113f508e2539bf6fe892fe13

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          d3bad142ac395ec602c8cbbbcabb8828

                          SHA1

                          3172cf56aea78dd715cef4c6da62a66313447f4e

                          SHA256

                          5b651dadcc6cc1ef22c0628395b343a91e927c6c8a31a7318e965f53ff728c1d

                          SHA512

                          c08c1b782fe36d4822e4620f5b282f4c0ccd083fe280db93669ba21b84743fbba9a0e855368fbf3d19090a52bb1e54a51962c24b113f508e2539bf6fe892fe13

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          1bce92aa89758f73511cd956bae02625

                          SHA1

                          3464adbf873aba42c1b797a0c51d8c45dc1e0669

                          SHA256

                          ed480f2413835de8cee00f042f5e9d185fb8f0c1e9cb1770b2e87496e07b02db

                          SHA512

                          8f80e4292508092b4f24713825b0217d40912834938722a0492debad5ce66ef0b94bec84691a4b1f434e22a19cda56b6b6df55520c3241eb23218bde91a80c06

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          0b01db6162005ef8c553e20ab338fbc4

                          SHA1

                          a7954f153f64dd4d1ee7bfd144dad9d2fed21712

                          SHA256

                          493f8176a98ad5c44b019331364c586518b8ece397af32822aff2d4e0955816e

                          SHA512

                          3d0999acf0f43023ca5a67966052714112c004e6bda47ac47c9c3b8c402228bf928b4d2a6623789c4399a34aa7da5e0427228ba096ff6644bebea0747b849959

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          582a557203e478ae3713f2e884218184

                          SHA1

                          6e33f678139823ef2049ecc278717318060b3770

                          SHA256

                          dd8768f10efa38454d848e7e99c4b0f56ec9e016b0360ddca1d27118d48d3800

                          SHA512

                          6955ac27fa99effe980daeaf4535a8b477118054a6b4dbc35c0b1fa1dbcdc7a89c4ef0549397fe74d96f459d856235d0395e3ee25eded390b093af531cea1738

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          4a90917cebef49ab9152ff9e4cab6c90

                          SHA1

                          31c519e51b338e1e89f8d4c64eebc49570a43707

                          SHA256

                          0ff2862dfd16bff103195dc19bbe5edc2fb1605818a1cbaf5055fdf5651596bf

                          SHA512

                          fdb40f70906d8a8dee658666ed07a72bcad0a1972e4ad0bbfaf537baae2a41ff72bf4c62cc8c540805e00346e70a46f7e5c75cedf58400a88a12c08d3a19973c

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          9a7a97bc2d3f760e308791af608d8e72

                          SHA1

                          080c245cd01b6b31c80cb5438355a6f95775a104

                          SHA256

                          c5dcf1f4f4e33b92de77339ddaf071ec4d4cbb7caab0346cf4b6e194a653fd0f

                          SHA512

                          ba2c130b313516b91e880ebfa2c587cc6e5d5786041d0abb51ab78d8cc37fbfc50e0ec26f9185f33b55eacbb6fc61130515da1a7ea213950fbd9f7f71cdab6dd

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          b15a8627bfa5b226907c26c445be863f

                          SHA1

                          8a934ec8ba2d479d9aad97ff382c2595042e95d8

                          SHA256

                          4878181ef27cb01c03904776ed169196344f1b8b4b7693430d7bcc56bd04f685

                          SHA512

                          370b15a84779ddf41d3289f9a2c900234a2919045ccd1b57ed6c4432dce504f62e2d947e63787bd46f9e3f6ea9a7e1e2ba4bb61841285ba8c3c85c3663b67c02

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          d63cdc593c8b7e1998dd232fdd6687e7

                          SHA1

                          82ade94db0e225857a070345a5d65a60f203800a

                          SHA256

                          8dcff2e52ea04eaa75ba1ef7afe35b87d9358779714f5f9e4d9fe4232fbfa902

                          SHA512

                          faf572b8d9587caeb9bb31545989310c7a09316f67512ba9c03002f0184451d3083fa2b03fd1228aa6fcbc78e4a600126916b54674537129f460890fdd172464

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          d63cdc593c8b7e1998dd232fdd6687e7

                          SHA1

                          82ade94db0e225857a070345a5d65a60f203800a

                          SHA256

                          8dcff2e52ea04eaa75ba1ef7afe35b87d9358779714f5f9e4d9fe4232fbfa902

                          SHA512

                          faf572b8d9587caeb9bb31545989310c7a09316f67512ba9c03002f0184451d3083fa2b03fd1228aa6fcbc78e4a600126916b54674537129f460890fdd172464

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          8b28fbd0c2a96e1c8c63885b9d42c34c

                          SHA1

                          36d173063f8cad3eb55c65f8ae6547e1ce06e07d

                          SHA256

                          79d50f3f1619ccf204580c34575718570849f18e8d22b0644fbc6ae57ca9f317

                          SHA512

                          c50fba9f484fcf78ad6916f8248a03bd64ba56a49c6208a63bc7df11b3e3d36f084e0269b7cc40def4296db784445ac5e53e7028f1f6f94aa0ac3a437118cfdc

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                          Filesize

                          342B

                          MD5

                          553b0bf9498911c2e68e3a20455dc11f

                          SHA1

                          7e08137b0508372db9832341e487b252a7208ef4

                          SHA256

                          1e1cf23832d14d9c41df910075d8b61b6bf5d310a838ce4c8472a1095f1ce97e

                          SHA512

                          970283e9530b805b5f67947848fc59d54af432fe38cd1fb037e54536eae882e7d5cc9443faecd479132690a00cb97add6795dbf6fe6af0927b04215a872cb77b

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NMXH1C0L\suggestions[1].en-US
                          Filesize

                          17KB

                          MD5

                          5a34cb996293fde2cb7a4ac89587393a

                          SHA1

                          3c96c993500690d1a77873cd62bc639b3a10653f

                          SHA256

                          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                          SHA512

                          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                        • C:\Users\Admin\AppData\Local\Temp\CabDC1F.tmp
                          Filesize

                          61KB

                          MD5

                          fc4666cbca561e864e7fdf883a9e6661

                          SHA1

                          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                          SHA256

                          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                          SHA512

                          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsHardExtention.exe
                          Filesize

                          32.6MB

                          MD5

                          845bca1210228f0d220d2fda0fc0a77b

                          SHA1

                          c9198fc01340d9016b41484c169c65985145c131

                          SHA256

                          1ff2458549bdc52765f17ccc1e361c9cc7062ddca3876fc73ff75d40e33ca9e5

                          SHA512

                          8e0abb1141bbb5cfe5a85194cefe616a34bff26fd1147416cb8efdd5dfc1a577344ab297c9a0d94561e6c7ddcb27dc8a308550cb88f39def0cf879813c540d4b

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\WindowsHardExtention.exe
                          Filesize

                          32.6MB

                          MD5

                          845bca1210228f0d220d2fda0fc0a77b

                          SHA1

                          c9198fc01340d9016b41484c169c65985145c131

                          SHA256

                          1ff2458549bdc52765f17ccc1e361c9cc7062ddca3876fc73ff75d40e33ca9e5

                          SHA512

                          8e0abb1141bbb5cfe5a85194cefe616a34bff26fd1147416cb8efdd5dfc1a577344ab297c9a0d94561e6c7ddcb27dc8a308550cb88f39def0cf879813c540d4b

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\runneddown.vbs
                          Filesize

                          81B

                          MD5

                          dbad7d4e9d9126be4738124cf089778c

                          SHA1

                          bf3bfba2741dea9c9f313e4f5e1e28d6cea1220c

                          SHA256

                          b0604b4cfb8999edf573b0ec22bd3ab183fc08262b8f018009d925abf4a1aca9

                          SHA512

                          0aa8e6f1d5238f0c2ba421238ceaa3ac846d9459868095044af4e0d1c703a735058abf7f171c5b659644b8e5b506caf459b5978a159176fb7b7b7141f3440b55

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KujikTools2.exe
                          Filesize

                          145KB

                          MD5

                          9f7507ac5ef726428b199e593414b9a8

                          SHA1

                          0eb0e7522234fe1b4ff4aeb3286cd8cf0ef9a26e

                          SHA256

                          8ab1a57a5ce541b2f1c0afa9f7d8e6f32b9337e6a218fb362f8ff04824ad9a92

                          SHA512

                          3662138681273ce478f37dd40b8be6264c5565a86a1651a23618d5a0c689ee760bd6b4ce6063a91481fec3a0ead40ea3d186c43b2381bd96c19ac11cd871d54a

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KujikTools2.exe
                          Filesize

                          145KB

                          MD5

                          9f7507ac5ef726428b199e593414b9a8

                          SHA1

                          0eb0e7522234fe1b4ff4aeb3286cd8cf0ef9a26e

                          SHA256

                          8ab1a57a5ce541b2f1c0afa9f7d8e6f32b9337e6a218fb362f8ff04824ad9a92

                          SHA512

                          3662138681273ce478f37dd40b8be6264c5565a86a1651a23618d5a0c689ee760bd6b4ce6063a91481fec3a0ead40ea3d186c43b2381bd96c19ac11cd871d54a

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsFileOcso.exe
                          Filesize

                          530KB

                          MD5

                          976dbe4a4a89ba100c9a266a817baf3a

                          SHA1

                          715713bf5167697430e5816b4e9d08b1ab5c919a

                          SHA256

                          42f754809540c9cadb9f8788a6743cb5517655b96a55b4a26601e56b3570aa7a

                          SHA512

                          f083109445150bf940c9a084b5342399ac8388aac6cd6c81bfed5ce7151362d3cbfe88d1fe1388ecacfeb29b3becda162c29658193fc943108b553946be377d4

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsFileOcso.exe
                          Filesize

                          530KB

                          MD5

                          976dbe4a4a89ba100c9a266a817baf3a

                          SHA1

                          715713bf5167697430e5816b4e9d08b1ab5c919a

                          SHA256

                          42f754809540c9cadb9f8788a6743cb5517655b96a55b4a26601e56b3570aa7a

                          SHA512

                          f083109445150bf940c9a084b5342399ac8388aac6cd6c81bfed5ce7151362d3cbfe88d1fe1388ecacfeb29b3becda162c29658193fc943108b553946be377d4

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsViser.exe
                          Filesize

                          15.4MB

                          MD5

                          93fdf80b25fddc0e088882ad702883db

                          SHA1

                          f25897b3e935a47c5753d5ec0e024b764893c16e

                          SHA256

                          4caa22c581aa4d9c841d1cea1804ac84f6699da89f829994d7ee2305e6c22f66

                          SHA512

                          516e19d14554dc87bfd783f9999ed60bc52ef4e75b3864f393e7863d199d059cb93d5b2bf58ce16cb06fcaa5f5a173ed53705fc40f81f0c7dec7b047c1230c8b

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\WindowsViser.exe
                          Filesize

                          15.4MB

                          MD5

                          93fdf80b25fddc0e088882ad702883db

                          SHA1

                          f25897b3e935a47c5753d5ec0e024b764893c16e

                          SHA256

                          4caa22c581aa4d9c841d1cea1804ac84f6699da89f829994d7ee2305e6c22f66

                          SHA512

                          516e19d14554dc87bfd783f9999ed60bc52ef4e75b3864f393e7863d199d059cb93d5b2bf58ce16cb06fcaa5f5a173ed53705fc40f81f0c7dec7b047c1230c8b

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\run345.vbs
                          Filesize

                          305B

                          MD5

                          111e76b8cbae9ee0bc9bae3f3de137f3

                          SHA1

                          41ffe731394616c7cef01f073cdf096754a0ae4f

                          SHA256

                          f4cd5a7a1184c052ef2196508c843ccf2c8a8534c5beec9cc9ec1d22e6f48f99

                          SHA512

                          06010c3090b671c4bd9af0f829869341b20c57f68187f3daf78d1c99d88e99ccdbe273e13014088269290a67973b7d1d617029dfdab68b110eee976ac8d4620a

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\ru4n.vbs
                          Filesize

                          68B

                          MD5

                          9746f45b35aadaa49fa87122ed999e84

                          SHA1

                          5f9a0e166069b2c626607c1c8b761b0ab4d7bd1e

                          SHA256

                          973610f5040c00cb3443ed87e13ded7661e704a97549781b16ceeec70e80d534

                          SHA512

                          98bb558a3addb08ded8d19e52086f6844de54d58e0cb51a2e0d37186697c9811b03ab853e431dc8dfe8f32be438c10f52e8e46d263a5d758d1cfd935c69f0531

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\svchost.exe
                          Filesize

                          394.7MB

                          MD5

                          9e1073b3a9a4d1fc36a9f957f689a8db

                          SHA1

                          940c61f590329e3b81314b4212aa8689515a5eb3

                          SHA256

                          d07f5fc1de26f67553f7caad4bcf8864a2e565de1816179bafa3def8419d4840

                          SHA512

                          8940b1e5350eea73babb8fd7880a4ab515168644d337418052c9d19b6950644ad1af59ae5243d0d94ad26af3cb787908ca76dd6aae76693139cbfadbc65ec4a4

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\svchost.exe
                          Filesize

                          524.4MB

                          MD5

                          e3c54ef6a685df8e6a8b34718b8d37dc

                          SHA1

                          0269afc8e7a41204b6654d33f70a3cb27147dce1

                          SHA256

                          2f12186cc441ceb4806e7e7dce5aa8286216e413466a278e4a92cfb438f0ee12

                          SHA512

                          cb0afcb04f77b9631df1e27e5311b9dee661ff249b6bb1efe25b48cf9e8b658ea25325ab727a11be316a729e106b863b9c31a10434624aeb8f5196820db4c895

                        • C:\Users\Admin\AppData\Local\Temp\TarDD0C.tmp
                          Filesize

                          161KB

                          MD5

                          73b4b714b42fc9a6aaefd0ae59adb009

                          SHA1

                          efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

                          SHA256

                          c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

                          SHA512

                          73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

                        • C:\Users\Admin\AppData\Local\Temp\passwords.txt
                          Filesize

                          1B

                          MD5

                          68b329da9893e34099c7d8ad5cb9c940

                          SHA1

                          adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

                          SHA256

                          01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

                          SHA512

                          be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QR5YZ3S6.txt
                          Filesize

                          600B

                          MD5

                          f89c1a02e3ebf92a7a1289ef5e6d7c1a

                          SHA1

                          54a299d1e7ab6f1e99cd9b589f00dd1d1ba7785a

                          SHA256

                          807bb07f376f65822826f8fc63996655efc73b7ac1bb71cbc8099743df4354c2

                          SHA512

                          fbbfda04c5904f74438681f5ac579cc1dc0c431104310de06646283c7193836e3081a13082374f3c864abf4e64c9caa4b812654f03fb7c3e17e2f737f7197808

                        • \Users\Admin\AppData\Local\Temp\RarSFX0\WindowsHardExtention.exe
                          Filesize

                          32.6MB

                          MD5

                          845bca1210228f0d220d2fda0fc0a77b

                          SHA1

                          c9198fc01340d9016b41484c169c65985145c131

                          SHA256

                          1ff2458549bdc52765f17ccc1e361c9cc7062ddca3876fc73ff75d40e33ca9e5

                          SHA512

                          8e0abb1141bbb5cfe5a85194cefe616a34bff26fd1147416cb8efdd5dfc1a577344ab297c9a0d94561e6c7ddcb27dc8a308550cb88f39def0cf879813c540d4b

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\KujikTools2.exe
                          Filesize

                          145KB

                          MD5

                          9f7507ac5ef726428b199e593414b9a8

                          SHA1

                          0eb0e7522234fe1b4ff4aeb3286cd8cf0ef9a26e

                          SHA256

                          8ab1a57a5ce541b2f1c0afa9f7d8e6f32b9337e6a218fb362f8ff04824ad9a92

                          SHA512

                          3662138681273ce478f37dd40b8be6264c5565a86a1651a23618d5a0c689ee760bd6b4ce6063a91481fec3a0ead40ea3d186c43b2381bd96c19ac11cd871d54a

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\KujikTools2.exe
                          Filesize

                          145KB

                          MD5

                          9f7507ac5ef726428b199e593414b9a8

                          SHA1

                          0eb0e7522234fe1b4ff4aeb3286cd8cf0ef9a26e

                          SHA256

                          8ab1a57a5ce541b2f1c0afa9f7d8e6f32b9337e6a218fb362f8ff04824ad9a92

                          SHA512

                          3662138681273ce478f37dd40b8be6264c5565a86a1651a23618d5a0c689ee760bd6b4ce6063a91481fec3a0ead40ea3d186c43b2381bd96c19ac11cd871d54a

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsBase.exe
                          Filesize

                          16.7MB

                          MD5

                          de4a2cd63f51b7d701d57e4c54814112

                          SHA1

                          cdddbc177c2516241d9e3eda8fa706db41f248ea

                          SHA256

                          2ce45222d181048140c7c234c25e70b2ce82809ffa89f8bd8e6ea244b220cc73

                          SHA512

                          e9f5f5d9a462307ba71de9111af839a000d73eb7d183bbb59926b0b4b8bc2eca26744b6f3842d64b56d6ab40d13fd855f8891f83026b8e8f6e4e8bf649d92e75

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsFileOcso.exe
                          Filesize

                          530KB

                          MD5

                          976dbe4a4a89ba100c9a266a817baf3a

                          SHA1

                          715713bf5167697430e5816b4e9d08b1ab5c919a

                          SHA256

                          42f754809540c9cadb9f8788a6743cb5517655b96a55b4a26601e56b3570aa7a

                          SHA512

                          f083109445150bf940c9a084b5342399ac8388aac6cd6c81bfed5ce7151362d3cbfe88d1fe1388ecacfeb29b3becda162c29658193fc943108b553946be377d4

                        • \Users\Admin\AppData\Local\Temp\RarSFX1\WindowsViser.exe
                          Filesize

                          15.4MB

                          MD5

                          93fdf80b25fddc0e088882ad702883db

                          SHA1

                          f25897b3e935a47c5753d5ec0e024b764893c16e

                          SHA256

                          4caa22c581aa4d9c841d1cea1804ac84f6699da89f829994d7ee2305e6c22f66

                          SHA512

                          516e19d14554dc87bfd783f9999ed60bc52ef4e75b3864f393e7863d199d059cb93d5b2bf58ce16cb06fcaa5f5a173ed53705fc40f81f0c7dec7b047c1230c8b

                        • \Users\Admin\AppData\Local\Temp\RarSFX2\svchost.exe
                          Filesize

                          457.6MB

                          MD5

                          6a2c5a29fcfa7182c11195939255984c

                          SHA1

                          b27c8ac4dc5ddffc903d9804f9f04eea72661912

                          SHA256

                          a48e2e49f901a28299850ed889ad452a5427815c6b00256d36c275cce4542211

                          SHA512

                          d21f1384adda410bf29b188ff9e0b8b4afe67c31fd65babf5020746a5879b3c1bfe2c85f2ab2d12aea19be6419dfed5802b4c5288be65a89d760f6de905850ff

                        • memory/668-129-0x0000000002F70000-0x0000000002F72000-memory.dmp
                          Filesize

                          8KB

                        • memory/1012-114-0x0000000002DF0000-0x0000000002E00000-memory.dmp
                          Filesize

                          64KB

                        • memory/1196-649-0x00000000006C0000-0x0000000000740000-memory.dmp
                          Filesize

                          512KB

                        • memory/1196-132-0x0000000001200000-0x0000000001284000-memory.dmp
                          Filesize

                          528KB

                        • memory/1196-133-0x00000000006C0000-0x0000000000740000-memory.dmp
                          Filesize

                          512KB

                        • memory/1328-110-0x0000000000DD0000-0x00000000032C4000-memory.dmp
                          Filesize

                          37.0MB

                        • memory/1328-116-0x0000000000C10000-0x0000000000C1A000-memory.dmp
                          Filesize

                          40KB

                        • memory/1328-111-0x0000000000DD0000-0x00000000032C4000-memory.dmp
                          Filesize

                          37.0MB

                        • memory/1328-109-0x0000000000DD0000-0x00000000032C4000-memory.dmp
                          Filesize

                          37.0MB

                        • memory/1328-260-0x0000000000C40000-0x0000000000C80000-memory.dmp
                          Filesize

                          256KB

                        • memory/1328-957-0x0000000000DD0000-0x00000000032C4000-memory.dmp
                          Filesize

                          37.0MB

                        • memory/1328-138-0x0000000000DD0000-0x00000000032C4000-memory.dmp
                          Filesize

                          37.0MB

                        • memory/1328-115-0x0000000000C40000-0x0000000000C80000-memory.dmp
                          Filesize

                          256KB

                        • memory/1328-118-0x0000000000C20000-0x0000000000C3A000-memory.dmp
                          Filesize

                          104KB

                        • memory/1660-126-0x0000000007260000-0x00000000072A0000-memory.dmp
                          Filesize

                          256KB

                        • memory/1660-102-0x0000000000100000-0x0000000002B40000-memory.dmp
                          Filesize

                          42.2MB

                        • memory/1660-394-0x0000000007260000-0x00000000072A0000-memory.dmp
                          Filesize

                          256KB

                        • memory/1660-113-0x0000000000100000-0x0000000002B40000-memory.dmp
                          Filesize

                          42.2MB

                        • memory/1660-112-0x0000000000100000-0x0000000002B40000-memory.dmp
                          Filesize

                          42.2MB

                        • memory/1660-1173-0x0000000000100000-0x0000000002B40000-memory.dmp
                          Filesize

                          42.2MB

                        • memory/1968-101-0x0000000003630000-0x0000000006070000-memory.dmp
                          Filesize

                          42.2MB

                        • memory/1968-97-0x00000000032F0000-0x00000000057E4000-memory.dmp
                          Filesize

                          37.0MB

                        • memory/1968-135-0x0000000003630000-0x0000000006070000-memory.dmp
                          Filesize

                          42.2MB