Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27-08-2023 00:31
Behavioral task
behavioral1
Sample
70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
Resource
win10v2004-20230703-en
General
-
Target
70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
-
Size
15.4MB
-
MD5
72fa8fdb2aeac623d34c8635744670a4
-
SHA1
1bcb5e0b3f43d0529650225b05e79cf8c59123fc
-
SHA256
70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4
-
SHA512
9398f3a55c978ce993f87595a619f025815fec63e97b15de42ff1acdf8bd770791bdbdfe71ad2ea61fa7af838deb5ef34af4616bf1f15e0829faa82421298b22
-
SSDEEP
393216:ZZ5ubaquU3Ie1no4aHLup8f7A2yefA4KaxEzJm:ZZIbMU3Z1J7ODR1fzKamJm
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/2588-85-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1080 sg.tmp 2952 m3.exe 2436 spolsvt.exe 2588 spolsvt.exe 540 PTvrst.exe -
Loads dropped DLL 7 IoCs
pid Process 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 2952 m3.exe 2952 m3.exe 2436 spolsvt.exe 2436 spolsvt.exe -
resource yara_rule behavioral1/memory/2456-0-0x0000000000400000-0x0000000000572000-memory.dmp upx behavioral1/files/0x001c000000016ca2-14.dat upx behavioral1/files/0x001c000000016ca2-18.dat upx behavioral1/files/0x001c000000016ca2-15.dat upx behavioral1/files/0x001c000000016ca2-19.dat upx behavioral1/memory/2456-20-0x0000000002F20000-0x0000000003072000-memory.dmp upx behavioral1/memory/2952-21-0x0000000000DA0000-0x0000000000EF2000-memory.dmp upx behavioral1/memory/2456-90-0x0000000000400000-0x0000000000572000-memory.dmp upx behavioral1/memory/2952-96-0x0000000000DA0000-0x0000000000EF2000-memory.dmp upx behavioral1/memory/2952-101-0x0000000000DA0000-0x0000000000EF2000-memory.dmp upx behavioral1/memory/2456-124-0x0000000000400000-0x0000000000572000-memory.dmp upx behavioral1/memory/2456-145-0x0000000000400000-0x0000000000572000-memory.dmp upx behavioral1/memory/2840-148-0x0000000000400000-0x0000000000572000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" PTvrst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 540 PTvrst.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2952 set thread context of 2436 2952 m3.exe 35 PID 2436 set thread context of 2588 2436 spolsvt.exe 36 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\Identity-V 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\PDXFile_8.ico 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.fca 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXE8SharedExpat.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\helpmap.txt 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RTC.der 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Regular.otf 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\add_reviewer.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\info.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\main.css 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt32.clx 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\br.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_received.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_lg.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tl.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\APIFile_8.ico 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.hsp 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\icudt36.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Onix32.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt04.hsp 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeLinguistic.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.fca 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMANIAN.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng32.clx 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\vdk150.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.hyp 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can03.ths 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_distributed.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can129.hsp 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\letsvpn-latest.exe sg.tmp File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SecStoreFile.ico 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Bold.otf 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\GREEK.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1257.TXT 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pmd.cer 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_super.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Bold.otf 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can32.clx 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\JP2KLib.dll 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInTray.gif 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\DNomb\spolsvt.exe m3.exe File created C:\Windows\DNomb\yh.png m3.exe File created C:\Windows\DNomb\PTvrst.exe m3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 2952 m3.exe 2952 m3.exe 2952 m3.exe 2952 m3.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2588 spolsvt.exe 2436 spolsvt.exe 2436 spolsvt.exe 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 540 PTvrst.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeBackupPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeRestorePrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: 33 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeIncBasePriorityPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeCreateGlobalPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: 33 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeIncBasePriorityPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: 33 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeIncBasePriorityPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeRestorePrivilege 1080 sg.tmp Token: 35 1080 sg.tmp Token: SeSecurityPrivilege 1080 sg.tmp Token: SeSecurityPrivilege 1080 sg.tmp Token: 33 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeIncBasePriorityPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeDebugPrivilege 2588 spolsvt.exe Token: SeDebugPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: 33 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeIncBasePriorityPrivilege 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeBackupPrivilege 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeRestorePrivilege 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: 33 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe Token: SeIncBasePriorityPrivilege 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 m3.exe 2952 m3.exe 2436 spolsvt.exe 2436 spolsvt.exe 540 PTvrst.exe 540 PTvrst.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2496 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 28 PID 2456 wrote to memory of 2496 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 28 PID 2456 wrote to memory of 2496 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 28 PID 2456 wrote to memory of 2496 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 28 PID 2456 wrote to memory of 1080 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 30 PID 2456 wrote to memory of 1080 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 30 PID 2456 wrote to memory of 1080 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 30 PID 2456 wrote to memory of 1080 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 30 PID 2456 wrote to memory of 2952 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 32 PID 2456 wrote to memory of 2952 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 32 PID 2456 wrote to memory of 2952 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 32 PID 2456 wrote to memory of 2952 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 32 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2952 wrote to memory of 2436 2952 m3.exe 35 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2436 wrote to memory of 2588 2436 spolsvt.exe 36 PID 2456 wrote to memory of 2840 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 41 PID 2456 wrote to memory of 2840 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 41 PID 2456 wrote to memory of 2840 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 41 PID 2456 wrote to memory of 2840 2456 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 41 PID 2840 wrote to memory of 2700 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 43 PID 2840 wrote to memory of 2700 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 43 PID 2840 wrote to memory of 2700 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 43 PID 2840 wrote to memory of 2700 2840 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe"C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe" -y -aoa -o"C:\Program Files (x86)\"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Program Files (x86)\m3.exe"C:\Program Files (x86)\\m3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~8150772726496551949.cmd"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~8150772726496551949.cmd"3⤵PID:2700
-
-
-
C:\Users\Public\Documents\123\PTvrst.exe"C:\Users\Public\Documents\123\PTvrst.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.3MB
MD5291be48f62359b80b3774eb4699e0e79
SHA109e1ba3935cb3950160859584242aa1919cfd73c
SHA2567ccac89afb5c01a8b22e2d82cfe2293f169a2e963c2780e40008b588938975fa
SHA512e7fabc74a164b315bd91f3d793023139da8b85bbf02b68214d21ddedcdd8f9a8180a4b0c9db9210dd8891d2cd13ce970530f869a750d5b1057c296c5dba3b1a4
-
Filesize
394KB
MD58e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA11e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA25641ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e
-
Filesize
394KB
MD58e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA11e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA25641ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
280B
MD542ff656bd4ee3e19a5828940041fdfdb
SHA12e3c7f0fd42dd48b014e82e9e5edf50664ae5698
SHA256b326705c28abc9947182f84830e0e680d35551157b408a0f9cfd137279a02838
SHA5124ba36b5e44c94df09b91b3557237dae6b74a9fe04da686f157938446cf635c464f616126e937400ee4d577708b3bdcb7f88cec8df23d344bfd7105b75f9ec7b0
-
Filesize
280B
MD542ff656bd4ee3e19a5828940041fdfdb
SHA12e3c7f0fd42dd48b014e82e9e5edf50664ae5698
SHA256b326705c28abc9947182f84830e0e680d35551157b408a0f9cfd137279a02838
SHA5124ba36b5e44c94df09b91b3557237dae6b74a9fe04da686f157938446cf635c464f616126e937400ee4d577708b3bdcb7f88cec8df23d344bfd7105b75f9ec7b0
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
394KB
MD58e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA11e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA25641ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e
-
Filesize
394KB
MD58e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA11e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA25641ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4