Malware Analysis Report

2025-03-15 03:51

Sample ID 230905-nj5pfafa6t
Target a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1
SHA256 a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1
Tags
upx fatalrat evasion infostealer persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1

Threat Level: Known bad

The file a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1 was found to be: Known bad.

Malicious Activity Summary

upx fatalrat evasion infostealer persistence rat

FatalRat

Fatal Rat payload

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Checks computer location settings

Loads dropped DLL

Identifies Wine through registry keys

UPX packed file

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Checks processor information in registry

Modifies registry class

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-09-05 11:26

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-05 11:26

Reported

2023-09-05 11:29

Platform

win7-20230831-en

Max time kernel

119s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe"

Signatures

FatalRat

infostealer rat fatalrat

Fatal Rat payload

rat infostealer
Description Indicator Process Target
N/A N/A N/A N/A

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Public\Documents\123\PTvrst.exe N/A

Downloads MZ/PE file

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Wine C:\Users\Public\Documents\123\PTvrst.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" C:\Windows\DNomb\spolsvt.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2148 set thread context of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2516 set thread context of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\AdobePDF417.pmp C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.THD C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File created C:\Program Files (x86)\ChromeSetup.exe C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.SYX C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\3difr.x3d C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\end_review.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\WindowsMedia.mpp C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search5.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.LIC C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_all.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\PDFPrevHndlr.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ViewerPS.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\JSByteCodeWin.bin C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SaveAsRTF.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\bl.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\br.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pmd.cer C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\form_responses.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_ok.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\atl.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ccme_base.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\acro20.lng C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeXMP.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\HLS.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\2d.x3d C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Checkers.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\DigSig.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\tr.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\warning.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIB.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\DVA.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\weblink.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\sqlite.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeLinguistic.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGM.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\add_reviewer.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\create_form.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm.api C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\DNomb\PTvrst.exe C:\Program Files (x86)\q1.exe N/A
File created C:\Windows\DNomb\spolsvt.exe C:\Program Files (x86)\q1.exe N/A
File created C:\Windows\DNomb\yh.png C:\Program Files (x86)\q1.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Public\Documents\t\spolsvt.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Users\Public\Documents\t\spolsvt.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Public\Documents\t\spolsvt.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2228 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 2228 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 2228 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 2228 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2148 wrote to memory of 2516 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 2516 wrote to memory of 1064 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe

"C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe"

C:\Program Files (x86)\q1.exe

"C:\Program Files (x86)\q1.exe"

C:\Windows\DNomb\spolsvt.exe

C:\Windows\DNomb\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Users\Public\Documents\123\PTvrst.exe

"C:\Users\Public\Documents\123\PTvrst.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 testvvv123.oss-cn-hongkong.aliyuncs.com udp
HK 47.75.18.48:443 testvvv123.oss-cn-hongkong.aliyuncs.com tcp
US 8.8.8.8:53 pipi.wccabc.com udp
HK 154.23.176.188:3927 pipi.wccabc.com tcp

Files

memory/2228-0-0x0000000000400000-0x000000000042D000-memory.dmp

\Program Files (x86)\q1.exe

MD5 32865e3033c398c38c8e1d29482ca61e
SHA1 6b6b220cda653101a0adcc1f027016f2262292a6
SHA256 b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c
SHA512 54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

C:\Program Files (x86)\q1.exe

MD5 32865e3033c398c38c8e1d29482ca61e
SHA1 6b6b220cda653101a0adcc1f027016f2262292a6
SHA256 b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c
SHA512 54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

memory/2228-9-0x00000000026A0000-0x00000000027F2000-memory.dmp

C:\Program Files (x86)\q1.exe

MD5 32865e3033c398c38c8e1d29482ca61e
SHA1 6b6b220cda653101a0adcc1f027016f2262292a6
SHA256 b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c
SHA512 54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

memory/2148-11-0x00000000002B0000-0x0000000000402000-memory.dmp

\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2516-34-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2516-36-0x0000000000400000-0x0000000000516000-memory.dmp

\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2516-38-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2516-40-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2516-42-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2516-44-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2516-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/2516-50-0x0000000000400000-0x0000000000516000-memory.dmp

\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/1064-60-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/1064-62-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1064-64-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1064-67-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1064-70-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1064-71-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/1064-76-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1064-77-0x0000000010000000-0x000000001002A000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/2228-83-0x0000000000400000-0x000000000042D000-memory.dmp

memory/2148-85-0x00000000002B0000-0x0000000000402000-memory.dmp

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

memory/2044-89-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/2148-90-0x00000000002B0000-0x0000000000402000-memory.dmp

memory/2228-94-0x0000000000400000-0x000000000042D000-memory.dmp

memory/2044-95-0x0000000076FF0000-0x0000000076FF2000-memory.dmp

memory/2044-96-0x0000000004310000-0x0000000004311000-memory.dmp

memory/2044-97-0x0000000004290000-0x0000000004291000-memory.dmp

memory/2044-98-0x0000000004260000-0x0000000004262000-memory.dmp

memory/2044-99-0x0000000004300000-0x0000000004301000-memory.dmp

memory/2044-100-0x00000000042F0000-0x00000000042F1000-memory.dmp

memory/2044-101-0x0000000004230000-0x0000000004231000-memory.dmp

memory/2044-102-0x00000000042E0000-0x00000000042E2000-memory.dmp

memory/2044-103-0x0000000004220000-0x0000000004221000-memory.dmp

memory/2044-104-0x00000000041F0000-0x00000000041F1000-memory.dmp

memory/2044-105-0x0000000004280000-0x0000000004281000-memory.dmp

memory/2044-106-0x00000000042C0000-0x00000000042C1000-memory.dmp

memory/2044-107-0x00000000042A0000-0x00000000042A1000-memory.dmp

memory/2044-108-0x0000000004320000-0x0000000004321000-memory.dmp

memory/2044-110-0x0000000004080000-0x0000000004081000-memory.dmp

memory/2044-109-0x0000000004380000-0x0000000004381000-memory.dmp

memory/2044-112-0x00000000042B0000-0x00000000042B1000-memory.dmp

memory/2044-111-0x0000000004270000-0x0000000004271000-memory.dmp

memory/2044-113-0x0000000004350000-0x0000000004351000-memory.dmp

memory/2044-114-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/2044-115-0x0000000004200000-0x0000000004201000-memory.dmp

memory/2044-116-0x0000000004370000-0x0000000004371000-memory.dmp

memory/2044-119-0x0000000004240000-0x0000000004241000-memory.dmp

memory/2044-118-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/2044-117-0x0000000004330000-0x0000000004331000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-05 11:26

Reported

2023-09-05 11:29

Platform

win10v2004-20230831-en

Max time kernel

141s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe"

Signatures

FatalRat

infostealer rat fatalrat

Fatal Rat payload

rat infostealer
Description Indicator Process Target
N/A N/A N/A N/A

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Public\Documents\123\PTvrst.exe N/A

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Software\Wine C:\Users\Public\Documents\123\PTvrst.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" C:\Windows\DNomb\spolsvt.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4672 set thread context of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 3904 set thread context of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Review_RHP.aapp C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ar-ae\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_up_selected_18.svg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\check_2x.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\eu-es\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\[email protected] C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close_h2x.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\he-il\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ru-ru C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\zh-tw C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reportabuse-default_18.svg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\arrow-right.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-right-pressed.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\sv-se\AppStore_icon.svg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_close_h2x.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\uk-ua\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\AddressBook2x.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\dark\warning.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\uk-ua C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\info.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugin.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\dark\rhp_world_icon_hover_2x.png C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluError_136x136.svg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-si\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\es-es\PlayStore_icon.svg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\widevinecdmadapter.dll C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\AdobePDF417.pmp C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ca-es C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\protect_poster.jpg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ro-ro C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-gb\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-left-pressed.gif C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\ui-strings.js C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ro_get.svg C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\css C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\DNomb\yh.png C:\Program Files (x86)\q1.exe N/A
File created C:\Windows\DNomb\PTvrst.exe C:\Program Files (x86)\q1.exe N/A
File created C:\Windows\DNomb\spolsvt.exe C:\Program Files (x86)\q1.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Public\Documents\t\spolsvt.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Users\Public\Documents\t\spolsvt.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000_Classes\Local Settings C:\Program Files (x86)\q1.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\t\spolsvt.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Public\Documents\t\spolsvt.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Program Files (x86)\q1.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Windows\DNomb\spolsvt.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A
N/A N/A C:\Users\Public\Documents\123\PTvrst.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2616 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 2616 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 2616 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe C:\Program Files (x86)\q1.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 4672 wrote to memory of 3904 N/A C:\Program Files (x86)\q1.exe C:\Windows\DNomb\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe
PID 3904 wrote to memory of 3432 N/A C:\Windows\DNomb\spolsvt.exe C:\Users\Public\Documents\t\spolsvt.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe

"C:\Users\Admin\AppData\Local\Temp\a945f87d013f6b70b25cf80ed405f0636d4d2c968079cfd542bd2eda37aba7d1.exe"

C:\Program Files (x86)\q1.exe

"C:\Program Files (x86)\q1.exe"

C:\Windows\DNomb\spolsvt.exe

C:\Windows\DNomb\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Users\Public\Documents\t\spolsvt.exe

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Users\Public\Documents\123\PTvrst.exe

"C:\Users\Public\Documents\123\PTvrst.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 testvvv123.oss-cn-hongkong.aliyuncs.com udp
HK 47.75.18.48:443 testvvv123.oss-cn-hongkong.aliyuncs.com tcp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 48.18.75.47.in-addr.arpa udp
US 8.8.8.8:53 226.21.18.104.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 pipi.wccabc.com udp
HK 154.23.176.188:3927 pipi.wccabc.com tcp
US 8.8.8.8:53 188.176.23.154.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 126.79.241.8.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

memory/2616-0-0x0000000000400000-0x000000000042D000-memory.dmp

C:\Program Files (x86)\q1.exe

MD5 32865e3033c398c38c8e1d29482ca61e
SHA1 6b6b220cda653101a0adcc1f027016f2262292a6
SHA256 b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c
SHA512 54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

C:\Program Files (x86)\q1.exe

MD5 32865e3033c398c38c8e1d29482ca61e
SHA1 6b6b220cda653101a0adcc1f027016f2262292a6
SHA256 b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c
SHA512 54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

memory/4672-14-0x0000000000680000-0x00000000007D2000-memory.dmp

C:\Program Files (x86)\q1.exe

MD5 32865e3033c398c38c8e1d29482ca61e
SHA1 6b6b220cda653101a0adcc1f027016f2262292a6
SHA256 b58c30c03b5f0634918ca3e582e5835df073f0c93cde562a1651cd6ea4d4227c
SHA512 54795c14d468e31b964156e67156d11a08dd7ad2b2673969bc5044932c00c2dbfb69eb7d08aa72672818e56b7cbd3970ba620ffe8aabafe98e343f2b00e28631

memory/3904-24-0x0000000000400000-0x0000000000516000-memory.dmp

memory/3904-25-0x0000000000400000-0x0000000000516000-memory.dmp

memory/3904-26-0x0000000000400000-0x0000000000516000-memory.dmp

memory/3904-27-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

C:\Windows\DNomb\spolsvt.exe

MD5 523d5c39f9d8d2375c3df68251fa2249
SHA1 d4ed365c44bec9246fc1a65a32a7791792647a10
SHA256 20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512 526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

memory/3904-32-0x0000000000400000-0x0000000000516000-memory.dmp

memory/3904-33-0x0000000000400000-0x0000000000516000-memory.dmp

memory/3432-38-0x0000000000400000-0x0000000000430000-memory.dmp

memory/3432-39-0x0000000000400000-0x0000000000430000-memory.dmp

memory/3432-40-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

C:\Users\Public\Documents\t\spolsvt.exe

MD5 cdce4713e784ae069d73723034a957ff
SHA1 9a393a6bab6568f1a774fb753353223f11367e09
SHA256 b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA512 0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

memory/3432-44-0x0000000000400000-0x0000000000430000-memory.dmp

memory/3432-46-0x0000000010000000-0x000000001002A000-memory.dmp

memory/2616-52-0x0000000000400000-0x000000000042D000-memory.dmp

memory/4672-54-0x0000000000680000-0x00000000007D2000-memory.dmp

memory/4672-55-0x0000000000680000-0x00000000007D2000-memory.dmp

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

C:\Users\Public\Documents\123\PTvrst.exe

MD5 d22cfb5bfaeb1503b12b07e53ef0a149
SHA1 8ea2c85e363f551a159fabd65377affed4e417a1
SHA256 260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512 151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

memory/524-59-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/4672-57-0x0000000000680000-0x00000000007D2000-memory.dmp

memory/524-63-0x00000000779F4000-0x00000000779F6000-memory.dmp

memory/524-64-0x00000000047F0000-0x00000000047F1000-memory.dmp

memory/524-65-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/524-68-0x0000000004780000-0x0000000004781000-memory.dmp

memory/524-66-0x0000000004750000-0x0000000004751000-memory.dmp

memory/524-69-0x0000000004760000-0x0000000004761000-memory.dmp

memory/524-71-0x0000000004800000-0x0000000004801000-memory.dmp

memory/524-67-0x00000000047B0000-0x00000000047B1000-memory.dmp

memory/524-72-0x00000000047A0000-0x00000000047A1000-memory.dmp

memory/524-70-0x00000000047E0000-0x00000000047E2000-memory.dmp

memory/524-73-0x00000000047D0000-0x00000000047D1000-memory.dmp

memory/524-74-0x00000000047C0000-0x00000000047C1000-memory.dmp

memory/524-75-0x0000000004820000-0x0000000004821000-memory.dmp

memory/524-76-0x0000000004880000-0x0000000004881000-memory.dmp

memory/524-77-0x0000000004740000-0x0000000004741000-memory.dmp

memory/524-79-0x0000000004860000-0x0000000004861000-memory.dmp

memory/524-78-0x0000000004790000-0x0000000004791000-memory.dmp

memory/524-80-0x0000000004A80000-0x0000000004A82000-memory.dmp

memory/524-81-0x0000000004890000-0x0000000004891000-memory.dmp

memory/2616-82-0x0000000000400000-0x000000000042D000-memory.dmp

memory/524-84-0x0000000000400000-0x00000000006A2000-memory.dmp

memory/524-83-0x0000000004830000-0x0000000004831000-memory.dmp

memory/524-85-0x0000000000400000-0x00000000006A2000-memory.dmp