Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:04
Static task
static1
Behavioral task
behavioral1
Sample
2b17e88121f688966b5c9313e9680f01.exe
Resource
win7-20231215-en
General
-
Target
2b17e88121f688966b5c9313e9680f01.exe
-
Size
2.3MB
-
MD5
2b17e88121f688966b5c9313e9680f01
-
SHA1
8ea541ecfc7d8d0039262ac4d49507646973bdd2
-
SHA256
78ac173de38f6be4ec1686d84a71082838154d42ed05e970b574a9e82b76800d
-
SHA512
c6118eba8bfe3189c31d9b14daccbdef964a4525b10cb193a0634b75acb8cf05f7e44c5332977dd7a9c287a1c0b87914531b48523c277ae00207fef13626ee4b
-
SSDEEP
49152:QxuaNlMTwUu863Q8dWW//xHHyOQjznJH3ODjvtVMY:IrMkU58MKHyOiznJXCjvtKY
Malware Config
Extracted
bitrat
1.38
204.77.8.221:5506
-
communication_password
d74a214501c1c40b2c77e995082f3587
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 2b17e88121f688966b5c9313e9680f01.exe -
Executes dropped EXE 1 IoCs
pid Process 4316 eInvoice-20210805_200426_600838.exe -
resource yara_rule behavioral2/memory/4316-24-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/files/0x000600000002321a-23.dat upx behavioral2/files/0x000600000002321a-22.dat upx behavioral2/files/0x000600000002321a-20.dat upx behavioral2/memory/4316-58-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4316-165-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4316-194-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4316-216-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4316 eInvoice-20210805_200426_600838.exe 4316 eInvoice-20210805_200426_600838.exe 4316 eInvoice-20210805_200426_600838.exe 4316 eInvoice-20210805_200426_600838.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings 2b17e88121f688966b5c9313e9680f01.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5072 2b17e88121f688966b5c9313e9680f01.exe Token: SeShutdownPrivilege 4316 eInvoice-20210805_200426_600838.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1016 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 4316 eInvoice-20210805_200426_600838.exe 4316 eInvoice-20210805_200426_600838.exe 1016 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3988 5072 2b17e88121f688966b5c9313e9680f01.exe 101 PID 5072 wrote to memory of 3988 5072 2b17e88121f688966b5c9313e9680f01.exe 101 PID 5072 wrote to memory of 3988 5072 2b17e88121f688966b5c9313e9680f01.exe 101 PID 5072 wrote to memory of 3756 5072 2b17e88121f688966b5c9313e9680f01.exe 100 PID 5072 wrote to memory of 3756 5072 2b17e88121f688966b5c9313e9680f01.exe 100 PID 5072 wrote to memory of 3756 5072 2b17e88121f688966b5c9313e9680f01.exe 100 PID 5072 wrote to memory of 3060 5072 2b17e88121f688966b5c9313e9680f01.exe 99 PID 5072 wrote to memory of 3060 5072 2b17e88121f688966b5c9313e9680f01.exe 99 PID 5072 wrote to memory of 3060 5072 2b17e88121f688966b5c9313e9680f01.exe 99 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 5072 wrote to memory of 4248 5072 2b17e88121f688966b5c9313e9680f01.exe 98 PID 4248 wrote to memory of 1016 4248 2b17e88121f688966b5c9313e9680f01.exe 102 PID 4248 wrote to memory of 1016 4248 2b17e88121f688966b5c9313e9680f01.exe 102 PID 4248 wrote to memory of 1016 4248 2b17e88121f688966b5c9313e9680f01.exe 102 PID 4248 wrote to memory of 4316 4248 2b17e88121f688966b5c9313e9680f01.exe 103 PID 4248 wrote to memory of 4316 4248 2b17e88121f688966b5c9313e9680f01.exe 103 PID 4248 wrote to memory of 4316 4248 2b17e88121f688966b5c9313e9680f01.exe 103 PID 1016 wrote to memory of 4256 1016 AcroRd32.exe 104 PID 1016 wrote to memory of 4256 1016 AcroRd32.exe 104 PID 1016 wrote to memory of 4256 1016 AcroRd32.exe 104 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106 PID 4256 wrote to memory of 4008 4256 RdrCEF.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe"C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exeC:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7EE0A455B41FEB392C66247F87F06E23 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7EE0A455B41FEB392C66247F87F06E23 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:15⤵PID:1476
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=67B6D3D1710CA1DA1CE95C219BBCF588 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4008
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BB16A1C644113F5B5904866D7C41C919 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1260
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0E71739990563DC09538697D25E34A98 --mojo-platform-channel-handle=1924 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1568
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BCDC3184E6C4158854D308397D34E151 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1720
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C66A8F4D1B4174C344FB2370A2859B5E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C66A8F4D1B4174C344FB2370A2859B5E --renderer-client-id=6 --mojo-platform-channel-handle=1860 --allow-no-sandbox-job /prefetch:15⤵PID:3640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe"C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exeC:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe2⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exeC:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe2⤵PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exeC:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe2⤵PID:3988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2b17e88121f688966b5c9313e9680f01.exe.log
Filesize1KB
MD57ebe314bf617dc3e48b995a6c352740c
SHA1538f643b7b30f9231a3035c448607f767527a870
SHA25648178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8
SHA5120ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e
-
Filesize
1.4MB
MD53267aaaa00e9793fd0110b0d7face79c
SHA11275d09331fcef8db717e6f21095ec2f1b09bb7f
SHA256e462da0925198eca0c8eccf060685fd8797816574157dfbfe1c122f09c3f5497
SHA51258fb085cda7e16eddf58819a9271a1210868463ead5d9febb2df586276a447697a0002ded3bd7f7910f5d355ca829bc8d7a1e8cf3b4d5279dc2a8375278f25b7
-
Filesize
1.4MB
MD57883fc5b5a6e603de63b68981fb05027
SHA1d3088d00b2c597d50a4f0e8da41eec5db013a894
SHA256e96e85af580332aee4fbfde0c2df665d5d83487ba4551a79a2572e31e9dddad3
SHA512f33e2a9114b4028421aca33ac5a0548d078163f18fd2fa9cb533bd53c710c89b6f01fb8f0434a083467e72cb85eeccbee63900037ab7e5ca59c3aa695b857c22
-
Filesize
92KB
MD57b0478b79216d2d3dfd2db6d90072abc
SHA154f5159295bedc51da9163d3752905df2faf6303
SHA256a26384575dd53882a7e1e8d580140322519f7bb5ef48671018ace687ecd608f0
SHA51281cc4001758f85e7327b5ce5024996cfb0dff77570e39ecb115675d9106742a298ae2ee8729a0101e13edd3301c5ccecf7bba25ab42263f9ce6e0f5bc6be0a92