Analysis Overview
SHA256
2047a6293bf48347746b1eb89bba86a722f6888fba1a55cccc9c6fa6c59efb2c
Threat Level: Known bad
The file 49816a8397e134d8fc34c2c8d004912a.exe was found to be: Known bad.
Malicious Activity Summary
Modifies visiblity of hidden/system files in Explorer
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Adds Run key to start application
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:21
Reported
2024-01-07 19:24
Platform
win7-20231215-en
Max time kernel
150s
Max time network
149s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\rplas.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\rplas.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /o" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /D" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /v" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /u" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /Y" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /Z" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /Q" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /k" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /h" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /m" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /G" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /f" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /K" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /V" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /O" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /d" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /U" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /W" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /y" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /N" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /b" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /R" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /J" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /H" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /A" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /B" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /l" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /F" | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /L" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /E" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /F" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /z" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /n" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /S" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /t" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /M" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /j" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /s" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /a" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /X" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /e" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /C" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /i" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /p" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /r" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /T" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /c" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /I" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /q" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /w" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /P" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /g" | C:\Users\Admin\rplas.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\rplas = "C:\\Users\\Admin\\rplas.exe /x" | C:\Users\Admin\rplas.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| N/A | N/A | C:\Users\Admin\rplas.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2276 wrote to memory of 1080 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\rplas.exe |
| PID 2276 wrote to memory of 1080 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\rplas.exe |
| PID 2276 wrote to memory of 1080 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\rplas.exe |
| PID 2276 wrote to memory of 1080 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\rplas.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe
"C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe"
C:\Users\Admin\rplas.exe
"C:\Users\Admin\rplas.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ns1.player1532.com | udp |
| US | 107.178.223.183:8003 | ns1.player1532.com | tcp |
Files
\Users\Admin\rplas.exe
| MD5 | a6cfaacb191c4874b27071abebde723f |
| SHA1 | 683475f35398df3dbf1aa4b5a9648c4180dd10f2 |
| SHA256 | 028937327aa0a61e34c3ca0ef456227222b57c6505bd1515ca81a85cd34ccae8 |
| SHA512 | 04d685d3c8148c6c68412fc91057f22155a0d2101784831af8fa8bbdf319101e46bd80c844448316fc07a6b35cf4252ad30d686a15e6cda2580443cc7c94a742 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:21
Reported
2024-01-07 19:24
Platform
win10v2004-20231215-en
Max time kernel
159s
Max time network
168s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\beaef.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\beaef.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /D" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /c" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /M" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /r" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /A" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /n" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /P" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /F" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /s" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /a" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /m" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /o" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /I" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /x" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /Q" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /T" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /l" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /R" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /g" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /b" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /H" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /E" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /v" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /U" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /O" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /K" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /h" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /b" | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /f" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /p" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /i" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /d" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /e" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /t" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /X" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /B" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /y" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /Y" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /u" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /J" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /C" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /G" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /w" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /q" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /S" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /W" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /L" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /V" | C:\Users\Admin\beaef.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beaef = "C:\\Users\\Admin\\beaef.exe /Z" | C:\Users\Admin\beaef.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | N/A |
| N/A | N/A | C:\Users\Admin\beaef.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 756 wrote to memory of 4672 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\beaef.exe |
| PID 756 wrote to memory of 4672 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\beaef.exe |
| PID 756 wrote to memory of 4672 | N/A | C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe | C:\Users\Admin\beaef.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe
"C:\Users\Admin\AppData\Local\Temp\49816a8397e134d8fc34c2c8d004912a.exe"
C:\Users\Admin\beaef.exe
"C:\Users\Admin\beaef.exe"
Network
| Country | Destination | Domain | Proto |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ns1.player1532.com | udp |
| US | 8.8.8.8:53 | 82.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.110.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 131.72.42.20.in-addr.arpa | udp |
Files
C:\Users\Admin\beaef.exe
| MD5 | 2d4055ccd3bcb3a171a32a1a545afab7 |
| SHA1 | 0faedb0c483b2953f2492ca8568f3d335a1e24b3 |
| SHA256 | 12309124075add4ba6699ef565cfe1c38fb0c0d2725f2e160605fba4a976073f |
| SHA512 | 26304b1d14fb26d1091d17c5949f25bd57ff345c42754d651261ce336068b4698ee92f34dc9152e986cd4ee681a8cf1db1d69242dd3814dec1fc212502622b04 |