Analysis
-
max time kernel
143s -
max time network
175s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/01/2024, 21:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.github.com
Resource
win10v2004-20231215-en
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DB.EXE -
Executes dropped EXE 5 IoCs
pid Process 5100 AV.EXE 3536 AV2.EXE 4560 DB.EXE 5084 EN.EXE 3004 SB.EXE -
resource yara_rule behavioral2/files/0x0002000000025ca2-527.dat upx behavioral2/files/0x0002000000025ca3-538.dat upx behavioral2/memory/4560-540-0x0000000000780000-0x0000000000813000-memory.dmp upx behavioral2/memory/4560-559-0x0000000000780000-0x0000000000813000-memory.dmp upx behavioral2/memory/4560-560-0x0000000000780000-0x0000000000813000-memory.dmp upx behavioral2/memory/5084-563-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/4560-568-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4560-570-0x0000000000780000-0x0000000000813000-memory.dmp upx behavioral2/memory/3536-573-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/3536-577-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/4560-590-0x0000000000780000-0x0000000000813000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DB.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 15 raw.githubusercontent.com 17 camo.githubusercontent.com 24 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 SB.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\tsa.crt AV.EXE File created C:\Windows\SysWOW64\cmdextp.exe DB.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2152 2832 WerFault.exe 93 3156 2852 WerFault.exe 99 4804 3536 WerFault.exe 106 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133508664053290814" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1199853020-417986905-91977573-1000_Classes\Local Settings chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30530A0C86EDB1CD5A2A5FE37EF3BF28E69BE16D AV.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30530A0C86EDB1CD5A2A5FE37EF3BF28E69BE16D\Blob = 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 AV.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe 3812 chrome.exe 3812 chrome.exe 4560 DB.EXE 4560 DB.EXE 4560 DB.EXE 4560 DB.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe Token: SeShutdownPrivilege 2340 chrome.exe Token: SeCreatePagefilePrivilege 2340 chrome.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2000 2340 chrome.exe 78 PID 2340 wrote to memory of 2000 2340 chrome.exe 78 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 708 2340 chrome.exe 81 PID 2340 wrote to memory of 1872 2340 chrome.exe 83 PID 2340 wrote to memory of 1872 2340 chrome.exe 83 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82 PID 2340 wrote to memory of 1800 2340 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.github.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe16499758,0x7ffe16499768,0x7ffe164997782⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:22⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:12⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4512 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:82⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1812,i,8514332903566971106,14496756282880902983,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4860
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Temp1_YouAreAnIdiot.zip\YouAreAnIdiot.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_YouAreAnIdiot.zip\YouAreAnIdiot.exe"1⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 12282⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2832 -ip 28321⤵PID:4424
-
C:\Users\Admin\Downloads\YouAreAnIdiot\YouAreAnIdiot.exe"C:\Users\Admin\Downloads\YouAreAnIdiot\YouAreAnIdiot.exe"1⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 14602⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2852 -ip 28521⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ana.zip\[email protected]PID:704
-
C:\Users\Admin\AppData\Local\Temp\AV.EXE"C:\Users\Admin\AppData\Local\Temp\AV.EXE"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies system certificate store
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\AV2.EXE"C:\Users\Admin\AppData\Local\Temp\AV2.EXE"2⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 5123⤵
- Program crash
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\EN.EXE"C:\Users\Admin\AppData\Local\Temp\EN.EXE"2⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\EN.EXE > nul3⤵PID:5008
-
-
-
C:\Users\Admin\AppData\Local\Temp\SB.EXE"C:\Users\Admin\AppData\Local\Temp\SB.EXE"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\DB.EXE"C:\Users\Admin\AppData\Local\Temp\DB.EXE"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4560 -
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins4593.bat "C:\Users\Admin\AppData\Local\Temp\DB.EXE"3⤵PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3536 -ip 35361⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ee8b9127bbf0b2aecd1ee32885e0e97b
SHA194fe92a2274710370e8a61f86bfc3f64fea044cb
SHA25685b654132c3ff7c013ea658f0f36721237f8176e30c1984845ded92e8569eeda
SHA512412e5db17b2668f95792fe41e37f6c911fcb2a8f78b181e9363e44a26602c82330072c02ec6854428301f4d8eb2ed14edf9e31c3078520fea6b31dbdc2fdd8a0
-
Filesize
1KB
MD5638a35c22e5b028ced5ed904f34dad01
SHA1a705536f34d0b7a9cbceb2f09e087891c9e4f1b9
SHA256af8e12e787488d6ff364cf8cd25f60eaefd578ae97cadb66f12aa87b71abed74
SHA51244414b3bf10f1248fed61e8de20ffbaa9755f5bced633268007e5f5d7e8fac1af6c831580a1d98bfe8cb50c3f899c025fc69a5fb592666164d1e0a0989c1ef38
-
Filesize
1KB
MD54c76455aeef619a8652cae373b7d8442
SHA19ce46e09378a8605179183ddc824fa1b342d738e
SHA256920a7bace198ff6c8d0a0f33bcb5997a73915fbc1ef53dfd1797d43579d76e22
SHA51210a002c1d5bcb2486d8431dcba01ec3977c4f221056793eb1363ad270a92bf084a6ae6d52e3edc5b21ce405db24b7ecf33fc11dcac8c3ba70ddedd3656d8398a
-
Filesize
1KB
MD58719231293ba9950690857103401a866
SHA1e97f8b546c2d65207b4191f5ebc7e53e86ab5067
SHA2569ca1f3176c2cedf58efcadff8a809a6417c21877aa3baebdabf1411edc5087d2
SHA5121b578177cb21f6858645ec69fd59a51767acd52e2b381edc7fdd21c9f53871d447a72a37404841ba2edf496e8009657f403328c1dbf74849c4dd6144bfdfaa1e
-
Filesize
1KB
MD593a0ef400a9a232ceb022c8bfcc72594
SHA1ee4caa6f345d3ee691f728a8af1298892988e68e
SHA256c2125a9d2bf9dba30af9bf6be98004a417ef0859937d4b9ff90d5540a853474a
SHA512bd4040e44afbe718fc7019ac32ed7e4eb45cb3346295482f390aa130f1c9a3a4753c3f1dd7ca0cf217c80ca9b299ef5ab8bda84e5ebb92fcad15ce8d1a64e7f8
-
Filesize
1KB
MD511c70ea6775bc7eecc9e80f1aec2cd4e
SHA1b5a4a423a84f740a9b6551faf44fa4986fd4fdd7
SHA25636222b422d7c6d16d7c8c4519517f6d70cd41c94c2cf299da0d84abbb14f25c5
SHA512715abc74733edfd57f15b8b50672f62935b7b889cb8e46bab1fc9186a534e7071bbdaac0aac5da346eeadb2ee1f41936df49bba529e65d6d35a7d6a41fe937bd
-
Filesize
1KB
MD58975f14defc1e5763cdbea26a137d32d
SHA1baf7439445e62c2b2b316fc2f567609d66dbb23e
SHA25697a2a28ca43010ab801b135332e996e7e2666821353b2fa1fe29585ca76a4cf2
SHA51287ccdd3c15e68fda7d7881416592e278c795b5fa0e6df3e491211e42a08a807bfbff551248414d583773b4ee1739c99baa512f91d3a8323e6406a55bde890649
-
Filesize
1KB
MD572029571be39cce57a5f54030d38885b
SHA1d2d6c66eeeb25865a94e1fd75d0768cc1a7f13bf
SHA2562db9b0733f32cfc860fb4a06ac458a67d78815beb51cd4d6bf8c0137a531f9bf
SHA512dd891a6739a5041140fed0467876721691c4112b76ec8383cbfaf319db11a21c054af4c3ea05b50cd546a296c3e2d8705466c4075130a547321fc42ed55bb922
-
Filesize
1KB
MD50a49549e832c53a7959a0971b01c5269
SHA1c58fc50d0563a6c98746f73ff0390b2f86bfb321
SHA2567d7b68239644dd7db241f4be2cde34f8f3da3d5ef765307227a57de4ed38971f
SHA5121340e691a1ebdfd2e38846074c07601f2bd17ac32b489dc6fa28002e7155811172e4ae523bd6429b8a8425baa8ff6749a11dce06b02573145bd465f97605cf47
-
Filesize
6KB
MD5ba1091876a5322cd8590bdb8eefa7334
SHA1edb3c17eff6b3e2f5cc32894e5328781de800753
SHA2565b8da94a59f49a750ded5f0d6f87c1615105405eba9e9386552174b35d01c562
SHA5120578e919f9ea9c5614a333d37438ecea1ff545628d6f53a3ddcca053d2ca940f0422545e4adc661075505dd1468bc134618b69272aa4579265a067174a7b6017
-
Filesize
6KB
MD5f457cf6f0c8822078108c9e249d6c5db
SHA12bcc495e22addd106c2812814e4a2624c7196637
SHA25610f70567f2d632236b0814b37bc71f96fbd7954382100e3cc32bb6a0fe6db737
SHA51263098add5a6d4b4d96439c662bf919d58120c22078b880f53a55cd8963938746e97bc44e6c769fdd364261b56c8248e94211c38760732d13c70704455ee53d4d
-
Filesize
6KB
MD5d76f947b41bc172423aefc0fdb7f604a
SHA128da6f6ac00e5d36818ef4f96c34598231b77fd6
SHA256e8fc0ece9a6b55b87b0140d9f041f75cdb866931fe2a9a9949b2d685abed0955
SHA512d6f53c1503d958224a8f5f77b57d7611c89834f9fe7d1ac46a7396d77db20056234406d81942de9f46ed4586ced8b7375c94e8555852e06ab86b4e70a3177fd2
-
Filesize
6KB
MD5a5554b8b4cb8b12a759ae873e8b53a07
SHA1abb426a36de80bb67be39c348ffc7af624f526b8
SHA256d8e4af8c7b4975280478898c5b344e1cf07bf0a9a25c4763b86bc8bcbe571cde
SHA512a6b463906f77617a6c500396cfb42905e5b09d819db0e3b7897350893d739a7be748c782aa4fa50e56786ff718587072cde9365da062b4f0a9395ba1cedc05a7
-
Filesize
6KB
MD59ea2d5bc071a2372e0d1c6ff541d1272
SHA185a8ef46b724c3ca6200757687f4b0a1e90e709e
SHA256c3359aafab2ce2b0026172c65116ca947cdddf01ee94c995a77ccc8c0f79bd60
SHA5128d55da79c2c1c61a7e4361083a2422466d2f5b99c6d05a700094f675e5ccf5ec5bc93ad71a619f2a3a902e7d96999b255b1113f7122ee2ab46a6383bf7f83517
-
Filesize
114KB
MD57413f0096c10051f19808d02976cbb7e
SHA121c8515e7ff5d5555688d1cebc489998e9fc8d44
SHA256a1f8c0d805634eed1e8cd1fa3eaabc1008bba266b473d2197aae705162c58392
SHA5124093dd6b1e034b6c9cb9f6e5674a9706a5de4430feb7acd32408a2325f757cb80cd413ba4d526b072fb7fed7494e4b81a1a5ead522c713deeef98ef492687d98
-
Filesize
98KB
MD553d03702d7f2fe5b186c46049b8b532a
SHA1588c8f7e417ed34783c77cefad452d2334df0243
SHA256ae95fd18d82b6b9a00d5b677a4e560171ab9704e9ab536f953d3ba623cd6fde4
SHA51216125b15ecbf5fcdffbca96e311e84be96d4042dec810c24d1c6710fd352440b52ca4f9c56900ffe15e0a29699ab10b09862f5a6f632839540b106d668680f5d
-
Filesize
89KB
MD56b4f119948226c191011770b066707fd
SHA1d43901f8fa06072ddddb1c36a13843da9b6eae41
SHA2569b99f306d8c59fdfd71668c4081815ad205b29317bb91a741fda8bde52b387a2
SHA512854b1a01b7f93d6911d430d808aa277ed4320c859ddeb829b1a1706c9ceeeceed229eef030b4c87328c3547a4fbb877226f0d854b448f7a29971a32278420a2b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1.1MB
MD5f284568010505119f479617a2e7dc189
SHA1e23707625cce0035e3c1d2255af1ed326583a1ea
SHA25626c8f13ea8dc17443a9fa005610537cb6700aebaf748e747e9278d504e416eb1
SHA512ebe96e667dfde547c5a450b97cd7534b977f4073c7f4cbc123a0e00baaefeb3be725c1cafbfb5bb040b3359267954cd1b4e2094ef71fc273732016ee822064bf
-
Filesize
960KB
MD58824016e3e2a5b95928624429fdf5648
SHA1d1eaa667d048605a3cec65e689843c72750f4f16
SHA2564d456971a8d65d6eaca3067f2764b43492c3bb153edba3e86346962ff9d09e70
SHA51288c54b2cfc23fe02b5e89bcf1ff7197823d904c51af987eb69cacdd0b4b83fd41ec9f6ce19ee63c96bf15bb88dee1448b7a8a7918e7de0414843227ffcf4649b
-
Filesize
704KB
MD54445fbf70f947194e1a67a873b9e39f7
SHA1507ec8faebe7b198a04e32fd1d8bb522ce8bf8c7
SHA256698c0069172d535085d239c49ba7587627e4ee6f4ba0f7e5ab2f8262e4274acd
SHA51290d8f2e37c9a446d9adbc78287b751f43514623a64a7c7279ce09069a7f0aef822befe54d3702a24899f3ba065928f677ef9eb2f824541adf13e4c24f49538b1
-
Filesize
368KB
MD5014578edb7da99e5ba8dd84f5d26dfd5
SHA1df56d701165a480e925a153856cbc3ab799c5a04
SHA2564ce5e8b510895abb204f97e883d8cbaacc29ccef0844d9ae81f8666f234b0529
SHA512bd5159af96d83fc7528956c5b1bd6f93847db18faa0680c6041f87bbebef5e3ba2de1f185d77ff28b8d7d78ec4f7bd54f48b37a16da39f43314ef022b4a36068
-
Filesize
243KB
MD5c6746a62feafcb4fca301f606f7101fa
SHA1e09cd1382f9ceec027083b40e35f5f3d184e485f
SHA256b5a255d0454853c8afc0b321e1d86dca22c3dbefb88e5d385d2d72f9bc0109e6
SHA512ee5dfa08c86bf1524666f0851c729970dbf0b397db9595a2bae01516299344edb68123e976592a83e492f2982fafe8d350ba2d41368eb4ecf4e6fe12af8f5642
-
Filesize
6KB
MD5621f2279f69686e8547e476b642b6c46
SHA166f486cd566f86ab16015fe74f50d4515decce88
SHA256c17a18cf2c243303b8a6688aad83b3e6e9b727fcd89f69065785ef7f1a2a3e38
SHA512068402b02f1056b722f21b0a354b038f094d02e4a066b332553cd6b36e3640e8f35aa0499a2b057c566718c3593d3cea6bbabd961e04f0a001fd45d8be8e1c4e
-
Filesize
149KB
MD5fe731b4c6684d643eb5b55613ef9ed31
SHA1cfafe2a14f5413278304920154eb467f7c103c80
SHA256e7953daad7a68f8634ded31a21a31f0c2aa394ca9232e2f980321f7b69176496
SHA512f7756d69138df6d3b0ffa47bdf274e5fd8aab4fff9d68abe403728c8497ac58e0f3d28d41710de715f57b7a2b5daa2dd7e04450f19c6d013a08f543bd6fc9c2e
-
Filesize
224KB
MD59252e1be9776af202d6ad5c093637022
SHA16cc686d837cd633d9c2e8bc1eaba5fc364bf71d8
SHA256ce822ff86e584f15b6abd14c61453bd3b481d4ec3fdeb961787fceb52acd8bd6
SHA51298b1b3ce4d16d36f738478c6cf41e8f4a57d3a5ecfa8999d45592f79a469d8af8554bf4d5db34cb79cec71ce103f4fde1b41bd3cce30714f803e432e53da71ea
-
Filesize
49B
MD59e0a2f5ab30517809b95a1ff1dd98c53
SHA15c1eefdf10e67d1e9216e2e3f5e92352d583c9ce
SHA25697ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32
SHA512e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42
-
Filesize
1.8MB
MD5cb6e4f6660706c29035189f8aacfe3f8
SHA17dd1e37a50d4bd7488a3966b8c7c2b99bba2c037
SHA2563341abf6dbefb8aec171f3766a4a23f323ff207e1b031946ee4dbe6dbb2d45a4
SHA51266c3351ce069a85c9a1b648d64883176983acd34c0d5ca78b5138b7edc2890b34408e8e6fa235258d98c105113d1978a68a15262d6523a82abb004f78b06de38
-
Filesize
223KB
MD5a7a51358ab9cdf1773b76bc2e25812d9
SHA19f3befe37f5fbe58bbb9476a811869c5410ee919
SHA256817ae49d7329ea507f0a01bb8009b9698bbd2fbe5055c942536f73f4d1d2b612
SHA5123adc88eec7f646e50be24d2322b146438350aad358b3939d6ec0cd700fa3e3c07f2b75c5cd5e0018721af8e2391b0f32138ab66369869aaaa055d9188b4aa38d
-
Filesize
1010B
MD56e630504be525e953debd0ce831b9aa0
SHA1edfa47b3edf98af94954b5b0850286a324608503
SHA2562563fe2f793f119a1bae5cca6eab9d8c20409aa1f1e0db341c623e1251244ef5
SHA512bbcf285309a4d5605e19513c77ef077a4c451cbef04e3cbdfec6d15cc157a9800a7ff6f70964b0452ddb939ff50766e887904eda06a9999fdedf5b2e8776ebd2