Overview
overview
10Static
static
10013e80dc8e...a8.exe
windows10-2004-x64
7040677c072...cc.exe
windows10-2004-x64
10ba3a15c5f...6a.exe
windows10-2004-x64
1019d029dd80...b2.dll
windows10-2004-x64
101ac4f94c2d...83.exe
windows10-2004-x64
71efeb07862...bb.dll
windows10-2004-x64
327861dacdd...03.exe
windows10-2004-x64
131860041f6...ff.exe
windows10-2004-x64
33c49ffd8bf...86.dll
windows10-2004-x64
141edb742c1...45.exe
windows10-2004-x64
74ad4c837ce...e1.exe
windows10-2004-x64
150682871a2...53.exe
windows10-2004-x64
65f3bfe76bb...b6.exe
windows10-2004-x64
10784f3902fd...12.exe
windows10-2004-x64
10816c0e4deb...6c.exe
windows10-2004-x64
781b49d3c61...a9.exe
windows10-2004-x64
1082d1e979d2...67.exe
windows10-2004-x64
78ba3f20419...4f.exe
windows10-2004-x64
108d8576432c...fe.exe
windows10-2004-x64
7962bbb1929...e2.exe
windows10-2004-x64
1096f295d08c...d1.exe
windows10-2004-x64
796f2bcea04...28.exe
windows10-2004-x64
109972304b5c...64.exe
windows10-2004-x64
109ff988d7ea...09.exe
windows10-2004-x64
7bfddb59433...b0.exe
windows10-2004-x64
3c0ca77690a...a5.dll
windows10-2004-x64
1cb0f8c9180...69.exe
windows10-2004-x64
10cfbcc54f36...29.exe
windows10-2004-x64
7dd0f55e997...a3.exe
windows10-2004-x64
8ded033da36...58.exe
windows10-2004-x64
7ea55e146fe...59.exe
windows10-2004-x64
10fffd0cdd49...d6.exe
windows10-2004-x64
10Resubmissions
14-11-2023 17:31
231114-v3qg7acf42 1014-11-2023 17:21
231114-vxdw7sdg61 1028-10-2023 19:29
231028-x7cs1age56 1024-10-2023 13:29
231024-qrn3rsdb6z 1018-10-2023 12:04
231018-n8ybnaeb31 1007-09-2023 12:10
230907-pce1wahe2x 10Analysis
-
max time kernel
109s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2023 19:29
Behavioral task
behavioral1
Sample
013e80dc8e53bd7d98dd94915f05563499b6a323df343bb765a1d3f188753aa8.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
040677c072d3f39edc3d3ec5f95573c1532875c1d57ddc1b62ce396afae016cc.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
0ba3a15c5f29bca02e4b54f3146092558841962e5ee66a87218f130a4dfec36a.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
19d029dd80a0823d4abe2dfea87b17935844142cb0921eb35a390f70d5f522b2.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
1ac4f94c2d34dbf38aaf1b7b7103349479fbe5b427e45fd213d4f31845958b83.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
1efeb078625478129da10c0e62b0c842e54286312fbb55c38187bda4d78974bb.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral7
Sample
27861dacdddfebc6862f96085da5ede9249b76bdb4b7af16371c51caee417503.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral8
Sample
31860041f633899f97e48bcd189a406bdc37d6be297b3dd6431f446aff2852ff.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
3c49ffd8bfdcc42aee16d8679893aa28f3ed5e433dcf0900ed32f7a88da3f386.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
41edb742c1b69881657a48b74568410eb0dc7bfc9f540ab15c4ed0a665d97d45.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
4ad4c837ce02e146680abb4f673fbca2d5f8588f4ae2c766b393c2b4141a9ee1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
50682871a2a335d7c5f89cfc1ed16bec99abfa7856a05f54477ee639bbbfd453.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
5f3bfe76bbd22dd8fd936b3833220ba03964b08e28ecf13dafdbbae24a620cb6.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
784f3902fdf296683a82c32aba987fd4c12bbed74a6300582da2d53e23954112.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
816c0e4debc58580e62e0698d31111436c8f99bd895ad2b4d0c9b7c2798dd96c.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral16
Sample
81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
82d1e979d2e673d0b1a47d34c1c968582185e284e0532ed66fd69d0e21063c67.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral18
Sample
8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
8d8576432cd79c4c6a8902e9fcbdad16c871afae3731a4d9ec9cb6a0be727ffe.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
962bbb1929620dc69e35d52ce7e9684412e16e8ad2727222dbe3e47e9220f8e2.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
96f295d08c64e21aa847dcff5d942dd2beec65fa4957a6690ee2b7b79382cdd1.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral22
Sample
96f2bcea04abecb6ba4e87bb6cd62beb439882a9bb013fa12def110ea3335528.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
9972304b5cf97f0369e5b287583931d87dfe984aa698c9123b7061379db68e64.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral24
Sample
9ff988d7ea76e8379b5da6af3455b859957e7dfe572181041c35b10390780909.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
bfddb59433bec29faf6210449f73503f38e61234c09be3f405be8196d9d6f8b0.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
c0ca77690ad65d797c3c9a662229046b0cc28e89ca54e0e39c70f656201280a5.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
cb0f8c9180b92b75f130ecdd9fd42fa9c687796313cc968179d1c9b217c65e69.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral28
Sample
cfbcc54f36dbdfc8d78d2be3a6b565f4e25b4d52f51de10ad7e4ca14c7f55d29.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral29
Sample
dd0f55e997999bfddd040f676fd616b99afe386daf1a69c3a02a8324274baba3.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral30
Sample
ded033da36fbf8287d0df6f21a0339b6e1046ce678b46e7cd558f63e22df1158.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
ea55e146fed653416bd40c92ce89cd61b46035c7bc6f55a33c71a9872e2c9659.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
fffd0cdd4935b9fa1ff5530a94ec648346d5f6c6521fc07641fd9254f5ef75d6.exe
Resource
win10v2004-20231023-en
General
-
Target
8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe
-
Size
3.5MB
-
MD5
54837d1612edd427f413f55d6079fd5d
-
SHA1
d25af43ee7df4d41373d66bcba7da0a7d217c1c1
-
SHA256
8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f
-
SHA512
cdd9687d6382f5cd3ff031753e00b5cd2a6abd403e37547143d0ac8ed1447b243c5f24d34f98ac08c5aab62c232e9cac2c0b287d7df8cdee605b7eeb07bdcdb3
-
SSDEEP
6144:FSAP5c1MI2QLb9/REfzrjNG7i1BV+GKdyIpNd0f:FVTI2QLb9/kzHNGcaXIf
Malware Config
Extracted
cybergate
v1.07.5
1112
111220402011.no-ip.org:8020
XVYJ6C4S2P1EUJ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Nvidia
-
install_file
csrss.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
1112
-
regkey_hkcu
Nvidia
-
regkey_hklm
Nvidia
Signatures
-
Adds policy Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Roaming\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Roaming\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Nvidia = "C:\\Program Files (x86)\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Nvidia = "C:\\Program Files (x86)\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG}\StubPath = "C:\\Program Files (x86)\\Nvidia\\csrss.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG} 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Restart" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG} 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG}\StubPath = "C:\\Program Files (x86)\\Nvidia\\csrss.exe Restart" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG} 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Nvidia\\csrss.exe Restart" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{DN65T524-XS4I-0A2Q-N6KC-H728FO7441XG} explorer.exe -
resource yara_rule behavioral18/memory/1688-26-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral18/memory/2640-27-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral18/memory/2672-28-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral18/memory/3940-232-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral18/memory/3564-234-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral18/memory/3940-252-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral18/memory/5064-259-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral18/memory/3564-261-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral18/memory/5064-332-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral18/memory/4552-445-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral18/memory/2212-468-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Roaming\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Nvidia = "C:\\Program Files (x86)\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nvidia = "C:\\Program Files (x86)\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nvidia = "C:\\Users\\Admin\\AppData\\Roaming\\Nvidia\\csrss.exe" 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4204 set thread context of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 set thread context of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 set thread context of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Nvidia\csrss.exe 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe File created C:\Program Files (x86)\Nvidia\csrss.exe 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe File created C:\Program Files (x86)\Nvidia\csrss.exe 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe File opened for modification C:\Program Files (x86)\Nvidia\csrss.exe 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe File opened for modification C:\Program Files (x86)\Nvidia\csrss.exe explorer.exe File opened for modification C:\Program Files (x86)\Nvidia\ explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3940 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe Token: SeBackupPrivilege 3564 explorer.exe Token: SeRestorePrivilege 3564 explorer.exe Token: SeBackupPrivilege 3940 explorer.exe Token: SeRestorePrivilege 3940 explorer.exe Token: SeBackupPrivilege 5064 explorer.exe Token: SeRestorePrivilege 5064 explorer.exe Token: SeDebugPrivilege 3940 explorer.exe Token: SeDebugPrivilege 3940 explorer.exe Token: SeBackupPrivilege 4552 explorer.exe Token: SeRestorePrivilege 4552 explorer.exe Token: SeBackupPrivilege 4780 explorer.exe Token: SeRestorePrivilege 4780 explorer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2672 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 2640 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 2640 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 95 PID 4204 wrote to memory of 2672 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 93 PID 4204 wrote to memory of 1688 4204 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 94 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9 PID 1688 wrote to memory of 3308 1688 8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2672 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"C:\Users\Admin\AppData\Local\Temp\8ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2640 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4780 -ip 47801⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4552 -ip 45521⤵PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD554837d1612edd427f413f55d6079fd5d
SHA1d25af43ee7df4d41373d66bcba7da0a7d217c1c1
SHA2568ba3f20419e36946e978e69ae892805569a3b8e5ae702038065296aae8dc414f
SHA512cdd9687d6382f5cd3ff031753e00b5cd2a6abd403e37547143d0ac8ed1447b243c5f24d34f98ac08c5aab62c232e9cac2c0b287d7df8cdee605b7eeb07bdcdb3
-
Filesize
224KB
MD539a4ad803f2b91a95748fa37ea38ba99
SHA189625d19217cd3b98c816465d3b526e16076e019
SHA2568e388d9e3e2e58f6ffb33a7a9b46801379f100cd681217cfe2d58f79799c1f80
SHA5120d96841387db179f7972d117b04bf20663826ea94bed7d59e9ec8daad4697d1a1b32f6aeeba86156498ed64f255293f08edec65281daf6a00c57fbac7d6c00e4
-
Filesize
224KB
MD539a4ad803f2b91a95748fa37ea38ba99
SHA189625d19217cd3b98c816465d3b526e16076e019
SHA2568e388d9e3e2e58f6ffb33a7a9b46801379f100cd681217cfe2d58f79799c1f80
SHA5120d96841387db179f7972d117b04bf20663826ea94bed7d59e9ec8daad4697d1a1b32f6aeeba86156498ed64f255293f08edec65281daf6a00c57fbac7d6c00e4
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314