Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
64900751a903f1fd00364aa1d1b84bef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64900751a903f1fd00364aa1d1b84bef.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231215-en
General
-
Target
64900751a903f1fd00364aa1d1b84bef.exe
-
Size
4.4MB
-
MD5
64900751a903f1fd00364aa1d1b84bef
-
SHA1
b7ce56dfdff92a8a447c5a76d0d28cb97befc84e
-
SHA256
88b5f1f49c737d8889e26f62285c88ef671dc6945a7fdab799c22821d3938864
-
SHA512
1b2dbd1ca437a43cc612c386e925804f6f31884d80e86810950ce99c799ff312be7e1c16fa3172d7515fff05423cfd2bb78b4c5f97f1493bc2c769744e4d269f
-
SSDEEP
98304:yhVYtWvIfuaqjkV9vya0ur/9n2eQX0NMk2Q:y8tWfuvvB0uL92xX0N51
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
smokeloader
pub5
Extracted
redline
pub1
viacetequn.site:80
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
nullmixer
http://hsiens.xyz/
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral2/memory/1492-231-0x0000000000610000-0x00000000006B3000-memory.dmp family_cryptbot behavioral2/memory/1492-232-0x0000000000610000-0x00000000006B3000-memory.dmp family_cryptbot behavioral2/memory/1492-233-0x0000000000610000-0x00000000006B3000-memory.dmp family_cryptbot -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4720-111-0x0000000004BE0000-0x0000000004C02000-memory.dmp family_redline behavioral2/memory/4720-123-0x0000000007260000-0x0000000007280000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4720-111-0x0000000004BE0000-0x0000000004C02000-memory.dmp family_sectoprat behavioral2/memory/4720-123-0x0000000007260000-0x0000000007280000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/1476-132-0x0000000004050000-0x00000000040ED000-memory.dmp family_vidar behavioral2/memory/1476-141-0x0000000000400000-0x0000000002404000-memory.dmp family_vidar behavioral2/memory/1476-187-0x0000000000400000-0x0000000002404000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x0009000000023030-53.dat aspack_v212_v242 behavioral2/files/0x000a000000023031-51.dat aspack_v212_v242 behavioral2/files/0x000700000002313b-60.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 64900751a903f1fd00364aa1d1b84bef.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Sat01419f8e1c6b.exe -
Executes dropped EXE 16 IoCs
pid Process 1940 setup_installer.exe 1624 setup_install.exe 1876 Sat01419f8e1c6b.exe 4720 Sat012ff5fe8ed.exe 3848 Sat01d39b63165076cf6.exe 1020 Sat0121d914644cacc0a.exe 3184 Sat0156f0a157aee8a1.exe 1476 Sat0191dd9aa7513876e.exe 4152 Sat0152d2e7e2627.exe 736 Sat0167ecaf5f3d9e0ae.exe 4956 Sat01ae6a02b12.exe 700 Piu.exe.com 1636 Sat01419f8e1c6b.exe 4996 Piu.exe.com 2996 Piu.exe.com 1492 Piu.exe.com -
Loads dropped DLL 5 IoCs
pid Process 1624 setup_install.exe 1624 setup_install.exe 1624 setup_install.exe 1624 setup_install.exe 1624 setup_install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Sat0121d914644cacc0a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1156 1624 WerFault.exe 90 4396 1476 WerFault.exe 111 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sat0152d2e7e2627.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sat0152d2e7e2627.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sat0152d2e7e2627.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Piu.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Piu.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 560 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 Sat0152d2e7e2627.exe 4152 Sat0152d2e7e2627.exe 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4152 Sat0152d2e7e2627.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 736 Sat0167ecaf5f3d9e0ae.exe Token: SeDebugPrivilege 3848 Sat01d39b63165076cf6.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 4720 Sat012ff5fe8ed.exe Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found Token: SeShutdownPrivilege 3444 Process not Found Token: SeCreatePagefilePrivilege 3444 Process not Found -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 700 Piu.exe.com 700 Piu.exe.com 700 Piu.exe.com 4996 Piu.exe.com 3444 Process not Found 3444 Process not Found 4996 Piu.exe.com 4996 Piu.exe.com 3444 Process not Found 3444 Process not Found 2996 Piu.exe.com 3444 Process not Found 3444 Process not Found 2996 Piu.exe.com 2996 Piu.exe.com 3444 Process not Found 3444 Process not Found 1492 Piu.exe.com 3444 Process not Found 3444 Process not Found 1492 Piu.exe.com 1492 Piu.exe.com 3444 Process not Found 3444 Process not Found 1492 Piu.exe.com 1492 Piu.exe.com -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 700 Piu.exe.com 700 Piu.exe.com 700 Piu.exe.com 4996 Piu.exe.com 4996 Piu.exe.com 4996 Piu.exe.com 2996 Piu.exe.com 2996 Piu.exe.com 2996 Piu.exe.com 1492 Piu.exe.com 1492 Piu.exe.com 1492 Piu.exe.com -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 1940 4892 64900751a903f1fd00364aa1d1b84bef.exe 89 PID 4892 wrote to memory of 1940 4892 64900751a903f1fd00364aa1d1b84bef.exe 89 PID 4892 wrote to memory of 1940 4892 64900751a903f1fd00364aa1d1b84bef.exe 89 PID 1940 wrote to memory of 1624 1940 setup_installer.exe 90 PID 1940 wrote to memory of 1624 1940 setup_installer.exe 90 PID 1940 wrote to memory of 1624 1940 setup_installer.exe 90 PID 1624 wrote to memory of 2948 1624 setup_install.exe 93 PID 1624 wrote to memory of 2948 1624 setup_install.exe 93 PID 1624 wrote to memory of 2948 1624 setup_install.exe 93 PID 1624 wrote to memory of 1176 1624 setup_install.exe 94 PID 1624 wrote to memory of 1176 1624 setup_install.exe 94 PID 1624 wrote to memory of 1176 1624 setup_install.exe 94 PID 1624 wrote to memory of 1652 1624 setup_install.exe 95 PID 1624 wrote to memory of 1652 1624 setup_install.exe 95 PID 1624 wrote to memory of 1652 1624 setup_install.exe 95 PID 1624 wrote to memory of 2408 1624 setup_install.exe 106 PID 1624 wrote to memory of 2408 1624 setup_install.exe 106 PID 1624 wrote to memory of 2408 1624 setup_install.exe 106 PID 1624 wrote to memory of 948 1624 setup_install.exe 98 PID 1624 wrote to memory of 948 1624 setup_install.exe 98 PID 1624 wrote to memory of 948 1624 setup_install.exe 98 PID 1624 wrote to memory of 2608 1624 setup_install.exe 97 PID 1624 wrote to memory of 2608 1624 setup_install.exe 97 PID 1624 wrote to memory of 2608 1624 setup_install.exe 97 PID 1624 wrote to memory of 2292 1624 setup_install.exe 96 PID 1624 wrote to memory of 2292 1624 setup_install.exe 96 PID 1624 wrote to memory of 2292 1624 setup_install.exe 96 PID 1624 wrote to memory of 3952 1624 setup_install.exe 103 PID 1624 wrote to memory of 3952 1624 setup_install.exe 103 PID 1624 wrote to memory of 3952 1624 setup_install.exe 103 PID 1624 wrote to memory of 2572 1624 setup_install.exe 101 PID 1624 wrote to memory of 2572 1624 setup_install.exe 101 PID 1624 wrote to memory of 2572 1624 setup_install.exe 101 PID 1176 wrote to memory of 1876 1176 cmd.exe 100 PID 1176 wrote to memory of 1876 1176 cmd.exe 100 PID 1176 wrote to memory of 1876 1176 cmd.exe 100 PID 1624 wrote to memory of 924 1624 setup_install.exe 99 PID 1624 wrote to memory of 924 1624 setup_install.exe 99 PID 1624 wrote to memory of 924 1624 setup_install.exe 99 PID 2608 wrote to memory of 4720 2608 cmd.exe 102 PID 2608 wrote to memory of 4720 2608 cmd.exe 102 PID 2608 wrote to memory of 4720 2608 cmd.exe 102 PID 3952 wrote to memory of 3848 3952 cmd.exe 105 PID 3952 wrote to memory of 3848 3952 cmd.exe 105 PID 2572 wrote to memory of 1020 2572 cmd.exe 104 PID 2572 wrote to memory of 1020 2572 cmd.exe 104 PID 2572 wrote to memory of 1020 2572 cmd.exe 104 PID 2408 wrote to memory of 3184 2408 cmd.exe 110 PID 2408 wrote to memory of 3184 2408 cmd.exe 110 PID 948 wrote to memory of 1476 948 cmd.exe 111 PID 948 wrote to memory of 1476 948 cmd.exe 111 PID 948 wrote to memory of 1476 948 cmd.exe 111 PID 1652 wrote to memory of 4152 1652 cmd.exe 109 PID 1652 wrote to memory of 4152 1652 cmd.exe 109 PID 1652 wrote to memory of 4152 1652 cmd.exe 109 PID 2948 wrote to memory of 2144 2948 cmd.exe 107 PID 2948 wrote to memory of 2144 2948 cmd.exe 107 PID 2948 wrote to memory of 2144 2948 cmd.exe 107 PID 924 wrote to memory of 736 924 cmd.exe 113 PID 924 wrote to memory of 736 924 cmd.exe 113 PID 2292 wrote to memory of 4956 2292 cmd.exe 112 PID 2292 wrote to memory of 4956 2292 cmd.exe 112 PID 2292 wrote to memory of 4956 2292 cmd.exe 112 PID 1020 wrote to memory of 4396 1020 Sat0121d914644cacc0a.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64900751a903f1fd00364aa1d1b84bef.exe"C:\Users\Admin\AppData\Local\Temp\64900751a903f1fd00364aa1d1b84bef.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01419f8e1c6b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat01419f8e1c6b.exeSat01419f8e1c6b.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat01419f8e1c6b.exe"C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat01419f8e1c6b.exe" -a6⤵
- Executes dropped EXE
PID:1636
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0152d2e7e2627.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat0152d2e7e2627.exeSat0152d2e7e2627.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01ae6a02b12.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat01ae6a02b12.exeSat01ae6a02b12.exe5⤵
- Executes dropped EXE
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat012ff5fe8ed.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat012ff5fe8ed.exeSat012ff5fe8ed.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0191dd9aa7513876e.exe4⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat0191dd9aa7513876e.exeSat0191dd9aa7513876e.exe5⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 11646⤵
- Program crash
PID:4396
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0167ecaf5f3d9e0ae.exe4⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat0167ecaf5f3d9e0ae.exeSat0167ecaf5f3d9e0ae.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0121d914644cacc0a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat0121d914644cacc0a.exeSat0121d914644cacc0a.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:4396
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Abbassero.wmv6⤵PID:4800
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:2588
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^VHwgFRxzxxLcwcGoqrvwdRkyDDkqmNLTpdmTOMvFsotvynnSaSEGawtrcWKeGzUGIRjLVNzgHQJiNPZttzIGotBijvbSexZYgbNhjNWFndZB$" Rugiada.wmv8⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.comPiu.exe.com L8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.com L9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.com L10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Piu.exe.com L11⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1492
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping NUPNSVML -n 308⤵
- Runs ping.exe
PID:560
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat01d39b63165076cf6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat01d39b63165076cf6.exeSat01d39b63165076cf6.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sat0156f0a157aee8a1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\7zS49700ED7\Sat0156f0a157aee8a1.exeSat0156f0a157aee8a1.exe5⤵
- Executes dropped EXE
PID:3184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 5644⤵
- Program crash
PID:1156
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1624 -ip 16241⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1476 -ip 14761⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59816173c0462753439780cd040d546e2
SHA1cb63512db6f800cc62dfe943a41613b4cbb15484
SHA256da65a761ea15c24fdb4e322e48d67f914c9399e6c804de75127424211551d51f
SHA512c9443baaf190b01b36d0d65103634d5f9492acd395ef2b9924e60822d7023dfc40692443362342534db284829ae36302f75d3ebc04d3ebf5bc3107e3b59e46bf
-
Filesize
248KB
MD5d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
276KB
MD5873baa8dc83cc38373f0b63dcb832437
SHA120bba46dc16838240f717e0150e90908d09c8eac
SHA256d97cdf5a74a79f9fc96389b2ec0b85cb3040b8ee3fbeda1755aa2a6e5639d63b
SHA512114df137923f31aadc82c89b917beefa00cd0de9f420a0914acfcf3af5e4072d8cb0381f24e7033e6f54997e63666508b77bed79045cae254281f5d4a460b32e
-
Filesize
900KB
MD50a0d22f1c9179a67d04166de0db02dbb
SHA1106e55bd898b5574f9bd33dac9f3c0b95cecd90d
SHA256a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac
SHA5128abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b
-
Filesize
8KB
MD5d1d4b4d26a9b9714a02c252fb46b72ce
SHA1af9e34a28f8f408853d3cd504f03ae43c03cc24f
SHA2568a77dd50b720322088fbe92aeba219cc744bd664ff660058b1949c3b9b428bac
SHA512182929a5ff0414108f74283e77ba044ab359017ace35a06f9f3ebd8b69577c22ecc85705cb908d1aa99d3a20246076bc82a7f6de7e3c4424d4e1dc3a9a6954cd
-
Filesize
612KB
MD5c9080d1b76e91ae039858a67c218b2d3
SHA19fde651375272397c3ed64de8763ef900a2b6ae8
SHA25636bc7d6d883c2daab6fc171443022aa13497c3fdbf5c4b7e46f204249c52ffa5
SHA512b9f1f836c1aee6dc27223abdd323cefe5728426a9b428576f6643a209dac760c053e16a8fc3173fb00bd25aac855709aecc1b13849b6c08dd547ee44f3ba22e5
-
Filesize
1.5MB
MD5df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
Filesize
156KB
MD5cda12ae37191467d0a7d151664ed74aa
SHA12625b2e142c848092aa4a51584143ab7ed7d33d2
SHA2561e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e
SHA51277c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD51f91ac37f4384a24f64c1f2ce7befc1f
SHA1f35387f1a0cf5ed5539485b7bcd0d8d50860b0bd
SHA25665e481660282fa451016d63be21c830287e594c52376aa3449cbb69f5330b4f7
SHA51262df784edb1ee1f56f0f785bf0ebe5fcdf49631c2267919c01b04face61e28385b874b1ebdf96f19ecec4d2e510e332d5c7cac13fff6cb38211a7f35756e2665
-
Filesize
534B
MD5697af31c63a3d02a3e39109027671e68
SHA18a7083bc918366b05f75e54853cc39a45cc0da7c
SHA2566cb806bec68db2c4f5aee59c4f604b502a4266f020cdf408e4dc543974b88036
SHA51212a0b4f4023e04afe7515da738a4574931ff1d7538e264c93eef6142675be6bf83cdd590bbdaa6f704da9a78addd6b111a0bf23542f5c11d65b213feeaf8a8b8
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
256KB
MD56f7d98bc6e164eb29073363e832595ce
SHA1808c4325bb5fb82f539efb5ac3b8fd6178310117
SHA2568266eda839aa64ab57f7db08dbea6f4e4cd7071bd443a85974682e5af1b893ed
SHA51224405dac4d81c8b31dc6a1adf0d108ef090111ed4f591cced3c16661bf2656cf14b7bd44aef6a6df29ea12fcac598c3de0229e2a8bbe85b5cd49a86763972f8e
-
Filesize
512KB
MD55c3b17ef0a8665eadcc9e78656080b51
SHA1a97011b64212a761c02fc1dc53598310b23d9e1d
SHA256e008ee57854b1a5b2cf470d68cd6a79bd8125019d5ab5788e4698c9c674bff5b
SHA5125c4fb648dc730da43aca9f08f5d453e5ff991f748c375480637de12aecde85e7d9bd8ff90bc5fcd964b72a808a24efee0ae096879a49eda89bd2f7b59d600152
-
Filesize
577KB
MD59d64d14627e79c6f733c74a2049c334d
SHA1771f3b69b8954df0134c5f750a92aa521a2d9a36
SHA2560d16e628415ab84ab9d56af4587fe1419acdb5806b7d9dda552a5bf66a5b56c6
SHA512433da42bd563ff43e5e4ce399b9bab8bb64a62fc67aea8114b49b4a1e8e4b0bdba68ade2e70b5a62cb4417e06200e2dfb5fe8bb6ca9141947148d22af09223db
-
Filesize
634KB
MD577b02472e42d7fdae3f1f39cfc5d9158
SHA1f5f4570b452b6554e0ac7c9ab476ca6db9320f29
SHA256111b913a0dab95cd7efaaca4676b1ea47113ebd0f8e3b4a6707af0fa62337a97
SHA512945a6727e0d0f98db230b93933e3fa20ea4b5e98d2e6e03374e6718d2cd5097a20f8a5dc4cb4e00a9f070286a623f7719cc1ee9a5f9910a6156fb29ce8f559d0
-
Filesize
192KB
MD5926a5ebf31d3d524480e5b5b8d079ac4
SHA1d76ef06167a4207ce7c686b27205a83a35471974
SHA2565ee721c11fbd6cf1db1d078886ebff656a42696c9c68bcbe5340d1665b3c8539
SHA512c9cf047280c04fb579a8ddeb82385ea67754e4ab81334da8a89a0e43ad0d7b61d7b208843ba4d767e6c003b919f9f758e248c0affdbb1106aa3ccf98baf8ffc6
-
Filesize
1KB
MD52ddda298490aff288abe4a3552e07555
SHA1800df8989e28f7b7c9237a16f82c2f3597fff25c
SHA256aea445327257e3e13bc42d4aa8f960dcc095516b8b70940340d04ccad6e354f7
SHA512029817ea6dfc7e6711c8c1f70ed17744faab198d5394c07688e31e9ce5b51253e42bad6b1618032dacb3f0cc0f1a4bb9181d2c6408bcb297ad10fd98409626d8
-
Filesize
7KB
MD5d7a17a0e4dcbf01951fe447b80cf623f
SHA1cbecbedd766bf1c3b7b1ca6037d15adc57b738f4
SHA25694fdb803c556a829b0e106565a3b098dae26377f3606265e14d93f89deb19704
SHA512bbb7104ff1d10b9bdd371aa29911b8dac2d1037aca6fb420bc1d70a810e37a930e42bb6848d29e2124930d7b1374362728fee63120adab0e9e5caa56477b7d94
-
Filesize
44KB
MD58a2964ae76d0feefbc640c6406a75b78
SHA117f3bbaace73e68c1e15e9ffb8b9de3e6d0a2670
SHA256b994b53a19d06d528766b9cd84607b59524b51391c77e81ee72150cc7440a513
SHA512b8f339cc30a7b4d098c3661cf2af7ddf4334b5ad21455eb4af1b5c38de7ccdeade98edb8ab90a44627168e7f76cfee64d2f010ee4ac44589e62688b0f90ea8f5
-
Filesize
690B
MD58c13a8405466d398600c41475e58ac57
SHA1a05880cacd77f46d58bd202d84a65b5d1abec550
SHA256dde609ed2915858b573b2a3dc1df830a9b334b99cabb8f9dd21df36bfbce1df8
SHA512286d0451fa09941af046e2af0f83c6e62bc0c56312ae1914f17913426327433e4d69066466ac3629a07d871747833b4aaa1d48050cd334b41f359b50f313655d
-
Filesize
7KB
MD57c07e1aeef411ae13269205189deb2db
SHA116e42e86f5d122a6ce47d98580a9148cf9b89653
SHA2560e9d42bcd7826e55438d5da5901b0fa55b58c268dcd900e2cfebdbc7dcaf837d
SHA51277d4461248a8e96afb8657d1a6fec10d94dbaa401450f21a3a085f0404acf0fb33432896e5f20b6354838d298cdd20aff8bee259182c3e31a6ae3762bef41f42
-
Filesize
38KB
MD5dada2b71446f2e167bb68beb90f9c58d
SHA1940c0a47c1a982486f40bd589a9a61b288aabb35
SHA256ae438dda079d0b186bba539b0e6c63f55b70edc5a6776e48050fb58fc70309b6
SHA5122066d8a17f42423fd5b275b0207579b10b60e98887c7227c62b5174dc36ecbab23a64d419fdada6bdf7741fa3aee56ed46a1cca90f4f257f08186f8b8b716c0a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.3MB
MD50286f9b59396cd300da7e312acde0650
SHA1dd65aee16954c62a471d43ca7664d65dafa6e3e2
SHA25678e623c6620f1b07f200e69f8d0127229cd3f415575e249b3539aa020c62e4d8
SHA5120ba088170ef1c8a8088b459ee05ab7bda2adf68c7d98526cab13dbd7251032347a28ed47d68bd9d7e56ca08837ea71eec6c9ce62802b1676c7adc923a1122dc8