Overview
overview
10Static
static
10001e9becdd...93.exe
windows10-2004-x64
71a1cf2a2f6...31.exe
windows10-2004-x64
72eac3720bc...61.exe
windows10-2004-x64
1320e3af17b...4c.exe
windows10-2004-x64
333bcab7033...70.exe
windows10-2004-x64
647a52afd63...2e.exe
windows10-2004-x64
104b24d27301...69.exe
windows10-2004-x64
74c481d251f...5a.exe
windows10-2004-x64
14c9ab76300...dd.exe
windows10-2004-x64
650a04b093c...95.dll
windows10-2004-x64
65266183553...2f.dll
windows10-2004-x64
8547798defb...6e.exe
windows10-2004-x64
105fb2242c04...96.exe
windows10-2004-x64
163a0bf6385...12.exe
windows10-2004-x64
106a08b51e02...68.exe
windows10-2004-x64
5803d827a2c...53.exe
windows10-2004-x64
785523c6377...c3.exe
windows10-2004-x64
38ab3db7349...03.exe
windows10-2004-x64
99b87457fe8...f0.exe
windows10-2004-x64
8a3c7b0df18...cc.exe
windows10-2004-x64
1ab4fa067af...38.exe
windows10-2004-x64
10b1c5c3ca41...7d.exe
windows10-2004-x64
3ca561f9403...c5.exe
windows10-2004-x64
7d278eb3d6c...8f.exe
windows10-2004-x64
6d3e04348f4...91.exe
windows10-2004-x64
10d7e876a714...c9.exe
windows10-2004-x64
7dd8bf2763c...38.exe
windows10-2004-x64
dd9ca1355f...9a.exe
windows10-2004-x64
7dd9d07d1f5...27.exe
windows10-2004-x64
10ef3c260fed...49.exe
windows10-2004-x64
10f40df86d68...df.exe
windows10-2004-x64
10fb861230c0...01.exe
windows10-2004-x64
3Analysis
-
max time kernel
161s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 21:16
Behavioral task
behavioral1
Sample
001e9becdd7d9887c6fbe487073ad3dc068124a5300f4128d9ed32db4f63f793.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
1a1cf2a2f6a49b8d2a84b9b5ec5f783e7d9be30b6a17a28795bc351bb3cdde31.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
2eac3720bcfb4550e3093f053880b373068360bc8583f2aee059905bcad29c61.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral4
Sample
320e3af17bb8787283fe0c4af9d3a778c191d8374f19c0bc6b6ee2f22363094c.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
33bcab70334406fb3331b4b3fffbf8c51df52d93efb5d673d865b7a7496b1570.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
47a52afd63406238b1b5ce59a7cb282685629b14169405015b0cef20fbe4f62e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
4b24d273019579ba3c1e0ad261954c0941d114aab802fa2d1fcb14dab9f3e869.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
4c481d251f29295af1af599374ea93f9fc24b6139fbb02ec115bec9f4e7bc25a.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
4c9ab763001721e04e9efc44e1e97351557f8a4b1cf5471b141e7358cd1296dd.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
50a04b093c8f05481eb672ebec0537f61e233071798d1f3b939e17e333b51795.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
5266183553addd392a0968ea9e835c00e55a27468829ab65832cda37508c8e2f.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
547798defb6d577ec9f13b00fb1be293f903aaa974ddc049be16d6437aeec86e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
5fb2242c04ce18830b84de73c4f0fc4e9c8a5e6877a14f414fcbfaa5a3948896.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
63a0bf6385356dd0297449bdca2a2f171846315505800e81a4c0285f09c87312.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
6a08b51e02a7b510972907c326041222ff4632ba53b89573fca7e80b59c4e168.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
803d827a2cd764008783e691ce132ef853dbfa77017e5d2eeae47ceb3ca50f53.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
85523c6377c27e22068a2ef347997a295981b91e103b3cf3387ed80aa0b010c3.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral18
Sample
8ab3db7349f38d6463a3c6a7155ab297f18d92262a098064ea2472cecc7e3103.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral20
Sample
a3c7b0df189bdd47c7e113ff3b664f26b0bcd6f4f878186e882ea199e15c28cc.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
ab4fa067af1c9a107b879341e255eb9f05779608ce31217c1a2d60d28a2c8838.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral22
Sample
b1c5c3ca41c322b47a5feb62ebb0e5daa3c1c682aa1dedb98fd3b7dff3eca57d.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
ca561f9403ab4be76ca66646df1a3da826fa2cc1972dd005ad23861abb317cc5.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral24
Sample
d278eb3d6cc29c6de4b086aaa6214412d62fe2bb850c0ead63a403c3a24b2c8f.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
d3e04348f412615e23ad0aebfee1b4338f5edf99776bdedf08fbb0462868ef91.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
d7e876a714e2632fa42e6636177962516736074c76f486dc34de020ec13af0c9.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
dd8bf2763ce09cbeb21cdbf802b9f7475c7998e459714150fae07ffcd027bb38.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral28
Sample
dd9ca1355ff3ddd883f9d2d0e6df9b7a8ebff650003a616c533b30554cee2a9a.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
dd9d07d1f5bb4facb1b4e412ce9e52a5ca9a689f2f78c34bacf63af19f7ce127.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral30
Sample
ef3c260fed0a71f0e679261aeb242133899f9ff03d68b5f95711a66ef919e549.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
f40df86d68d075c73e1be8ed5b3201f0e55a9eccf662258a219acee35df398df.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
fb861230c088dd68f1a6c782e9ad0b44a1831ccc29c0516635cc4b3de2a91a01.exe
Resource
win10v2004-20231023-en
General
-
Target
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe
-
Size
60KB
-
MD5
6aa22fd28d56b38bdf8dfc90dbd6dc96
-
SHA1
1e28cf53cbcacde5a272669cdd1670785183272a
-
SHA256
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0
-
SHA512
cb882269950289b614c1009eabc0a69ac8fb371a62af4e488413e10c60c0defeb5ad891e56a680e9cd60cb6971bcef8e35cc2899b17897d6ba1767e5be97ec35
-
SSDEEP
768:3kWI7wOxRW1Hn/txYKtXeQJCAhxPPqEAQemUJiKrji0tSdZRNoN5J:3kWI7kHn/f/tugCsxPSEA3mUJiKadYJ
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
Processes:
ini.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{H8I22RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}\ = "fuckme" ini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{H8I22RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}\stubpath = "%windir%\\programs\\fuckme.vbs" ini.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{H8I22RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK} ini.exe -
Executes dropped EXE 1 IoCs
Processes:
ini.exepid process 2612 ini.exe -
Processes:
resource yara_rule behavioral19/memory/4080-0-0x0000000000400000-0x0000000000411000-memory.dmp upx C:\Windows\programs\ini.exe upx C:\Windows\programs\ini.exe upx behavioral19/memory/4080-12-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral19/memory/2612-14-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ini.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN ini.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exedescription ioc process File opened for modification C:\Windows\programs\desktop.ini 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe File created C:\Windows\programs\desktop.ini 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ini.exedescription ioc process File opened (read-only) \??\E: ini.exe File opened (read-only) \??\H: ini.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ini.exedescription ioc process File created C:\Program Files\Common Files\microsoft shared\ink\ko-KR\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\cs\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ENFR\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\1033\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\VBA\VBA7.1\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\wsock32.dll ini.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\wsock32.dll ini.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\wsock32.dll ini.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ca\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\1033\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\wsock32.dll ini.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\DESIGNER\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\wsock32.dll ini.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\Document Parts\1033\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\assets\assets\images\wsock32.dll ini.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\wsock32.dll ini.exe File created C:\Program Files\Internet Explorer\de-DE\wsock32.dll ini.exe File created C:\Program Files\Internet Explorer\images\wsock32.dll ini.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\wsock32.dll ini.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\COMPASS\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\it\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\vi\wsock32.dll ini.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\wsock32.dll ini.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\wsock32.dll ini.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\PlatformCapabilities\wsock32.dll ini.exe File created C:\Program Files\7-Zip\Lang\wsock32.dll ini.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\wsock32.dll ini.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\wsock32.dll ini.exe File opened for modification C:\Program Files\Common Files\System\msadc\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f7\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\fr\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\PackageManifests\wsock32.dll ini.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\wsock32.dll ini.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\wsock32.dll ini.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\sl\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\wsock32.dll ini.exe File created C:\Program Files\Common Files\System\ado\it-IT\wsock32.dll ini.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\wsock32.dll ini.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ro\wsock32.dll ini.exe -
Drops file in Windows directory 10 IoCs
Processes:
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exeini.exedescription ioc process File created C:\Windows\programs\ini.exe 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe File created C:\Windows\programs\fuckme.vbs ini.exe File created C:\Windows\programs\desktop.ini 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe File opened for modification C:\Windows\programs\desktop.ini 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe File opened for modification C:\Windows\SysWOW64 ini.exe File opened for modification C:\Windows\programs\fuckme.vbs ini.exe File created C:\Windows\programs\wsock32.dll ini.exe File created C:\Windows\Tasks\°²×°.bat ini.exe File opened for modification C:\Windows\Tasks\°²×°.bat ini.exe File created C:\Windows\SysWOW64 ini.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ini.exepid process 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe 2612 ini.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ini.exepid process 2612 ini.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exedescription pid process Token: SeIncBasePriorityPrivilege 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exedescription pid process target process PID 4080 wrote to memory of 2612 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe ini.exe PID 4080 wrote to memory of 2612 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe ini.exe PID 4080 wrote to memory of 2612 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe ini.exe PID 4080 wrote to memory of 4344 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe cmd.exe PID 4080 wrote to memory of 4344 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe cmd.exe PID 4080 wrote to memory of 4344 4080 9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe"C:\Users\Admin\AppData\Local\Temp\9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\programs\ini.exeC:\Windows\programs\ini.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9B8745~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\programs\fuckme.vbsFilesize
98B
MD50925bdaa312fecb530c1d48b220d31ce
SHA1de8d85a93acb9babfa71a74ebb40402b02853043
SHA2563016b31ecee1ad7211b2f541d3314955e4a21d64a820b245bffdc7ac7e8e5d15
SHA51261afae90f93fea10fec1377dbc9181f2746b97b7210ada515d28239354f092ab34e40fb1b53293fbdcea13ded1d99fa3fdcbc14464f41354f54aecfa227e8af7
-
C:\Windows\programs\ini.exeFilesize
60KB
MD50c409785272193c4e042a5455834c2af
SHA1a569e2ccf5529634f41640a26229ef6be613219f
SHA256ec39ca8d8d874a8366b49c0d8a8b61049b13978acbec8aea59f4837117f6114e
SHA5121b5dcf87c048e0780478e2bcb09ce15772d44a7bed54bdf1e0281f9d22a4276572cd30bd4d7ea191499af4bac3bc6ad522b8ea7069daf85a61e9937997dc0db0
-
C:\Windows\programs\ini.exeFilesize
60KB
MD50c409785272193c4e042a5455834c2af
SHA1a569e2ccf5529634f41640a26229ef6be613219f
SHA256ec39ca8d8d874a8366b49c0d8a8b61049b13978acbec8aea59f4837117f6114e
SHA5121b5dcf87c048e0780478e2bcb09ce15772d44a7bed54bdf1e0281f9d22a4276572cd30bd4d7ea191499af4bac3bc6ad522b8ea7069daf85a61e9937997dc0db0
-
C:\Windows\programs\wsock32.dllFilesize
17KB
MD502b73a0697baf1daf7690ffacd9fdedf
SHA1f7135318f488a7fe7b19bfabc98f91edab190f66
SHA2566c2b79175b503d14474852132117e1f36cb25c70bee3507215d8dbb85c28e8b9
SHA5126005b81993ffcc6fc1b6809e00b7d4fc3dfc93d6c74f6f08a81471701f1ca7f2f67d18d847a8cf2bb9bab4c4e90beaef3ce0d2ab7002836d723f3d94aa7748a0
-
memory/2612-14-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/4080-0-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/4080-12-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB