Malware Analysis Report

2025-03-15 03:51

Sample ID 230827-avfmssee57
Target 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4
SHA256 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4
Tags
fatalrat infostealer persistence rat upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4

Threat Level: Known bad

The file 70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4 was found to be: Known bad.

Malicious Activity Summary

fatalrat infostealer persistence rat upx

FatalRat

Fatal Rat payload

Downloads MZ/PE file

UPX packed file

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Drops file in Windows directory

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-27 00:31

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-27 00:31

Reported

2023-08-27 00:34

Platform

win7-20230712-en

Max time kernel

119s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe"

Signatures

FatalRat

infostealer rat fatalrat

Fatal Rat payload

rat infostealer
Description Indicator Process Target
N/A N/A N/A N/A

Downloads MZ/PE file

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" C:\Windows\DNomb\spolsvt.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2952 set thread context of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2436 set thread context of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\Identity-V C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\PDXFile_8.ico C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can.fca C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1258.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AXE8SharedExpat.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\helpmap.txt C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\RTC.der C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Regular.otf C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\add_reviewer.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\info.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\main.css C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt32.clx C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\br.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_received.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_lg.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tl.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\APIFile_8.ico C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.hsp C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\icudt36.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Onix32.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt04.hsp C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeLinguistic.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInAcrobat.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.fca C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ROMANIAN.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng32.clx C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\vdk150.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.hyp C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can03.ths C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_distributed.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can129.hsp C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\letsvpn-latest.exe C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SecStoreFile.ico C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Bold.otf C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\GREEK.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1257.TXT C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pmd.cer C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_super.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Bold.otf C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can32.clx C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\JP2KLib.dll C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInTray.gif C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\DNomb\spolsvt.exe C:\Program Files (x86)\m3.exe N/A
File created C:\Windows\DNomb\yh.png C:\Program Files (x86)\m3.exe N/A
File created C:\Windows\DNomb\PTvrst.exe C:\Program Files (x86)\m3.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2456 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2456 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2456 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2456 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2456 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp
PID 2456 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp
PID 2456 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp
PID 2456 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp
PID 2456 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 2456 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 2456 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 2456 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2952 wrote to memory of 2436 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2436 wrote to memory of 2588 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2456 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
PID 2456 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
PID 2456 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
PID 2456 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe
PID 2840 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2840 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2840 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe
PID 2840 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\system32\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe

"C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe"

C:\Windows\system32\cmd.exe

cmd.exe /c set

C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp

7zG_exe x "C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe" -y -aoa -o"C:\Program Files (x86)\"

C:\Program Files (x86)\m3.exe

"C:\Program Files (x86)\\m3.exe"

C:\Windows\DNomb\spolsvt.exe

C:\Windows\DNomb\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Users\Public\Documents\123\PTvrst.exe

"C:\Users\Public\Documents\123\PTvrst.exe"

C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe

PECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~8150772726496551949.cmd"

C:\Windows\system32\cmd.exe

cmd /c "C:\Users\Admin\AppData\Local\Temp\~8150772726496551949.cmd"

Network

Country Destination Domain Proto
US 8.8.8.8:53 testvvv123.oss-cn-hongkong.aliyuncs.com udp
HK 47.75.18.48:443 testvvv123.oss-cn-hongkong.aliyuncs.com tcp
US 8.8.8.8:53 hu5.wccabc.com udp
HK 8.218.53.104:3927 hu5.wccabc.com tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 104.85.1.163:80 www.microsoft.com tcp

Files

memory/2456-0-0x0000000000400000-0x0000000000572000-memory.dmp

\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp

MD5 7c4718943bd3f66ebdb47ccca72c7b1e
SHA1 f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA256 4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512 e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

C:\Users\Admin\AppData\Local\Temp\~568895011252200263~\sg.tmp

MD5 7c4718943bd3f66ebdb47ccca72c7b1e
SHA1 f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA256 4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512 e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

C:\Program Files (x86)\m3.exe

MD5 8e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA1 1e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA256 41ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512 550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e

memory/2456-16-0x0000000001E10000-0x0000000001E20000-memory.dmp

\Program Files (x86)\m3.exe

MD5 8e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA1 1e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA256 41ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512 550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e

\Program Files (x86)\m3.exe

MD5 8e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA1 1e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA256 41ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512 550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e

C:\Program Files (x86)\m3.exe

MD5 8e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA1 1e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA256 41ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512 550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e

memory/2456-20-0x0000000002F20000-0x0000000003072000-memory.dmp

memory/2952-21-0x0000000000DA0000-0x0000000000EF2000-memory.dmp

\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2436-44-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2436-45-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2436-46-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2436-49-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2436-51-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2436-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2436-53-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2436-59-0x0000000000400000-0x0000000000516000-memory.dmp

\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/2588-69-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/2588-71-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2588-73-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2588-76-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2588-79-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2588-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/2588-84-0x0000000000400000-0x0000000000430000-memory.dmp

memory/2588-85-0x0000000010000000-0x000000001002A000-memory.dmp

memory/2456-90-0x0000000000400000-0x0000000000572000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/2456-92-0x0000000001E10000-0x0000000001E20000-memory.dmp

memory/2456-94-0x0000000002F20000-0x0000000003072000-memory.dmp

memory/2952-96-0x0000000000DA0000-0x0000000000EF2000-memory.dmp

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

memory/540-100-0x0000000000400000-0x00000000006A2000-memory.dmp

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

memory/2952-101-0x0000000000DA0000-0x0000000000EF2000-memory.dmp

memory/540-102-0x0000000077A50000-0x0000000077A52000-memory.dmp

memory/540-103-0x0000000004310000-0x0000000004311000-memory.dmp

memory/540-104-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/540-105-0x00000000041D0000-0x00000000041D1000-memory.dmp

memory/540-107-0x0000000004270000-0x0000000004271000-memory.dmp

memory/540-108-0x0000000004300000-0x0000000004301000-memory.dmp

memory/540-106-0x00000000042A0000-0x00000000042A1000-memory.dmp

memory/540-109-0x0000000004240000-0x0000000004241000-memory.dmp

memory/540-110-0x00000000042F0000-0x00000000042F2000-memory.dmp

memory/540-112-0x0000000004320000-0x0000000004321000-memory.dmp

memory/540-111-0x0000000004230000-0x0000000004231000-memory.dmp

memory/540-113-0x00000000041C0000-0x00000000041C1000-memory.dmp

memory/540-114-0x0000000004290000-0x0000000004291000-memory.dmp

memory/540-115-0x00000000042E0000-0x00000000042E1000-memory.dmp

memory/540-116-0x00000000042B0000-0x00000000042B1000-memory.dmp

memory/540-117-0x0000000004330000-0x0000000004331000-memory.dmp

memory/540-118-0x00000000007C0000-0x00000000007C1000-memory.dmp

memory/540-120-0x00000000042D0000-0x00000000042D1000-memory.dmp

memory/540-121-0x0000000004360000-0x0000000004361000-memory.dmp

memory/540-119-0x0000000004280000-0x0000000004281000-memory.dmp

memory/540-122-0x0000000004580000-0x0000000004582000-memory.dmp

memory/540-123-0x0000000004380000-0x0000000004381000-memory.dmp

memory/2456-124-0x0000000000400000-0x0000000000572000-memory.dmp

memory/540-125-0x00000000042C0000-0x00000000042C1000-memory.dmp

memory/540-126-0x0000000004340000-0x0000000004341000-memory.dmp

memory/540-127-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/540-128-0x0000000004250000-0x0000000004251000-memory.dmp

C:\Program Files (x86)\letsvpn-latest.exe

MD5 291be48f62359b80b3774eb4699e0e79
SHA1 09e1ba3935cb3950160859584242aa1919cfd73c
SHA256 7ccac89afb5c01a8b22e2d82cfe2293f169a2e963c2780e40008b588938975fa
SHA512 e7fabc74a164b315bd91f3d793023139da8b85bbf02b68214d21ddedcdd8f9a8180a4b0c9db9210dd8891d2cd13ce970530f869a750d5b1057c296c5dba3b1a4

memory/540-131-0x0000000004250000-0x0000000004251000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\~8150772726496551949.cmd

MD5 42ff656bd4ee3e19a5828940041fdfdb
SHA1 2e3c7f0fd42dd48b014e82e9e5edf50664ae5698
SHA256 b326705c28abc9947182f84830e0e680d35551157b408a0f9cfd137279a02838
SHA512 4ba36b5e44c94df09b91b3557237dae6b74a9fe04da686f157938446cf635c464f616126e937400ee4d577708b3bdcb7f88cec8df23d344bfd7105b75f9ec7b0

memory/2456-146-0x000000000A680000-0x000000000A7F2000-memory.dmp

memory/2456-145-0x0000000000400000-0x0000000000572000-memory.dmp

memory/2840-148-0x0000000000400000-0x0000000000572000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\~8150772726496551949.cmd

MD5 42ff656bd4ee3e19a5828940041fdfdb
SHA1 2e3c7f0fd42dd48b014e82e9e5edf50664ae5698
SHA256 b326705c28abc9947182f84830e0e680d35551157b408a0f9cfd137279a02838
SHA512 4ba36b5e44c94df09b91b3557237dae6b74a9fe04da686f157938446cf635c464f616126e937400ee4d577708b3bdcb7f88cec8df23d344bfd7105b75f9ec7b0

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-27 00:31

Reported

2023-08-27 00:34

Platform

win10v2004-20230703-en

Max time kernel

151s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe"

Signatures

FatalRat

infostealer rat fatalrat

Fatal Rat payload

rat infostealer
Description Indicator Process Target
N/A N/A N/A N/A

Downloads MZ/PE file

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" C:\Windows\DNomb\spolsvt.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 888 set thread context of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 4140 set thread context of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\m3.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
File opened for modification C:\Program Files (x86)\m3.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
File created C:\Program Files (x86)\letsvpn-latest.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
File opened for modification C:\Program Files (x86)\letsvpn-latest.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\DNomb\spolsvt.exe C:\Program Files (x86)\m3.exe N/A
File created C:\Windows\DNomb\yh.png C:\Program Files (x86)\m3.exe N/A
File created C:\Windows\DNomb\PTvrst.exe C:\Program Files (x86)\m3.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings C:\Program Files (x86)\m3.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Program Files (x86)\m3.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2640 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\SYSTEM32\cmd.exe
PID 2640 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Windows\SYSTEM32\cmd.exe
PID 2640 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp
PID 2640 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp
PID 2640 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp
PID 2640 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 2640 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 2640 wrote to memory of 888 N/A C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe C:\Program Files (x86)\m3.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 888 wrote to memory of 4140 N/A C:\Program Files (x86)\m3.exe C:\Windows\DNomb\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 4140 wrote to memory of 3116 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Processes

C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe

"C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe"

C:\Windows\SYSTEM32\cmd.exe

cmd.exe /c set

C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp

7zG_exe x "C:\Users\Admin\AppData\Local\Temp\70032d6d08402516ab464181773608750231cf5036a9f1cddfc9aad250ee76b4.exe" -y -aoa -o"C:\Program Files (x86)\"

C:\Program Files (x86)\m3.exe

"C:\Program Files (x86)\\m3.exe"

C:\Windows\DNomb\spolsvt.exe

C:\Windows\DNomb\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Users\Public\Documents\123\PTvrst.exe

"C:\Users\Public\Documents\123\PTvrst.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 testvvv123.oss-cn-hongkong.aliyuncs.com udp
HK 47.75.18.48:443 testvvv123.oss-cn-hongkong.aliyuncs.com tcp
US 8.8.8.8:53 48.18.75.47.in-addr.arpa udp
US 8.8.8.8:53 226.20.18.104.in-addr.arpa udp
US 8.8.8.8:53 226.21.18.104.in-addr.arpa udp
US 8.8.8.8:53 hu5.wccabc.com udp
HK 8.218.53.104:3927 hu5.wccabc.com tcp
US 8.8.8.8:53 104.53.218.8.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 6.173.189.20.in-addr.arpa udp

Files

memory/2640-0-0x0000000000400000-0x0000000000572000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\~6955278722715525918~\sg.tmp

MD5 7c4718943bd3f66ebdb47ccca72c7b1e
SHA1 f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA256 4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512 e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

C:\Program Files (x86)\m3.exe

MD5 8e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA1 1e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA256 41ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512 550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e

C:\Program Files (x86)\m3.exe

MD5 8e20fbdc0ce6cbf27fcc7d3ae77b455f
SHA1 1e1009abe3adc82d6e6070a7e6d4bcddd33a02f3
SHA256 41ec2cee1770658a5f7d52ef1d5705a18fe1bffd27832694c2a92c4c42f9b2e9
SHA512 550b0b8f05e383f9eb2da0de3f51961af25a36646d33cdbbb51e974602410d3172547d1bdb86b60ee276485537e8bcc88f9b16898c2a6bfad774b4dffccbb91e

memory/888-15-0x0000000000F30000-0x0000000001082000-memory.dmp

memory/4140-24-0x0000000000400000-0x0000000000516000-memory.dmp

memory/4140-25-0x0000000000400000-0x0000000000516000-memory.dmp

memory/4140-26-0x0000000000400000-0x0000000000516000-memory.dmp

memory/4140-27-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/4140-32-0x0000000000400000-0x0000000000516000-memory.dmp

memory/4140-33-0x0000000000400000-0x0000000000516000-memory.dmp

memory/3116-38-0x0000000000400000-0x0000000000430000-memory.dmp

memory/3116-39-0x0000000000400000-0x0000000000430000-memory.dmp

memory/3116-40-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/3116-44-0x0000000000400000-0x0000000000430000-memory.dmp

memory/3116-45-0x0000000010000000-0x000000001002A000-memory.dmp

memory/2640-50-0x0000000000400000-0x0000000000572000-memory.dmp

memory/888-53-0x0000000000F30000-0x0000000001082000-memory.dmp

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

memory/2748-57-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/888-58-0x0000000000F30000-0x0000000001082000-memory.dmp

memory/2748-59-0x0000000077564000-0x0000000077566000-memory.dmp

memory/2748-60-0x00000000047F0000-0x00000000047F1000-memory.dmp

memory/2748-61-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/2748-62-0x0000000004750000-0x0000000004751000-memory.dmp

memory/2748-63-0x00000000047B0000-0x00000000047B1000-memory.dmp

memory/2748-64-0x0000000004780000-0x0000000004781000-memory.dmp

memory/2748-66-0x00000000047E0000-0x00000000047E2000-memory.dmp

memory/2748-65-0x0000000004760000-0x0000000004761000-memory.dmp

memory/2748-67-0x0000000004800000-0x0000000004801000-memory.dmp

memory/2748-68-0x0000000004740000-0x0000000004741000-memory.dmp

memory/2748-69-0x00000000047A0000-0x00000000047A1000-memory.dmp

memory/2748-71-0x00000000047C0000-0x00000000047C1000-memory.dmp

memory/2748-72-0x0000000004820000-0x0000000004821000-memory.dmp

memory/2748-73-0x0000000004900000-0x0000000004901000-memory.dmp

memory/2748-74-0x0000000004880000-0x0000000004881000-memory.dmp

memory/2748-70-0x00000000047D0000-0x00000000047D1000-memory.dmp

memory/2748-76-0x0000000004860000-0x0000000004861000-memory.dmp

memory/2748-75-0x0000000004790000-0x0000000004791000-memory.dmp

memory/2748-77-0x0000000004890000-0x0000000004891000-memory.dmp

memory/2640-78-0x0000000000400000-0x0000000000572000-memory.dmp

memory/2748-79-0x0000000004830000-0x0000000004831000-memory.dmp

memory/2748-80-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/2748-81-0x0000000004770000-0x0000000004771000-memory.dmp