Analysis
-
max time kernel
164s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2023 14:18
Static task
static1
Behavioral task
behavioral1
Sample
4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe
Resource
win10v2004-20230915-en
General
-
Target
4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe
-
Size
4.5MB
-
MD5
a35b88f8716f20f5a89adf37c752f27a
-
SHA1
6c6ae45f46e3afc66bba24d94c49718eac416483
-
SHA256
4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38
-
SHA512
7e52886e3c4819e40fe9870a8763da79abf8d14bd26a3c87fed38188664521c4b2109cd2a55a736e9281f8292397adb91366e0fc09825993c37cd93d7b824441
-
SSDEEP
98304:70bHVHZF9AnZp4WvOhvSmEHXK8L6nMWcAI3uL81Ah4DH/mviccF:7wVHZ3Ep4W213WXK8LUveeg1c4DH/mv
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/4472-57-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat behavioral2/memory/4412-52-0x0000000010000000-0x000000001002A000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PTvrst.exe -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 3564 spolsvt.exe 4540 spolsvt.exe 4412 spolsvt.exe 4472 spolsvt.exe 3816 PTvrst.exe 4620 spolsvt.exe 2280 spolsvt.exe 668 spolsvt.exe 4776 spolsvt.exe 744 spolsvt.exe 3684 spolsvt.exe 2444 spolsvt.exe 312 spolsvt.exe 2468 spolsvt.exe 3400 spolsvt.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Software\Wine PTvrst.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Therecontinuous = "C:\\WINDOWS\\DNomb\\PTvrst.exe" PTvrst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Users\\Public\\Documents\\123\\PTvrst.exe" spolsvt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 3816 PTvrst.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 2476 set thread context of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 set thread context of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 3564 set thread context of 4412 3564 spolsvt.exe 88 PID 4540 set thread context of 4472 4540 spolsvt.exe 90 PID 2476 set thread context of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 4620 set thread context of 2280 4620 spolsvt.exe 99 PID 2476 set thread context of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 3816 set thread context of 4776 3816 PTvrst.exe 101 PID 668 set thread context of 744 668 spolsvt.exe 102 PID 4776 set thread context of 3684 4776 spolsvt.exe 103 PID 2476 set thread context of 2444 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 104 PID 2444 set thread context of 312 2444 spolsvt.exe 105 PID 2476 set thread context of 2468 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 106 PID 2468 set thread context of 3400 2468 spolsvt.exe 107 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\DNomb\spolsvt.exe 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe File created C:\Windows\DNomb\Mpec.mbt 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe File opened for modification C:\Windows\DNomb\Mpec.mbt 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe File created C:\Windows\DNomb\PTvrst.exe 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000_Classes\Local Settings 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 3564 spolsvt.exe 3564 spolsvt.exe 3564 spolsvt.exe 3564 spolsvt.exe 4540 spolsvt.exe 4540 spolsvt.exe 4540 spolsvt.exe 4540 spolsvt.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 3816 PTvrst.exe 3816 PTvrst.exe 4620 spolsvt.exe 4620 spolsvt.exe 4620 spolsvt.exe 4620 spolsvt.exe 668 spolsvt.exe 668 spolsvt.exe 668 spolsvt.exe 668 spolsvt.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 4776 spolsvt.exe 4776 spolsvt.exe 4776 spolsvt.exe 4776 spolsvt.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4412 spolsvt.exe Token: SeDebugPrivilege 4472 spolsvt.exe Token: SeDebugPrivilege 2280 spolsvt.exe Token: SeDebugPrivilege 744 spolsvt.exe Token: SeDebugPrivilege 3684 spolsvt.exe Token: SeDebugPrivilege 312 spolsvt.exe Token: SeDebugPrivilege 3400 spolsvt.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 3564 spolsvt.exe 3564 spolsvt.exe 4540 spolsvt.exe 4540 spolsvt.exe 4620 spolsvt.exe 4620 spolsvt.exe 668 spolsvt.exe 668 spolsvt.exe 3816 PTvrst.exe 3816 PTvrst.exe 4776 spolsvt.exe 4776 spolsvt.exe 2444 spolsvt.exe 2444 spolsvt.exe 2468 spolsvt.exe 2468 spolsvt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 3564 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 85 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 2476 wrote to memory of 4540 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 87 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 3564 wrote to memory of 4412 3564 spolsvt.exe 88 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 4540 wrote to memory of 4472 4540 spolsvt.exe 90 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 2476 wrote to memory of 4620 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 98 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 4620 wrote to memory of 2280 4620 spolsvt.exe 99 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 2476 wrote to memory of 668 2476 4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe 100 PID 3816 wrote to memory of 4776 3816 PTvrst.exe 101 PID 3816 wrote to memory of 4776 3816 PTvrst.exe 101 PID 3816 wrote to memory of 4776 3816 PTvrst.exe 101 PID 3816 wrote to memory of 4776 3816 PTvrst.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe"C:\Users\Admin\AppData\Local\Temp\4776527f503f33a2854e1db14273a002a7ff8b50c47e49d83c98840add78ed38.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
-
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
-
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
-
C:\Windows\DNomb\spolsvt.exeC:\Windows\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:844
-
C:\Users\Public\Documents\123\PTvrst.exe"C:\Users\Public\Documents\123\PTvrst.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\WINDOWS\DNomb\spolsvt.exeC:\WINDOWS\DNomb\spolsvt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4776 -
C:\Users\Public\Documents\t\spolsvt.exeC:\Users\Public\Documents\t\spolsvt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
1.2MB
MD5d22cfb5bfaeb1503b12b07e53ef0a149
SHA18ea2c85e363f551a159fabd65377affed4e417a1
SHA256260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360
SHA512151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
16KB
MD5cdce4713e784ae069d73723034a957ff
SHA19a393a6bab6568f1a774fb753353223f11367e09
SHA256b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8
SHA5120a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f
-
Filesize
93KB
MD5766975a2dabf276ae2f819605c99826c
SHA19884170fb34adf01e68d2931b3848c84db9f26f9
SHA25678d4cd14f316c4f5518d142c1c0c7832a00e0245a4a2d0f385e37d189a3f8fde
SHA512a02b1722073dda81407a872a24391c65a88d17132e1d153c581a045cad9f1c7da5486c23187b13f8139b8dcff19697b86620eab20c6dbe8753f53a031be46795
-
Filesize
488KB
MD52574fda691d172cbc388ecf8519946b1
SHA1b2026e000ba42db4339810a9cd6e166cbba0ffa0
SHA25657dc57a72f09c0e9d9b3b98102fbcd2c7ff8f276b4f02832b300430bfebaa38c
SHA51267c51cb0da666f2ec0810a0a27a8ca1c43a767f0d5a7b42474d383a1be926264645552af466393eb7a51ccd2d02033c3ddc7feb8f2d00a2db7a7f494e144ab1a
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4
-
Filesize
9KB
MD5523d5c39f9d8d2375c3df68251fa2249
SHA1d4ed365c44bec9246fc1a65a32a7791792647a10
SHA25620e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78
SHA512526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4