Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01-02-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
Resource
win10-20231215-en
General
-
Target
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe
-
Size
680KB
-
MD5
422a2d14300bd479e24d7fbb9eaf44dc
-
SHA1
24b6005299fd8a3de98a1c5586ea7bf58e1ae528
-
SHA256
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6
-
SHA512
2e60f8690eaaa047f0ef283db87ec930c12769b2581e4cf8ddeedcf8bf101ef6546e91a18bc6d674a7a8a15da032162522a1574ac4a2b29bf4e7c4af6dbd601d
-
SSDEEP
12288:pUGSQNEnmEK1IfCivcDDLEn+ImsVXVoLz1O4DxFqSsI26CdW7/InwbFNbCnp:pYSEnmET7k3wmaYz1bP8W7xbvkp
Malware Config
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Signatures
-
Detect Vidar Stealer 6 IoCs
Processes:
resource yara_rule behavioral2/memory/756-51-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/756-53-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4640-52-0x00000000005B0000-0x00000000005E0000-memory.dmp family_vidar_v7 behavioral2/memory/756-47-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/756-86-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4020-106-0x0000000000A00000-0x0000000000B00000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 16 IoCs
Processes:
resource yara_rule behavioral2/memory/4528-4-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4528-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4528-6-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4528-3-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2596-2-0x0000000004880000-0x000000000499B000-memory.dmp family_djvu behavioral2/memory/4528-17-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-22-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-23-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-30-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-37-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-36-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-34-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-41-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4612-72-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
build2.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 4640 build2.exe 756 build2.exe 3324 build3.exe 3088 build3.exe 4020 mstsca.exe 3620 mstsca.exe 2652 mstsca.exe 2392 mstsca.exe 712 mstsca.exe 2528 mstsca.exe 3632 mstsca.exe 5088 mstsca.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-33539905-3698238643-2080195461-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\1fb87864-2804-4ada-94a7-411d9ffcc824\\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe\" --AutoStart" c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 api.2ip.ua 2 api.2ip.ua 10 api.2ip.ua -
Suspicious use of SetThreadContext 8 IoCs
Processes:
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exec7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 2596 set thread context of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 set thread context of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 4640 set thread context of 756 4640 build2.exe build2.exe PID 3324 set thread context of 3088 3324 build3.exe build3.exe PID 4020 set thread context of 3620 4020 mstsca.exe mstsca.exe PID 2652 set thread context of 2392 2652 mstsca.exe mstsca.exe PID 712 set thread context of 2528 712 mstsca.exe mstsca.exe PID 3632 set thread context of 5088 3632 mstsca.exe mstsca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2588 756 WerFault.exe build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2972 schtasks.exe 2800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exec7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exepid process 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exec7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exec7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exec7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exedescription pid process target process PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 2596 wrote to memory of 4528 2596 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 4528 wrote to memory of 4132 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe icacls.exe PID 4528 wrote to memory of 4132 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe icacls.exe PID 4528 wrote to memory of 4132 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe icacls.exe PID 4528 wrote to memory of 832 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 4528 wrote to memory of 832 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 4528 wrote to memory of 832 4528 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 832 wrote to memory of 4612 832 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe PID 4612 wrote to memory of 4640 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe build2.exe PID 4612 wrote to memory of 4640 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe build2.exe PID 4612 wrote to memory of 4640 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4640 wrote to memory of 756 4640 build2.exe build2.exe PID 4612 wrote to memory of 3324 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe build3.exe PID 4612 wrote to memory of 3324 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe build3.exe PID 4612 wrote to memory of 3324 4612 c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3324 wrote to memory of 3088 3324 build3.exe build3.exe PID 3088 wrote to memory of 2972 3088 build3.exe schtasks.exe PID 3088 wrote to memory of 2972 3088 build3.exe schtasks.exe PID 3088 wrote to memory of 2972 3088 build3.exe schtasks.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 4020 wrote to memory of 3620 4020 mstsca.exe mstsca.exe PID 3620 wrote to memory of 2800 3620 mstsca.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\1fb87864-2804-4ada-94a7-411d9ffcc824" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe"C:\Users\Admin\AppData\Local\Temp\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exe"C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exe"C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exe"C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exe"C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 20322⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD58112ab2a9d7578692e66734917d00015
SHA15dc1f7cb2c66c925d195fb98784917d108a001dd
SHA256919561b1927726f5218e79f21184c4bf7117db4466686fc93d3d5dbc1380033b
SHA512538f1f36b44d628d2ade163cc40deb58b50cb7fbd56019d9526c8233c30771db8542ed5786d311322dfd2e9d44e979da9513c4a0bbc7416b47bb7beca90013d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD519a04f97dbde8479d9c92012d0079466
SHA189635016362419209829e1949eed43c36e41bacc
SHA2563e27c011c802f4e9d34afbdf636a6429ab697a95fdd253e7c75c39e3319413c3
SHA5124240e0543e826c3358942a330aa8633d7d59cdd54487ec09c7daf4dab1210a23252e85dcbbae0bb6763e9687e829e858e2a0196cc3e6ee41a1f4315eac77df34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD5eeb26ed7a0d53ad4accfd7b8ed531bb8
SHA1bc3f5b7f3152dfb22a6aaf547c1cfacea95b6a32
SHA256486b6d803dbb86d707812b0ce1a5144c67760c7d2bf044e4f97d71a67928b885
SHA51241267d30fb0a4b9e4224e47056ca077a24f21634f0c05aed4cce4610d150c665e4efefc31c539da70c772934209a6c7733f75d68663d6a8cb05dd30603057243
-
C:\Users\Admin\AppData\Local\1fb87864-2804-4ada-94a7-411d9ffcc824\c7c2b9ec7d8324162f29a8eb989d749bbd602bc0f166db5bb02ec8f26803f7d6.exeFilesize
108KB
MD5fa40c4c7a693067bbe2c7fe514ebfbcc
SHA1019be0945f1e04c6f2adda70e260cdbf7a2f566e
SHA256bb8c0e192e2c6855c727ad8c526e9a3e24c5f8946641f851571713127a33ee8f
SHA512644c45ac17335cda408498cfdc5ac7a52548018dd798d9db5101ccba3185cae4ba20a5963ed70fdad9af929f1b3949ab2334c549e82e6cf71cf1d4dd786f5b79
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exeFilesize
7KB
MD56aed81349667d7d0413a71846456e277
SHA1bffc9b13fc0b62533b003129ba51be02fccbbfe0
SHA256c39e26be04044677068a94169ff282e10af4bccb9d2e7341ed938057768bfd19
SHA512fc689881a2d502440be6100006f29f808b714d8503cc396b1094de561cba918d72418b6e90286dfba1e293e18a40423afe4d663f25850ab91fc3e3629a8c5b0c
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exeFilesize
40KB
MD5dd62d77687231d204a717c7e37d2d91e
SHA1e4ec8d7811ce3544d1bfc11eff7a6659d7ccc8a9
SHA2563a62d10623e39b435f68bad388de9f518aaedfcd39e790b67f5b5e75adf9653a
SHA51213345c31fad932e384771a49125f3be3bd39c5726413d2057e9e26c03fbe2b72b047b8959d99922f3cace82e111dc88218892f4d602f1a43d794c024bb610525
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build2.exeFilesize
52KB
MD5badb81e9da1b8f2c988f090a945fc044
SHA18b579a6ad1808a15d00dbdef5520339e39489938
SHA256baf5855f6ab86266ef530bc227c705af5a2e9cad79f59a4b430032acefd1436e
SHA51201ed6e61d9e87cd05c3efad53f4700ef218b7073c0dd4f52f96d66afae675a39575736ab62d2655d1ca0335180e7cc882e64fdb562b1c6f2a4aa47be23b6313d
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exeFilesize
36KB
MD5eac31b7fb2a7f68ee4ef9c5f7bce851b
SHA1fbbf6c499d7403209cc357c8a99946d9ceded638
SHA256f076d4350f28cb3f4b3aee30542a9d44851a371e566231ff8709f2adfd764ce8
SHA5122bc50c663854eabb59e8da7d2e4ef790016c22cf32f5f0e3d03c917dc9a3e7638f5beab7c3be374e6acb721d10281e33c49e6ced0aba4bbace7003dc04c655f6
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exeFilesize
135KB
MD5af9918b1d2c8c93e8b82d934fa02c758
SHA18b340a463ac99068c4ce8788594b77aba71b90df
SHA2563fffa28203247525431bed058871a64a1142f09a67deca9f013b0104d8a95fb9
SHA5123aa1ced1333431a9bfb95a11602042bce80cb68492e09a35548cc2050bc8b2b418fe456c9f15ef6fdcde18d8f639b8ff9ca2076fcb5d16a8ab38db35bc6135da
-
C:\Users\Admin\AppData\Local\fab6ac9f-8624-428c-a31a-1e1ec91e7801\build3.exeFilesize
93KB
MD5206cd8fe132eba4b614d09b1b9226291
SHA1bf934cabb65c617b0d65771cac34e042472aaceb
SHA256371bf0b8e826957e2b9652d2e08dd2e7263e16cb3e30d21c984fe44180e53e75
SHA512d9f4b65ef8c4772cfa0b3928490dddb1920974a06713f64fb572ca20c0f89cdf4849b271037e9ce771a8b71b330a9fa50c77e57f265a03971a1ea82fe4dbc904
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
111KB
MD5b25fe1b4f22bbf0b26042786e57dc2b3
SHA179bf3559e2dde43cc290e2651172c95c35e2c53e
SHA2562dbf0005ca6749e1508fdabc49753e0367f9600f4b3ae2116b178a0a48157e71
SHA51204f6b4819c2919a53de39c8ce195cdeaa6fa529172cd9477ca9389ae515dae8b0e9f1e4a7493b5eb7cf766ced2eb542314db92e6a3fd07887ba78f6c69308644
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
61KB
MD58622dc449a7655f6c6dcbfbd97664d0a
SHA14c03cb0477a793034d850c2a82e8f1bb840ca890
SHA2567f1ac2a054a74c386fc6f735bb2d4d20107462e08f98069b55bda3ed6d114af3
SHA512af1f19f2f282cc77c8f325cadae21f32f75028a7bf862623e9fb2298bd25345713c6346d0f84eeaca8c9e89a03aecf8bfd241384f1c70d239734fcae41d3c7fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
277KB
MD594b1c520fbcec738b48cd10a595a2172
SHA1472913c66d404aa76e6f60980cbeccea7cf4e82e
SHA2565f7727d018c1c9d5f45e92987a6520593d85640dc912d0395bf439ad9b9e2603
SHA512a9a346c9d7a6ef0769d9e7d3b8f385a9fd3ff298ae99de52cd8f2116a5752dbe08621e436c6871f431895a4f6756c86ef84a15361d0bfeefd8ae5de28a0cdd25
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
238KB
MD576dd80a5769d46cc682cd5027fa811ad
SHA16057f5ad1df0dc8c9be6ccca18b240b6599b226f
SHA2566dbe0d4380b57148cb67f46a2e253a91346995ea4b71a30d33f83ce4958c2635
SHA512688f93bdd350a3c70c9250c01cbba7fd29f19f2524286bd2e531a51111247cd7bd786d19573176bd9a73d649ae87551e17a75d90af62c63725941929beb205b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
126KB
MD5c98a88e491972905d9a091fe5913bcd4
SHA19d5b645a6daecb9b59d02be54347a829c068ac35
SHA256ecfac8315a7890a1b7f4e9e3574068d05aa1ef27420c082481e2fc91a089e05f
SHA5124f1080168578ef601324a3c8c3ddeb7b10be5073677ede32487cada4c9e539d7f6f019301b394d5884d17e7419172e9f10079daeb8d47232d847304772b96451
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
179KB
MD5e6a8fd048666511c4566e8727e31f89f
SHA1acaa78154c9d019150a75d1a688d298066ff7da5
SHA256a290c7cb96f563ad6fdbed38c0c8a02309d694c76430da6d0a5b8e4b7ab835f2
SHA5121c5cbb9bbbe49b719361351db45c3d365fe7a4266c2ba001c9f3f4d75b2f02e2c2d839d2fe756096a0abc097bd08b98cc475954b282becdae3461c3ffb1ae765
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
254KB
MD57784aa074e2536da1e8d3514f9e8ec34
SHA174a5bd61bafc7fbdc4975c1e2afb8b964226e891
SHA25698ea5e893b105e6d0f5ded9c59b9535cbaf952b62ad941e6cfc250b050b3b369
SHA512b73696fc1f454c915eca4b81050f276b005c0020d9d952e37ac1e7de168c479983117069dd8ba157977977e9086b5c7f6e1979f00c3a4a6e2a95c66e52df92ca
-
memory/712-156-0x00000000008F0000-0x00000000009F0000-memory.dmpFilesize
1024KB
-
memory/756-53-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/756-51-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/756-47-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/756-86-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/832-20-0x0000000002CC0000-0x0000000002D59000-memory.dmpFilesize
612KB
-
memory/2392-132-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/2528-158-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/2596-1-0x0000000002D20000-0x0000000002DC2000-memory.dmpFilesize
648KB
-
memory/2596-2-0x0000000004880000-0x000000000499B000-memory.dmpFilesize
1.1MB
-
memory/2652-133-0x0000000000A80000-0x0000000000B80000-memory.dmpFilesize
1024KB
-
memory/3088-83-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3088-80-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3088-76-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3324-79-0x0000000000A79000-0x0000000000A8A000-memory.dmpFilesize
68KB
-
memory/3324-81-0x0000000000920000-0x0000000000924000-memory.dmpFilesize
16KB
-
memory/3632-183-0x0000000000A20000-0x0000000000B20000-memory.dmpFilesize
1024KB
-
memory/4020-106-0x0000000000A00000-0x0000000000B00000-memory.dmpFilesize
1024KB
-
memory/4528-4-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4528-5-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4528-6-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4528-3-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4528-17-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-37-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-72-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-22-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-41-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-36-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-24-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-23-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-34-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-29-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4612-30-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4640-52-0x00000000005B0000-0x00000000005E0000-memory.dmpFilesize
192KB
-
memory/4640-50-0x00000000004B0000-0x00000000005B0000-memory.dmpFilesize
1024KB