Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2023, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe
Resource
win10v2004-20230221-en
General
-
Target
ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe
-
Size
1.6MB
-
MD5
5a649968a988733f48f7f7e2cc44e646
-
SHA1
fbae2c83886e710741fd83f41ddecc1dc96656c4
-
SHA256
ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784
-
SHA512
e24387bed33a8b2f284fcbf08bb0b448a59211b42f633a5063760d42933122af3b1c857a07e1c1cfc1c8504c1205825414594c14ebe92afc2075ba7b0c0a06e9
-
SSDEEP
24576:5IGUF2bjpMnhh+BZ3ohbPEWdL8Y3nBChF++2pdNKCPq1HAyaHdI:5bbjpEhGZ4hbbxhnBGFt2pdAV3aHdI
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 7 IoCs
resource yara_rule behavioral1/memory/5068-273-0x0000000002970000-0x000000000298C000-memory.dmp family_rhadamanthys behavioral1/memory/5068-275-0x0000000002970000-0x000000000298C000-memory.dmp family_rhadamanthys behavioral1/memory/5068-284-0x0000000002970000-0x000000000298C000-memory.dmp family_rhadamanthys behavioral1/memory/2516-289-0x0000000000BD0000-0x0000000000BEC000-memory.dmp family_rhadamanthys behavioral1/memory/2516-291-0x0000000000BD0000-0x0000000000BEC000-memory.dmp family_rhadamanthys behavioral1/memory/3600-293-0x00000000023A0000-0x00000000023BC000-memory.dmp family_rhadamanthys behavioral1/memory/2516-295-0x0000000000BD0000-0x0000000000BEC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2732 created 2700 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 34 PID 840 created 2700 840 ipRYsYYeq21I.exe 34 PID 4116 created 2700 4116 ipRYsYYeq21I.exe 34 -
Executes dropped EXE 8 IoCs
pid Process 4544 bohx.exe 840 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 4656 bohx.exe 1804 PsInfo.exe 2228 PsInfo64.exe 4268 PsInfo64.exe 1148 PsInfo64.exe -
Loads dropped DLL 6 IoCs
pid Process 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 840 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 2464 ngentask.exe 2464 ngentask.exe 2464 ngentask.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 5068 fontview.exe 5068 fontview.exe 5068 fontview.exe 2516 fontview.exe 2516 fontview.exe 2516 fontview.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2732 set thread context of 5004 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 88 PID 840 set thread context of 2464 840 ipRYsYYeq21I.exe 107 PID 4116 set thread context of 5036 4116 ipRYsYYeq21I.exe 111 -
Program crash 6 IoCs
pid pid_target Process procid_target 2976 2732 WerFault.exe 83 4904 2732 WerFault.exe 83 1972 4116 WerFault.exe 106 3032 4116 WerFault.exe 106 4784 840 WerFault.exe 105 5036 840 WerFault.exe 105 -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 fontview.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID fontview.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 fontview.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID fontview.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fontview.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 PsInfo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PsInfo64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 PsInfo64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PsInfo64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PsInfo64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 PsInfo64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PsInfo64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PsInfo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PsInfo.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 PsInfo64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PsInfo64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PsInfo64.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 448 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 840 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe 4116 ipRYsYYeq21I.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 5068 fontview.exe Token: SeCreatePagefilePrivilege 5068 fontview.exe Token: SeShutdownPrivilege 2516 fontview.exe Token: SeCreatePagefilePrivilege 2516 fontview.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 1784 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 84 PID 2732 wrote to memory of 1784 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 84 PID 2732 wrote to memory of 1784 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 84 PID 2732 wrote to memory of 1264 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 85 PID 2732 wrote to memory of 1264 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 85 PID 2732 wrote to memory of 1264 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 85 PID 2732 wrote to memory of 5004 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 88 PID 2732 wrote to memory of 5004 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 88 PID 2732 wrote to memory of 5004 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 88 PID 2732 wrote to memory of 5004 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 88 PID 2732 wrote to memory of 5004 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 88 PID 2732 wrote to memory of 5068 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 90 PID 2732 wrote to memory of 5068 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 90 PID 2732 wrote to memory of 5068 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 90 PID 2732 wrote to memory of 5068 2732 ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe 90 PID 5004 wrote to memory of 948 5004 ngentask.exe 91 PID 5004 wrote to memory of 948 5004 ngentask.exe 91 PID 5004 wrote to memory of 948 5004 ngentask.exe 91 PID 5004 wrote to memory of 4600 5004 ngentask.exe 93 PID 5004 wrote to memory of 4600 5004 ngentask.exe 93 PID 5004 wrote to memory of 4600 5004 ngentask.exe 93 PID 4600 wrote to memory of 4544 4600 cmd.exe 95 PID 4600 wrote to memory of 4544 4600 cmd.exe 95 PID 4600 wrote to memory of 4544 4600 cmd.exe 95 PID 5004 wrote to memory of 1100 5004 ngentask.exe 96 PID 5004 wrote to memory of 1100 5004 ngentask.exe 96 PID 5004 wrote to memory of 1100 5004 ngentask.exe 96 PID 1100 wrote to memory of 448 1100 cmd.exe 98 PID 1100 wrote to memory of 448 1100 cmd.exe 98 PID 1100 wrote to memory of 448 1100 cmd.exe 98 PID 1100 wrote to memory of 3364 1100 cmd.exe 99 PID 1100 wrote to memory of 3364 1100 cmd.exe 99 PID 1100 wrote to memory of 3364 1100 cmd.exe 99 PID 5004 wrote to memory of 840 5004 ngentask.exe 105 PID 5004 wrote to memory of 840 5004 ngentask.exe 105 PID 5004 wrote to memory of 840 5004 ngentask.exe 105 PID 5004 wrote to memory of 4116 5004 ngentask.exe 106 PID 5004 wrote to memory of 4116 5004 ngentask.exe 106 PID 5004 wrote to memory of 4116 5004 ngentask.exe 106 PID 840 wrote to memory of 2464 840 ipRYsYYeq21I.exe 107 PID 840 wrote to memory of 2464 840 ipRYsYYeq21I.exe 107 PID 840 wrote to memory of 2464 840 ipRYsYYeq21I.exe 107 PID 840 wrote to memory of 2464 840 ipRYsYYeq21I.exe 107 PID 840 wrote to memory of 2464 840 ipRYsYYeq21I.exe 107 PID 2464 wrote to memory of 2120 2464 ngentask.exe 108 PID 2464 wrote to memory of 2120 2464 ngentask.exe 108 PID 2464 wrote to memory of 2120 2464 ngentask.exe 108 PID 840 wrote to memory of 2516 840 ipRYsYYeq21I.exe 110 PID 840 wrote to memory of 2516 840 ipRYsYYeq21I.exe 110 PID 840 wrote to memory of 2516 840 ipRYsYYeq21I.exe 110 PID 840 wrote to memory of 2516 840 ipRYsYYeq21I.exe 110 PID 4116 wrote to memory of 5036 4116 ipRYsYYeq21I.exe 111 PID 4116 wrote to memory of 5036 4116 ipRYsYYeq21I.exe 111 PID 4116 wrote to memory of 5036 4116 ipRYsYYeq21I.exe 111 PID 4116 wrote to memory of 5036 4116 ipRYsYYeq21I.exe 111 PID 4116 wrote to memory of 5036 4116 ipRYsYYeq21I.exe 111 PID 4116 wrote to memory of 3600 4116 ipRYsYYeq21I.exe 112 PID 4116 wrote to memory of 3600 4116 ipRYsYYeq21I.exe 112 PID 4116 wrote to memory of 3600 4116 ipRYsYYeq21I.exe 112 PID 4116 wrote to memory of 3600 4116 ipRYsYYeq21I.exe 112 PID 2464 wrote to memory of 2260 2464 ngentask.exe 113 PID 2464 wrote to memory of 2260 2464 ngentask.exe 113 PID 2464 wrote to memory of 2260 2464 ngentask.exe 113 PID 2260 wrote to memory of 4656 2260 cmd.exe 115
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2700
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SYSWOW64\fontview.exe"2⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe"C:\Users\Admin\AppData\Local\Temp\ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵PID:1264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C echo %userprofile% > C:\Users\Admin\AppData\Roaming\ZendeskStore\cout 2>&13⤵PID:948
-
C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exeC:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe -s /accepteula applications4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C cd "C:\Users\Admin\AppData\Roaming\ZendeskStore" & bohx.exe -o caxh.zip3⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exebohx.exe -o caxh.zip4⤵
- Executes dropped EXE
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C systeminfo | findstr /C:"OS Name" > "C:\Users\Admin\AppData\Roaming\ZendeskStore\wun"3⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:448
-
-
C:\Windows\SysWOW64\findstr.exefindstr /C:"OS Name"4⤵PID:3364
-
-
-
C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe"C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C echo %userprofile% > C:\Users\Admin\AppData\Roaming\ZendeskStore\cout 2>&15⤵PID:2120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C cd "C:\Users\Admin\AppData\Roaming\ZendeskStore" & bohx.exe -o myec.zip5⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exebohx.exe -o myec.zip6⤵
- Executes dropped EXE
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe -s /accepteula applications > "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out"& "C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" -s /accepteula applications >> "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out"5⤵PID:948
-
C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe"C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" -s /accepteula applications6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe -d /accepteula processor > "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out" & "C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" /accepteula video >> "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out"5⤵PID:4008
-
C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exeC:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe -d /accepteula processor6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4268
-
-
C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe"C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" /accepteula video6⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping localhost -n 6 > nul & del C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe5⤵PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 12684⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 9444⤵
- Program crash
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe"C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"4⤵PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 10044⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 12324⤵
- Program crash
PID:3032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 12722⤵
- Program crash
PID:2976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 12922⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2732 -ip 27321⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2732 -ip 27321⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4116 -ip 41161⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4116 -ip 41161⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 840 -ip 8401⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 840 -ip 8401⤵PID:2804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5098a4aa93e275de54bbc35ae4b981301
SHA1d03646dc7c63e0784393f74085405c794b8555af
SHA2565e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b
SHA5122e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46
-
Filesize
334KB
MD5098a4aa93e275de54bbc35ae4b981301
SHA1d03646dc7c63e0784393f74085405c794b8555af
SHA2565e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b
SHA5122e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46
-
Filesize
334KB
MD5098a4aa93e275de54bbc35ae4b981301
SHA1d03646dc7c63e0784393f74085405c794b8555af
SHA2565e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b
SHA5122e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46
-
Filesize
334KB
MD5098a4aa93e275de54bbc35ae4b981301
SHA1d03646dc7c63e0784393f74085405c794b8555af
SHA2565e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b
SHA5122e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46
-
Filesize
1.7MB
MD52c8c5c1e491aea4b622c4f45ad6b1b17
SHA18f65a5c0627577acd421708f71731cbc1b62dad4
SHA25626810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63
SHA5121c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691
-
Filesize
1.7MB
MD52c8c5c1e491aea4b622c4f45ad6b1b17
SHA18f65a5c0627577acd421708f71731cbc1b62dad4
SHA25626810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63
SHA5121c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691
-
Filesize
1.7MB
MD52c8c5c1e491aea4b622c4f45ad6b1b17
SHA18f65a5c0627577acd421708f71731cbc1b62dad4
SHA25626810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63
SHA5121c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691
-
Filesize
1.7MB
MD52c8c5c1e491aea4b622c4f45ad6b1b17
SHA18f65a5c0627577acd421708f71731cbc1b62dad4
SHA25626810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63
SHA5121c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691
-
Filesize
146B
MD59fc4181aca48cce7448e8d0da198b946
SHA1e0d6a6df63b96e09a48e7079f2a09df5eb3b9110
SHA2566e6b7a91ecc31620b1b48893b33de8cc9669f6dd22c8456f54c7a49ad5844953
SHA51295144bb0d9a68f66e86660da964cb4c9224bf8b6d8d1e529f939930af8677f1f0b71e69a307b82b55a215564796405388cf59db70a14143570e902fb406bab40
-
Filesize
306KB
MD5624adb0f45cbb9cadad83c264df98891
SHA1e839ce1e0446d8da889935f411f0fb7ad54d4b3e
SHA2568f401dc021e20ff3abc64a2d346ef6a792a5643ca04ffd1f297e417532acaa06
SHA512b29b3a72cd32ee34ec6ce357818658b8a89c399e2f8439a7f49fb1a506ed912f41afa19bc5c142c9a4539acc5966a29c6a6637c23de0dc3e5f2d85264620bdba
-
Filesize
306KB
MD5624adb0f45cbb9cadad83c264df98891
SHA1e839ce1e0446d8da889935f411f0fb7ad54d4b3e
SHA2568f401dc021e20ff3abc64a2d346ef6a792a5643ca04ffd1f297e417532acaa06
SHA512b29b3a72cd32ee34ec6ce357818658b8a89c399e2f8439a7f49fb1a506ed912f41afa19bc5c142c9a4539acc5966a29c6a6637c23de0dc3e5f2d85264620bdba
-
Filesize
343KB
MD5efa2f8f73b3559711149dfdeb8bc288e
SHA1453c70e4b12ecabe860866165ad39de6361215fd
SHA256ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb
SHA51263f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e
-
Filesize
343KB
MD5efa2f8f73b3559711149dfdeb8bc288e
SHA1453c70e4b12ecabe860866165ad39de6361215fd
SHA256ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb
SHA51263f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e
-
Filesize
343KB
MD5efa2f8f73b3559711149dfdeb8bc288e
SHA1453c70e4b12ecabe860866165ad39de6361215fd
SHA256ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb
SHA51263f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e
-
Filesize
343KB
MD5efa2f8f73b3559711149dfdeb8bc288e
SHA1453c70e4b12ecabe860866165ad39de6361215fd
SHA256ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb
SHA51263f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a
-
Filesize
996KB
MD59e73fb50d37e37ee8bd19a8e3d2b82ca
SHA13db1c548e86e4bb7457324a3097b05da15b7ffc3
SHA25668ba7122ee8d9ce34ed94b6036a171ce38d6d9d9b3a609c2f4de773f4dd40d5c
SHA512b41209300f018103b0f8a4de0537f348a3bdfcbc8feb19e7fec6634b06c266cc442145fd2d9230f827f273b0d07bb6bbcab7a0f0e9e1f558e6dd7a076f568094
-
Filesize
17B
MD52fb06e7d194b236d2a1c48c9e19427b5
SHA1c6bc50a41364af8cfc8b636eda62c39e8582a609
SHA256d08f05765faf00c98d80ba8f9ce214d1d243bdca57e6f0257af61d876e1fc7f0
SHA512ee05a6ba0a7f4838216f0c084c094c2f1d47fe8f40003ede4a80477631c100ca3171ee2e504fd69fc13482334d721f46614331dc20a6b66821d17de42879f522
-
Filesize
17B
MD52fb06e7d194b236d2a1c48c9e19427b5
SHA1c6bc50a41364af8cfc8b636eda62c39e8582a609
SHA256d08f05765faf00c98d80ba8f9ce214d1d243bdca57e6f0257af61d876e1fc7f0
SHA512ee05a6ba0a7f4838216f0c084c094c2f1d47fe8f40003ede4a80477631c100ca3171ee2e504fd69fc13482334d721f46614331dc20a6b66821d17de42879f522
-
Filesize
547KB
MD5beee632711993fe38cf290a9d301df42
SHA15c4b214cf77b0e781124b8295ec55263b90d0707
SHA256f7e8d6214a4ffc3188adf133fcbe9f036571a6b6c90718eadbb10339f27c9d9b
SHA512c00ebcc7b12ec456046f95e128cf23636d9fa2af6877a4e994858f8f97088f569dbd720f130db243e0f6f382b60b9636a52d151435f8d65c7eaab3025b1af97f
-
Filesize
547KB
MD5beee632711993fe38cf290a9d301df42
SHA15c4b214cf77b0e781124b8295ec55263b90d0707
SHA256f7e8d6214a4ffc3188adf133fcbe9f036571a6b6c90718eadbb10339f27c9d9b
SHA512c00ebcc7b12ec456046f95e128cf23636d9fa2af6877a4e994858f8f97088f569dbd720f130db243e0f6f382b60b9636a52d151435f8d65c7eaab3025b1af97f
-
Filesize
2.5MB
MD5d0ccad58a5e4c21b6bce587c08df2cda
SHA1572b8ced589727705e5d94bbb84e0a352cc4eec4
SHA2562808f3a5fdeb645fd6fe999b7cec5ee370645060a41fe6545958b21f6d14b836
SHA5127137067e405a2aa0f56b2520899718f039d4c6157ce7b27c79531d29889ae0972fc0ab25f59c9ea7cb1f67b962e03c7157e2da59b21d9b5f48fb1a423e23a79c
-
Filesize
2.1MB
MD50cab66732ed0978c1c5d2c378613c504
SHA18d3102b25a1fd36e0f9d4a33f05da107065f0e7a
SHA256101f57145ea784442b4bc267fdfcfab754ee664ca974138838ece9fc4bb4c84d
SHA512cc49bf303158788023295fb406eec9886b44297e3be5d06a1f14d793d09bf66609025731b2c6c97ade17e9c8d4da480d4ba53ac427dcc459fcae9678b8f767da
-
Filesize
2.1MB
MD50cab66732ed0978c1c5d2c378613c504
SHA18d3102b25a1fd36e0f9d4a33f05da107065f0e7a
SHA256101f57145ea784442b4bc267fdfcfab754ee664ca974138838ece9fc4bb4c84d
SHA512cc49bf303158788023295fb406eec9886b44297e3be5d06a1f14d793d09bf66609025731b2c6c97ade17e9c8d4da480d4ba53ac427dcc459fcae9678b8f767da
-
Filesize
2KB
MD50decbf282d068a4c3885bfd2b5001fbf
SHA172aafcefc52f9fd43855f5f6ac20561fcd857fc6
SHA2564299bbb35e9748a7961ef13ce67f8b01350b9626e8b0c3df415f6f1f0ad91dd0
SHA51262f15a8d6f1596c43c74685922a3c4bc9965a3b484d36d367f4c3322076fab9ee17c35f8a17153704e480267c72883be32854ebbe2c877d748b5826e1c895de3
-
Filesize
501B
MD545187f9eecb863f8e4f5a105bbda9dd7
SHA18a9095c123c8c29f22b7f08179b7fc920d5a49de
SHA25618b71077751332514bd2d129fdbfe326d87d9ee361cbc09be021d468c794f10d
SHA512330ef2e864e518bb4f25a253ec73244b1076d4e39af1ca126bd51b20df4ff3aab371a35be4f16cd5f7288f376a089dae50960c225752a7c8516f36901faa7a2d
-
Filesize
936KB
MD59502f3ae1cc9398671edfd461275d78d
SHA161e7dbbc8b44db32fa9d3841275718dbd163cd45
SHA256badca203e5d4d79d2107b9ec2c64547157288a43932bb973719375e9ed8d5d12
SHA51279d5e5875218bbc6288500c29b72845fb6427b9cefe9916c13c3301c0c7e02c21a576a597e74532b41932ec4343a21599c252ad5b34c547650f9c5f817ab09eb
-
Filesize
936KB
MD59502f3ae1cc9398671edfd461275d78d
SHA161e7dbbc8b44db32fa9d3841275718dbd163cd45
SHA256badca203e5d4d79d2107b9ec2c64547157288a43932bb973719375e9ed8d5d12
SHA51279d5e5875218bbc6288500c29b72845fb6427b9cefe9916c13c3301c0c7e02c21a576a597e74532b41932ec4343a21599c252ad5b34c547650f9c5f817ab09eb
-
Filesize
53B
MD5c16330b5345b80ba27af8bfd4299904e
SHA19f573e303431e956395dc09c510c445ae55ef7d7
SHA256d6306f25b6b4cf4d6a82a4bbb691932ad74730ec3d9a4c2d5ec90b1574d4bafe
SHA512173f20932faf91348ae1b26bc99dffd4b438b6868921e5b5352fb1b513382203e49643dd2129b7365d570159dadf108440141d4d77193c1c6108a2140b9ce3f6