Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 12:03
Behavioral task
behavioral1
Sample
4b62450e0d5c4baf54a6d2bf82640e18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b62450e0d5c4baf54a6d2bf82640e18.exe
Resource
win10v2004-20231222-en
General
-
Target
4b62450e0d5c4baf54a6d2bf82640e18.exe
-
Size
67KB
-
MD5
4b62450e0d5c4baf54a6d2bf82640e18
-
SHA1
c355bd0767be42aef88fbe4b33348ca767f9af11
-
SHA256
3a4cfef0dd9bf37f93a93d978cc9c0a12fe4235d4d3e5507c7bf4777c5a33348
-
SHA512
9036cd6b6225c268c30a68c659d52852159b3d0c7742bf664e7a7e76381a1fe45143832b1916f862034d03f18e04181973a207c3aa677ca42bb093afecadd897
-
SSDEEP
1536:k7OE59Vyzrc8K3WgFtKhJP+tcrVOXKzaJThZfaKhQiSEKNJJ:yV5998K3WQ8fjEXKgZfnhfxuJ
Malware Config
Signatures
-
Drops file in Drivers directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\SysWOW64\drivers\system32.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe -
Executes dropped EXE 4 IoCs
pid Process 1588 smss.exe 2784 smss.exe 2000 Gaara.exe 396 Conhost.exe -
Loads dropped DLL 4 IoCs
pid Process 1588 smss.exe 2784 smss.exe 2000 Gaara.exe 396 Conhost.exe -
resource yara_rule behavioral2/memory/3812-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023215-68.dat upx behavioral2/memory/2000-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2784-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2676-121-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/864-152-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-157-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3812-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1900-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1652-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023216-193.dat upx behavioral2/memory/4336-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1080-206-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-213-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002321a-212.dat upx behavioral2/memory/2676-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3016-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4504-237-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-246-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-253-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4868-256-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4868-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2320-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1236-266-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4556-270-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4556-271-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1576-274-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1976-277-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/388-280-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2140-283-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2984-286-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-249-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1900-244-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1892-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4464-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023219-205.dat upx behavioral2/memory/2000-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023217-199.dat upx behavioral2/memory/1652-195-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4336-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1588-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3688-161-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3688-156-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002321a-135.dat upx behavioral2/memory/1556-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1556-113-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/396-112-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002321a-98.dat upx behavioral2/files/0x0006000000023219-91.dat upx behavioral2/files/0x0006000000023218-90.dat upx behavioral2/files/0x000600000002321a-57.dat upx behavioral2/files/0x0006000000023219-53.dat upx behavioral2/files/0x0006000000023218-49.dat upx behavioral2/files/0x0006000000023217-45.dat upx behavioral2/memory/1588-33-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1588-288-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3812-287-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2000-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-292-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1900-291-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\8-1-2024.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\SysWOW64\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\SysWOW64\8-1-2024.exe smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\8-1-2024.exe Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File created C:\Windows\SysWOW64\8-1-2024.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 4b62450e0d5c4baf54a6d2bf82640e18.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File created C:\Windows\Fonts\Admin 8 - 1 - 2024\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe Gaara.exe File opened for modification C:\Windows\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe Gaara.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File created C:\Windows\Fonts\The Kazekage.jpg 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe smss.exe File opened for modification C:\Windows\system\mscoree.dll smss.exe File opened for modification C:\Windows\system\mscoree.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\system\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\system\mscoree.dll Gaara.exe File opened for modification C:\Windows\msvbvm60.dll Gaara.exe File created C:\Windows\WBEM\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe smss.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Gaara.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\system\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\WBEM\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe smss.exe File opened for modification C:\Windows\system\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg smss.exe File created C:\Windows\WBEM\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\msvbvm60.dll 4b62450e0d5c4baf54a6d2bf82640e18.exe File created C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe 4b62450e0d5c4baf54a6d2bf82640e18.exe File opened for modification C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe Gaara.exe -
Modifies Control Panel 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop 4b62450e0d5c4baf54a6d2bf82640e18.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 4b62450e0d5c4baf54a6d2bf82640e18.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\WallpaperStyle = "2" 4b62450e0d5c4baf54a6d2bf82640e18.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe -
Runs ping.exe 1 TTPs 36 IoCs
pid Process 3772 ping.exe 1768 ping.exe 2872 ping.exe 3320 ping.exe 3000 ping.exe 2504 ping.exe 4696 ping.exe 344 ping.exe 2952 ping.exe 948 ping.exe 4540 ping.exe 4540 ping.exe 932 ping.exe 540 ping.exe 4824 ping.exe 3880 ping.exe 748 ping.exe 536 ping.exe 4720 ping.exe 3084 ping.exe 1832 ping.exe 4792 ping.exe 2368 ping.exe 1996 ping.exe 1164 ping.exe 1204 ping.exe 3512 ping.exe 3740 ping.exe 812 ping.exe 1612 ping.exe 1080 ping.exe 4724 ping.exe 3400 ping.exe 3480 ping.exe 4176 ping.exe 4804 ping.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3812 4b62450e0d5c4baf54a6d2bf82640e18.exe 1588 smss.exe 2784 smss.exe 2000 Gaara.exe 396 Conhost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1588 3812 4b62450e0d5c4baf54a6d2bf82640e18.exe 56 PID 3812 wrote to memory of 1588 3812 4b62450e0d5c4baf54a6d2bf82640e18.exe 56 PID 3812 wrote to memory of 1588 3812 4b62450e0d5c4baf54a6d2bf82640e18.exe 56 PID 1588 wrote to memory of 2784 1588 smss.exe 55 PID 1588 wrote to memory of 2784 1588 smss.exe 55 PID 1588 wrote to memory of 2784 1588 smss.exe 55 PID 1588 wrote to memory of 2000 1588 smss.exe 54 PID 1588 wrote to memory of 2000 1588 smss.exe 54 PID 1588 wrote to memory of 2000 1588 smss.exe 54 PID 2000 wrote to memory of 396 2000 Gaara.exe 137 PID 2000 wrote to memory of 396 2000 Gaara.exe 137 PID 2000 wrote to memory of 396 2000 Gaara.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b62450e0d5c4baf54a6d2bf82640e18.exe"C:\Users\Admin\AppData\Local\Temp\4b62450e0d5c4baf54a6d2bf82640e18.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"2⤵PID:1976
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵PID:2984
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵PID:2140
-
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"2⤵PID:388
-
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:536
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:3512
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:812
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:4696
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1612
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:344
-
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1996
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:1768
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:3400
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2952
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4824
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3320
-
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"1⤵PID:3688
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:2320
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:1576
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:4556
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"1⤵PID:1236
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:4868
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:928
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:1884
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:3208
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"1⤵PID:1892
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"1⤵PID:4504
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"1⤵PID:3016
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:4352
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1164
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2872
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4540
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:540
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:3000
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:4792
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:4464
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"1⤵PID:1080
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"1⤵PID:4336
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"1⤵PID:1652
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:1900
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:3772
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3740
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1832
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:932
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1080
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:4804
-
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"1⤵PID:468
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"1⤵PID:864
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"1⤵PID:2676
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4720
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3084
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:948
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:4540
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:3880
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3480
-
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"1⤵PID:1556
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"1⤵PID:396
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4724
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2368
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1204
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2504
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:748
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:4176
-
-
C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57dc8f969ce908a455df90ea726db7fde
SHA14db5fe9daabb3e53ddb55275aa8184183760b356
SHA25621fc0056b5a9982eaa65bf223fc9f66741a042202e73e7bb05fe4995038c35d2
SHA512daf85060e9ff48e3da8f8bd8c294a8c1350eee530b907dbc74225179d21546bb522f0c544810c1fe84193d6812f171639570cecc0b2d3e71d88b385dc4b365e7
-
Filesize
67KB
MD51718628e5a872f6aefbed53bea69289f
SHA17202309e1d5355b6558cb57f14a039bb7d4fd215
SHA2566423e4965628fd586acc757e264dda55bbc9ed07d9decfccc2af864335ff7971
SHA51216854dd933c874a6a491d789f723c098e7f759f0c9ace0067bfb841f3422ab2eeee6cc8d8a9ab3f4b274848b14b32e871c9f56c91f52ee4a02bf02e3fdc52a9e
-
Filesize
67KB
MD5d64d98cafcc67ea794c4d3cfbc367ad2
SHA1f49583e8e02ed3dc47f6d17867fa0ee81e96eba1
SHA256291469528548d6699c2e6c867b9c463767dc5d4f8dda674953462ca0c7bf3e53
SHA51247d5fa8aeca8055815384e7d549e222b7ad7c9acd07f6eea10b3dc549ef465a020441ace09ba2736e7da0e36253c0439e45c2f8cd2a15870c748e38cbb2eec1b
-
Filesize
67KB
MD59cb907f5a178961ce41e8fa96cac1b54
SHA149126921ce1032855aea3c2472705bb8cff59f6f
SHA2569ba7675d2a1bf933d1e1473437d3b6c74264c462e26bb249b5e76dac87dee235
SHA5129d9c2e2775b020932efab525406f97451a9fca5a18de99c92958803e5877403f81aef6e95757d478fa78c0e0fb2292b03f94605ee2099c5c75a3970f299b132c
-
Filesize
893KB
MD50205ef5bc726c8c035606317496bb2c9
SHA15e54caa9a38ca6fe19223eed35f8e00bdf50cca7
SHA256dde78f225cb428c859f65a41018afebf5f93f9b4acb5d0f7b1d4bd2560d8e39f
SHA512e4902d98638472e584a65f8762a81a253efa022629899a5bcb2691943d670d0ef123cc3091f8e496effab743ba53781224919ac68e97bdb854bfd1c2a7e92141
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
67KB
MD5a91f60ff04b68442fbf338efdb897b24
SHA19cb31004d935a93cfb88d8c3b3032eea3cdf470b
SHA2567c7d7ae0de23fb3b6c8832b7c2a9d584a5c4d164703efb07f80f0a9e94172c6f
SHA51250d5734f7b516d0cde5190be360795b9552f82c93917d79b1898a1891e4ff0ee708f9e14c1c977178a8ee4c1fa6891fd07f264cc7e619a2ca96d0db76aefca39
-
Filesize
67KB
MD5277612ca3d155ffc1d083d2511aa6dd5
SHA1ef38b0744c33f2821a9eec321a8a040afa8896a4
SHA256b038b3a0609afa6a260aa6949a7ada8f41ca373ef0598c76708670740dc43563
SHA5128ee02a523a2081f37d4996ce259d4ebb60c71058d30120a081b5748d4a51dfb14a55e265c1d59a10935787327079d117151f714f7c2f8d5f874d3a2090932d2e
-
Filesize
67KB
MD5b104fffc8226cb67ed47a0ec8aae2d8b
SHA1782ce4f5b34795afc4f9dd6bb1757bf8a42311dc
SHA256d14adc8944e6fc0b39940b4c22e4a9be9a342b5a45717f8e300ec0515292b2c1
SHA51228816715a87f7a4cd5b0e6657cde9b0d8546b0fb0f4abe20f272e68c63b453fe195fb8846ff8467e209552185c7eb5488dc77cc9027ac62e65ada6f4f579c34f
-
Filesize
67KB
MD5d3e9753219dcfe13fd4c106ecb38b65a
SHA15dfe2a08d895f187267b92683e8df4af1f2a22b4
SHA2568301df3c53ad622df3effae0119420cf23ce945364d372ef51c0641a0fef71f6
SHA5127397c451481247f4655e4d3608fa4878818dc162afa35c7459dc7b0c02a9855d144c26c694fc2968dadc05e834318d1e03487fc8a222c2bd0b598264f85a40c6
-
Filesize
67KB
MD58bd338bb608e6a24f9eb839e55cedf0f
SHA127fb9cd1b0c7933071abd275d18053c4dbe3390a
SHA256c9588019b9f0fae509d54d50bdd382ccb7b03f22577bd3ceaee8ce0d2647ab09
SHA51214962a2847bdd68ce9e5305004268957ff48309d21993bf96d4699c30a3dd15c127af6c237a16c3a11e61bd1d69c38f5cadf56afc1f4c5a8b1d02cbd27779124
-
Filesize
67KB
MD5141e17c56229f803e174925c205aa6bf
SHA1c369609165cc0488fe6d9a0fcd477590daeb3bfe
SHA25634f47c37fda8057acbf7310badf2c2e61e782703b40631a87128f221f92e3187
SHA5123efceb0bee64d4313735cbe6653a740b12a775af1b149c76fdbdb1ed2653db8d0f903ee9d03601e5d88cf43b87373d4894bd6e09230174ae7e3f67b7340adcb1
-
Filesize
67KB
MD5762b153b2c73dfd95cc2746844c7806d
SHA1bd88eab7478356556130c44926c09429cdce60d4
SHA25690b7950d0e53a95418c1760e930e830923df2f10939c61efb852437d95ab2f8c
SHA512dda7da94f34845509b9c072de8df7efa306266860eee1bf902e9d7e57b192e5acdf6939cbc15ec8908904c14f798d8bf4f118196a7578f4d92b1766308ee0031
-
Filesize
67KB
MD561206ab9b15b9d432bc4f3c6f6e214af
SHA1fad2c4dce22e60835b5552ddc665159f4461a7aa
SHA2568042852aa5f540b9009f561d3baecf76d162ff7991ba68b23b4380f2d228c0f2
SHA512dbcecc5e2c6e552dd23ab33c86175a869d837208739770276e1be97e6bd54ebfadcbd55c4d14da83f73409b3800dc81918902f5689f1d19f53acb5ebe093ffd9
-
Filesize
67KB
MD5c3e8eee4da524f661e774f38143c23c3
SHA16ee9434be68aa5d353416a01d4f6c8a6f93fbbae
SHA256769fbde294b4469c089e1683f230f25be64d4e478f08ebd25817641fbfce3c02
SHA512e2f19dbd369ddfc7665f43f0bedb4a4504318c65841680497278aeb7c1c334a0e6d34484ffff880de5ed305a5e13833fc385cfc989a432cf027e5443bbdd42df
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a