Analysis

  • max time kernel
    126s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:32

General

  • Target

    http://cloudsuxe.com/file/11a6d26

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 38 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 23 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://cloudsuxe.com/file/11a6d26
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b3429758,0x7ff8b3429768,0x7ff8b3429778
      2⤵
        PID:1412
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:2
        2⤵
          PID:2076
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
          2⤵
            PID:4156
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
            2⤵
              PID:2128
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:1
              2⤵
                PID:3556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:1
                2⤵
                  PID:4500
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4408 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:1
                  2⤵
                    PID:3516
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
                    2⤵
                      PID:620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4932 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
                      2⤵
                        PID:4444
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
                        2⤵
                          PID:4232
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4944 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:1
                          2⤵
                            PID:2112
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4984 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:1
                            2⤵
                              PID:3332
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5428 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:1
                              2⤵
                                PID:2144
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
                                2⤵
                                  PID:3252
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
                                  2⤵
                                    PID:2100
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1840,i,5297003554737147123,13089903742440748407,131072 /prefetch:8
                                    2⤵
                                      PID:1120
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:3932
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:5028
                                      • C:\Users\Admin\Desktop\novaya-papka_QVTFkYSp.exe
                                        "C:\Users\Admin\Desktop\novaya-papka_QVTFkYSp.exe"
                                        1⤵
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3240
                                        • C:\Users\Admin\AppData\Local\Temp\is-LALOO.tmp\is-UOII5.tmp
                                          "C:\Users\Admin\AppData\Local\Temp\is-LALOO.tmp\is-UOII5.tmp" /SL4 $E0046 "C:\Users\Admin\Desktop\novaya-papka_QVTFkYSp.exe" 4596715 57344
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in Program Files directory
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1496
                                          • C:\Windows\SysWOW64\net.exe
                                            "C:\Windows\system32\net.exe" helpmsg 21
                                            3⤵
                                              PID:3460
                                              • C:\Windows\SysWOW64\net1.exe
                                                C:\Windows\system32\net1 helpmsg 21
                                                4⤵
                                                  PID:4804
                                              • C:\Program Files (x86)\ImageComparer\IC327.exe
                                                "C:\Program Files (x86)\ImageComparer\IC327.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2164
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 892
                                                  4⤵
                                                  • Program crash
                                                  PID:5060
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 932
                                                  4⤵
                                                  • Program crash
                                                  PID:5096
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 140
                                                  4⤵
                                                  • Program crash
                                                  PID:3508
                                              • C:\Program Files (x86)\ImageComparer\IC327.exe
                                                "C:\Program Files (x86)\ImageComparer\IC327.exe" 79677e2e47560369617bf59ab731987c
                                                3⤵
                                                • Executes dropped EXE
                                                • Checks for any installed AV software in registry
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5056
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 876
                                                  4⤵
                                                  • Program crash
                                                  PID:5024
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 884
                                                  4⤵
                                                  • Program crash
                                                  PID:1488
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 964
                                                  4⤵
                                                  • Program crash
                                                  PID:4156
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1036
                                                  4⤵
                                                  • Program crash
                                                  PID:3380
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1084
                                                  4⤵
                                                  • Program crash
                                                  PID:4352
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1176
                                                  4⤵
                                                  • Program crash
                                                  PID:2112
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1184
                                                  4⤵
                                                  • Program crash
                                                  PID:4988
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1348
                                                  4⤵
                                                  • Program crash
                                                  PID:1720
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1356
                                                  4⤵
                                                  • Program crash
                                                  PID:3840
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 984
                                                  4⤵
                                                  • Program crash
                                                  PID:1368
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1376
                                                  4⤵
                                                  • Program crash
                                                  PID:3848
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1704
                                                  4⤵
                                                  • Program crash
                                                  PID:4816
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1416
                                                  4⤵
                                                  • Program crash
                                                  PID:5028
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1748
                                                  4⤵
                                                  • Program crash
                                                  PID:4604
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1716
                                                  4⤵
                                                  • Program crash
                                                  PID:4968
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1708
                                                  4⤵
                                                  • Program crash
                                                  PID:3992
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1748
                                                  4⤵
                                                  • Program crash
                                                  PID:3560
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1900
                                                  4⤵
                                                  • Program crash
                                                  PID:3512
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1752
                                                  4⤵
                                                  • Program crash
                                                  PID:220
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1828
                                                  4⤵
                                                  • Program crash
                                                  PID:1396
                                              • C:\Windows\SysWOW64\net.exe
                                                "C:\Windows\system32\net.exe" pause ImageComparer327
                                                3⤵
                                                  PID:3512
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 pause ImageComparer327
                                                    4⤵
                                                      PID:4896
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2164 -ip 2164
                                                1⤵
                                                  PID:1992
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2164 -ip 2164
                                                  1⤵
                                                    PID:3684
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2164 -ip 2164
                                                    1⤵
                                                      PID:1020
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5056 -ip 5056
                                                      1⤵
                                                        PID:4620
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5056 -ip 5056
                                                        1⤵
                                                          PID:5020
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5056 -ip 5056
                                                          1⤵
                                                            PID:1248
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 5056 -ip 5056
                                                            1⤵
                                                              PID:1244
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5056 -ip 5056
                                                              1⤵
                                                                PID:2128
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5056 -ip 5056
                                                                1⤵
                                                                  PID:3556
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5056 -ip 5056
                                                                  1⤵
                                                                    PID:5052
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5056 -ip 5056
                                                                    1⤵
                                                                      PID:4268
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 5056 -ip 5056
                                                                      1⤵
                                                                        PID:4260
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5056 -ip 5056
                                                                        1⤵
                                                                          PID:3456
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5056 -ip 5056
                                                                          1⤵
                                                                            PID:1472
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 5056 -ip 5056
                                                                            1⤵
                                                                              PID:856
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5056 -ip 5056
                                                                              1⤵
                                                                                PID:4984
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 5056 -ip 5056
                                                                                1⤵
                                                                                  PID:4240
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 5056 -ip 5056
                                                                                  1⤵
                                                                                    PID:5008
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 5056 -ip 5056
                                                                                    1⤵
                                                                                      PID:2088
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 5056 -ip 5056
                                                                                      1⤵
                                                                                        PID:4776
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 5056 -ip 5056
                                                                                        1⤵
                                                                                          PID:3760
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 5056 -ip 5056
                                                                                          1⤵
                                                                                            PID:4388
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 5056 -ip 5056
                                                                                            1⤵
                                                                                              PID:5020
                                                                                            • C:\Program Files\7-Zip\7zFM.exe
                                                                                              "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\novaya_papka.rar_id25814757.exe"
                                                                                              1⤵
                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              PID:2264
                                                                                            • C:\Users\Admin\Desktop\novaya_papka.rar_id25814757.exe
                                                                                              "C:\Users\Admin\Desktop\novaya_papka.rar_id25814757.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Writes to the Master Boot Record (MBR)
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:4216

                                                                                            Network

                                                                                            MITRE ATT&CK Matrix ATT&CK v6

                                                                                            Persistence

                                                                                            Registry Run Keys / Startup Folder

                                                                                            1
                                                                                            T1060

                                                                                            Bootkit

                                                                                            1
                                                                                            T1067

                                                                                            Defense Evasion

                                                                                            Modify Registry

                                                                                            1
                                                                                            T1112

                                                                                            Discovery

                                                                                            Security Software Discovery

                                                                                            1
                                                                                            T1063

                                                                                            Query Registry

                                                                                            2
                                                                                            T1012

                                                                                            System Information Discovery

                                                                                            2
                                                                                            T1082

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Program Files (x86)\ImageComparer\IC327.exe
                                                                                              Filesize

                                                                                              5.3MB

                                                                                              MD5

                                                                                              3c552f352049f99f64034c9e242dc9f2

                                                                                              SHA1

                                                                                              023b76db5754b209b1978c070041c7be881dc22b

                                                                                              SHA256

                                                                                              05b946c6fdbc88a1af1bb1e06c62d358236fef786b4c2a3d977dd305d51972c4

                                                                                              SHA512

                                                                                              dbba1a93457b128f75d0958e157c19de9404ce08d1a24ba31b1aeedce88405e9aaf2883a7f4b749ffdb1674f331c7252be4dff2abdb173d7142ae8146b93f4fb

                                                                                            • C:\Program Files (x86)\ImageComparer\IC327.exe
                                                                                              Filesize

                                                                                              5.3MB

                                                                                              MD5

                                                                                              3c552f352049f99f64034c9e242dc9f2

                                                                                              SHA1

                                                                                              023b76db5754b209b1978c070041c7be881dc22b

                                                                                              SHA256

                                                                                              05b946c6fdbc88a1af1bb1e06c62d358236fef786b4c2a3d977dd305d51972c4

                                                                                              SHA512

                                                                                              dbba1a93457b128f75d0958e157c19de9404ce08d1a24ba31b1aeedce88405e9aaf2883a7f4b749ffdb1674f331c7252be4dff2abdb173d7142ae8146b93f4fb

                                                                                            • C:\Program Files (x86)\ImageComparer\IC327.exe
                                                                                              Filesize

                                                                                              5.3MB

                                                                                              MD5

                                                                                              3c552f352049f99f64034c9e242dc9f2

                                                                                              SHA1

                                                                                              023b76db5754b209b1978c070041c7be881dc22b

                                                                                              SHA256

                                                                                              05b946c6fdbc88a1af1bb1e06c62d358236fef786b4c2a3d977dd305d51972c4

                                                                                              SHA512

                                                                                              dbba1a93457b128f75d0958e157c19de9404ce08d1a24ba31b1aeedce88405e9aaf2883a7f4b749ffdb1674f331c7252be4dff2abdb173d7142ae8146b93f4fb

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
                                                                                              Filesize

                                                                                              264KB

                                                                                              MD5

                                                                                              deb22f0df2187d0e349b182be36fddf7

                                                                                              SHA1

                                                                                              f14be6065ce3f95dfc5aa923361ccc356d22b332

                                                                                              SHA256

                                                                                              5338ea2a092ca3ae17a1a56e5d06bd92a898ab4220342c5f1296c8dc65f87f42

                                                                                              SHA512

                                                                                              cdc06ec6bef64894862b9420169dd78810490d04a720eff260570a7fe05fc8e7df5d26b1f3f5746d035e8ac79511d8261dd318077d9b4031b2c5888a62b36eab

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\27c1cf2d-ab7a-44fb-9c0e-7e016dee1c1a.tmp
                                                                                              Filesize

                                                                                              2KB

                                                                                              MD5

                                                                                              4c265418b4fcd977c4319f13632932db

                                                                                              SHA1

                                                                                              dc257cfb20d28e0a615c1e3845cf0774c27e26b8

                                                                                              SHA256

                                                                                              b88b8ae12e66f73eb150ab29d539a71a56e375397bd2c57ebee260c04ec3c4fd

                                                                                              SHA512

                                                                                              a0f38d6a2885e5b9547020f0fec2556570b7c87db858d873477ce9768801e48a59088e9c37ed0ae6423a7a6c0637d40d3ca6c4db9604a07ab7ec5cf02d9427fb

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                                                              Filesize

                                                                                              874B

                                                                                              MD5

                                                                                              9954286791fbe85fcc39a455f58b6335

                                                                                              SHA1

                                                                                              474e3f1b228fffa5e91ac58a29d02b8c08351b9c

                                                                                              SHA256

                                                                                              49843c3ec34a4c7c95934bd7858c02d637ba12d0ecbf85dada69988393dc7e33

                                                                                              SHA512

                                                                                              2634d0ed1d6a89123b020e380e931b2c3cf6e0401447820c31e1b9b249d8c7f2ee2e8050153e46e0b71a6e8698c74592711198e5c337c1257c34d2251b4ca5ff

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                                                              Filesize

                                                                                              874B

                                                                                              MD5

                                                                                              a28aed9e083f100c6c5c6d9a5aeee0a2

                                                                                              SHA1

                                                                                              274ef6b83948f8764541cf3b07244c52278552a7

                                                                                              SHA256

                                                                                              543ca69ac38809ec94ea6c42f57c95e269792bfd2e2d2778394020010e9078da

                                                                                              SHA512

                                                                                              b2b909cf5eac40595b5726e3892a0b08699457ce9c25607b754e8d3d94052eea1ae692ded67cc58275d6b22432f73be5b19621b8b6f1a9d0e806caa9808cfbbb

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              ebbcb4726760afc7f316c40b96d14d17

                                                                                              SHA1

                                                                                              926165cf0506460f0c555603502f56cb592737da

                                                                                              SHA256

                                                                                              34e7be272028192493e6081a11a8edf63dc8b975a8a623689705b044fef45b39

                                                                                              SHA512

                                                                                              256d96f36243c6b20074ee5c3bbf638ea386b42a7590d829fd282f3a4362ba1cb77570dd443d6fb9a17ef1f2c2dd0032fe8c0b155a198b04e8c25004065403e1

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                                              Filesize

                                                                                              7KB

                                                                                              MD5

                                                                                              3d23cf7a94519c3ede4424925e1518f1

                                                                                              SHA1

                                                                                              df93e01cbf191d4574c9ee885cc5ac88f34b9b57

                                                                                              SHA256

                                                                                              6c9b91cdddd1fc8251c0372d9380dcd36b01fafeb8fb379ab87a7dbab2fa5267

                                                                                              SHA512

                                                                                              0d400682e813cd1446656220969eb00cb08abc088fd51db40f1458bc59f2f0332693fc31096069b3b868f2a2dbe671c5de3a92ad9a338728e7f04ef3e3eb334d

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              b09f4e9d9a9dc2626eba3e954645151c

                                                                                              SHA1

                                                                                              902a87186dc7653126ddf1975aac326f137765a0

                                                                                              SHA256

                                                                                              33fc4de0c3be9d9d495c8cd7f0d1f84d63440322e3c6383728b178a387123390

                                                                                              SHA512

                                                                                              5bbf6dc5a68f3fc88188e69096b5f77334702db4105a69b4d361315da546853ca7f5e40caf440ae1cda92862d324726d6ff9b12c1ee6ccb8200227aa86e0db9b

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                                                                              Filesize

                                                                                              15KB

                                                                                              MD5

                                                                                              339943f2c3ce7a03c7c048d44f3acfb1

                                                                                              SHA1

                                                                                              509972b240c8f8e1b73b10fd616a42c436045b5b

                                                                                              SHA256

                                                                                              4f9901549f45ee0320c4a3fb1a436e198ee8700a754d612da8e30df01f2ee5d9

                                                                                              SHA512

                                                                                              206dcdd3c39e782a8fe74ec645194aa3c5e9cee8cd174108d346be1c1a1d2afd6f123e93df7ddf4ff00a2d4d52dd0270a66960e223aa5ed6b4d4fc800c0c0cb4

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                                              Filesize

                                                                                              146KB

                                                                                              MD5

                                                                                              baf6b3468f9cddff1a18a2195aaf7278

                                                                                              SHA1

                                                                                              30701c0dab33beb6552cd820441febb26bd13318

                                                                                              SHA256

                                                                                              6e84e672f42e674a45e2f77d8b834f95087837744bdfd1589d09dae2dbf6ac8a

                                                                                              SHA512

                                                                                              50b9a6ca465b4ebd5eeef3baebac8be7dc03e91c38628674b2c3fa2aa89e7eb8655c2ee044147b4ddf677cd9e04cdf55fb831eb1419f63e883cca0e9c6f7ebf9

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                                              Filesize

                                                                                              146KB

                                                                                              MD5

                                                                                              4da95f92474c590c723baa177d6984b3

                                                                                              SHA1

                                                                                              0bf962225452c5445fb61ac97dce3e2adb8b20d6

                                                                                              SHA256

                                                                                              9533dcee76d26d83e4a49945e67e7f74c7b0a74fe248f314992fa58804bd6c86

                                                                                              SHA512

                                                                                              af4348ad55a8665490c1cdef4968528a3d10ac0735c0b6fc5f5f3eca063b2c27f0fc423c4f54677ddd28e081e51c0ce013b9f658eabd1e49ccee3310e98df1e0

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                                              Filesize

                                                                                              72KB

                                                                                              MD5

                                                                                              1ef9d5c8c6d21ecd73bf2d40724c3c3f

                                                                                              SHA1

                                                                                              9c8db477e5c9b01b51e4668ba058e5d9110082f4

                                                                                              SHA256

                                                                                              7c46cb722ab68ff778961ff3ed6195bd3faf63f0b0823b9d549ef733cf50d239

                                                                                              SHA512

                                                                                              9a98ce5c3ebed6d9277ff17a097369b60e2448904d8009a7ce36733e0a04c94a8285950551c281f4739b925c6678b45e14e888ad535e51bee5c34c55911706f4

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                                                              Filesize

                                                                                              146KB

                                                                                              MD5

                                                                                              c548575c20b9e64e590cb8d8c1b4de3c

                                                                                              SHA1

                                                                                              666c3bb4398bc2b8dcf8fb8b5a758a3db3888400

                                                                                              SHA256

                                                                                              ba2be3145ced96e787c8c39b3cd8f4e3a927fb56d95a749f25598a653d949481

                                                                                              SHA512

                                                                                              cb8e2db0a3e5a52ffcece0e57643b5e408ca7e735d32c229922c18cd09c22062eaf5a2021c2b65fb067f5984287c99d2bfe1251616863d76b74d71fc1f0d23b4

                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                                                                              Filesize

                                                                                              2B

                                                                                              MD5

                                                                                              99914b932bd37a50b983c5e7c90ae93b

                                                                                              SHA1

                                                                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                              SHA256

                                                                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                              SHA512

                                                                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-CDAUJ.tmp\_isetup\_iscrypt.dll
                                                                                              Filesize

                                                                                              2KB

                                                                                              MD5

                                                                                              a69559718ab506675e907fe49deb71e9

                                                                                              SHA1

                                                                                              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                              SHA256

                                                                                              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                              SHA512

                                                                                              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-LALOO.tmp\is-UOII5.tmp
                                                                                              Filesize

                                                                                              662KB

                                                                                              MD5

                                                                                              52ed505dc89666fb6e32b62c78e36cbb

                                                                                              SHA1

                                                                                              f0bcb28f938f34179ba8e633c20d2c55554b2b99

                                                                                              SHA256

                                                                                              a25d1789d0875ccfe21c6eb69805e5aab5d879dc78adc44c3d5afdfb5e6fba52

                                                                                              SHA512

                                                                                              9411329a057976d98e3fd3a72ffe75392619b83782170a32642d6ec2ef35794e70aa88aba56506881f33f52b081b3708b602a68717d08b9b01b8e0b92c064060

                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-LALOO.tmp\is-UOII5.tmp
                                                                                              Filesize

                                                                                              662KB

                                                                                              MD5

                                                                                              52ed505dc89666fb6e32b62c78e36cbb

                                                                                              SHA1

                                                                                              f0bcb28f938f34179ba8e633c20d2c55554b2b99

                                                                                              SHA256

                                                                                              a25d1789d0875ccfe21c6eb69805e5aab5d879dc78adc44c3d5afdfb5e6fba52

                                                                                              SHA512

                                                                                              9411329a057976d98e3fd3a72ffe75392619b83782170a32642d6ec2ef35794e70aa88aba56506881f33f52b081b3708b602a68717d08b9b01b8e0b92c064060

                                                                                            • C:\Users\Admin\Desktop\novaya_papka.rar_id25814757.exe
                                                                                              Filesize

                                                                                              1.3MB

                                                                                              MD5

                                                                                              520b5aedc6da20023cfae3ff6b6998c3

                                                                                              SHA1

                                                                                              6c40cb2643acc1155937e48a5bdfc41d7309d629

                                                                                              SHA256

                                                                                              21899e226502fe63b066c51d76869c4ec5dbd03570551cea657d1dd5c97e7070

                                                                                              SHA512

                                                                                              714dedbb46f16ec64eb0883462635cfa8cbb870b8bc05a419ebe272f82997f71e9bdb1adcdedd62fda7a1032cffca2b8ec93d2fdf4b5f3fa8dedbe7274372c6d

                                                                                            • C:\Users\Admin\Desktop\novaya_papka.rar_id25814757.exe
                                                                                              Filesize

                                                                                              1.3MB

                                                                                              MD5

                                                                                              520b5aedc6da20023cfae3ff6b6998c3

                                                                                              SHA1

                                                                                              6c40cb2643acc1155937e48a5bdfc41d7309d629

                                                                                              SHA256

                                                                                              21899e226502fe63b066c51d76869c4ec5dbd03570551cea657d1dd5c97e7070

                                                                                              SHA512

                                                                                              714dedbb46f16ec64eb0883462635cfa8cbb870b8bc05a419ebe272f82997f71e9bdb1adcdedd62fda7a1032cffca2b8ec93d2fdf4b5f3fa8dedbe7274372c6d

                                                                                            • C:\Users\Admin\Downloads\novaya-papka_QVTFkYSp.zip.crdownload
                                                                                              Filesize

                                                                                              10.0MB

                                                                                              MD5

                                                                                              13ec5d2c228822e3f70fd41ba1170605

                                                                                              SHA1

                                                                                              0794f16efeed70082e8952698a8003fdb21b22a1

                                                                                              SHA256

                                                                                              887020beb5ad560325958c0d97a8f9fd2920c1e961ae920d51327f6b93e620a8

                                                                                              SHA512

                                                                                              bb0fbb20fedb369cd02c040d0841f33ce39d961fe64b7418cd638e40d8c8ba0b3e6ae9ade960f0728081fb720646c0dd6da016310126d4584a9f4e1d7f632a7e

                                                                                            • \??\pipe\crashpad_1176_ZFXXFYTNNXIBHLNX
                                                                                              MD5

                                                                                              d41d8cd98f00b204e9800998ecf8427e

                                                                                              SHA1

                                                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                              SHA256

                                                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                              SHA512

                                                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                            • memory/1496-358-0x0000000002230000-0x0000000002231000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1496-440-0x0000000000400000-0x00000000004B5000-memory.dmp
                                                                                              Filesize

                                                                                              724KB

                                                                                            • memory/2164-432-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/2164-431-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/2164-433-0x00000000045D0000-0x00000000045D1000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/2164-435-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/3240-439-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                              Filesize

                                                                                              80KB

                                                                                            • memory/3240-341-0x0000000000400000-0x0000000000414000-memory.dmp
                                                                                              Filesize

                                                                                              80KB

                                                                                            • memory/4216-471-0x0000000000490000-0x0000000000491000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/4216-472-0x0000000002CE0000-0x0000000002CE1000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/4216-470-0x0000000000920000-0x0000000000DB5000-memory.dmp
                                                                                              Filesize

                                                                                              4.6MB

                                                                                            • memory/4216-466-0x0000000002CE0000-0x0000000002CE1000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/4216-465-0x0000000000490000-0x0000000000491000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/4216-464-0x0000000000920000-0x0000000000DB5000-memory.dmp
                                                                                              Filesize

                                                                                              4.6MB

                                                                                            • memory/5056-441-0x0000000004290000-0x0000000004291000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5056-456-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/5056-452-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/5056-449-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/5056-446-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/5056-445-0x0000000004290000-0x0000000004291000-memory.dmp
                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/5056-442-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB

                                                                                            • memory/5056-438-0x0000000000400000-0x0000000001747000-memory.dmp
                                                                                              Filesize

                                                                                              19.3MB