Malware Analysis Report

2025-08-05 15:31

Sample ID 240203-rhey6sbcc9
Target 8c875d52a2ae6452ffe4d3437c916346
SHA256 3c876e9284562cf9374ba6384a2073aa1043c6dd2be0b0fb9d1075ebb9a84e6c
Tags
persistence njrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3c876e9284562cf9374ba6384a2073aa1043c6dd2be0b0fb9d1075ebb9a84e6c

Threat Level: Known bad

The file 8c875d52a2ae6452ffe4d3437c916346 was found to be: Known bad.

Malicious Activity Summary

persistence njrat

Njrat family

Adds Run key to start application

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-03 14:11

Signatures

Njrat family

njrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-03 14:11

Reported

2024-02-03 14:14

Platform

win10v2004-20231215-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe"

Signatures

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\8c875d52a2ae6452ffe4d3437c916346.exe\" .." C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\audiodg.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\8c875d52a2ae6452ffe4d3437c916346.exe\" .." C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3232 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 1380 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 1380 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 1380 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 4896 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 4896 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 3232 wrote to memory of 4896 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3928 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3928 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3928 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 1096 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 1096 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 1096 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3584 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3584 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3584 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3208 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3208 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2300 wrote to memory of 3208 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 4696 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 4696 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 4696 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 1272 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 1272 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1336 wrote to memory of 1272 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

"C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYANP /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 5

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYAN /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 1

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYANP /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 5

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYAN /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 1

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYANP /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 5

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYAN /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 1

Network

Country Destination Domain Proto
US 8.8.8.8:53 178.223.142.52.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 testandoo.hopto.org udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 testandoo.hopto.org udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 testandoo.hopto.org udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 5.173.189.20.in-addr.arpa udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp

Files

memory/3232-0-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/3232-1-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/3232-2-0x0000000001020000-0x0000000001030000-memory.dmp

memory/3232-3-0x0000000001020000-0x0000000001030000-memory.dmp

memory/3232-4-0x0000000001020000-0x0000000001030000-memory.dmp

memory/3232-5-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/3232-6-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/3232-7-0x0000000001020000-0x0000000001030000-memory.dmp

memory/3232-8-0x0000000001020000-0x0000000001030000-memory.dmp

memory/3232-9-0x0000000001020000-0x0000000001030000-memory.dmp

memory/2300-10-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/2300-11-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/2300-12-0x0000000001030000-0x0000000001040000-memory.dmp

memory/2300-14-0x0000000074FE0000-0x0000000075591000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\8c875d52a2ae6452ffe4d3437c916346.exe.log

MD5 40b0c3caa1b14a4c83e8475c46bf2016
SHA1 af9575cda4d842f028d18b17063796a894ecd9d0
SHA256 70e88a428d92b6ab5905dac9f324824c4c6f120bc3f385c82b2d12f707a4a867
SHA512 916437df737de4b6063b7116b4d148229d4a975eb4046122d47434b81fba06e88e09e5f273ec496c81ef3feecb843ccad20a7a04074224416c1fa9951acbdac7

memory/1336-16-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/1336-17-0x00000000010A0000-0x00000000010B0000-memory.dmp

memory/1336-18-0x0000000074FE0000-0x0000000075591000-memory.dmp

memory/1336-19-0x00000000010A0000-0x00000000010B0000-memory.dmp

memory/1336-20-0x00000000010A0000-0x00000000010B0000-memory.dmp

memory/1336-21-0x0000000074FE0000-0x0000000075591000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-03 14:11

Reported

2024-02-03 14:13

Platform

win7-20231215-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe"

Signatures

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\audiodg.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\8c875d52a2ae6452ffe4d3437c916346.exe\" .." C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\8c875d52a2ae6452ffe4d3437c916346.exe\" .." C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1732 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 1732 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2728 wrote to memory of 2704 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2728 wrote to memory of 2704 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2728 wrote to memory of 2704 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2728 wrote to memory of 2704 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2704 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2264 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2264 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2264 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2704 wrote to memory of 2264 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 2728 wrote to memory of 796 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2728 wrote to memory of 796 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2728 wrote to memory of 796 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 2728 wrote to memory of 796 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe
PID 796 wrote to memory of 1492 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1492 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1492 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1492 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 1284 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe
PID 796 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

"C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYANP /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 5

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYAN /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 1

C:\Windows\system32\taskeng.exe

taskeng.exe {424C449D-76CC-4F68-868F-5B212D51EAA0} S-1-5-21-1603059206-2004189698-4139800220-1000:AILVMYUM\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYANP /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 5

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYAN /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 1

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYANP /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 5

C:\Windows\SysWOW64\schtasks.exe

schtasks /Delete /tn NYAN /F

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\8c875d52a2ae6452ffe4d3437c916346.exe" /sc minute /mo 1

Network

Country Destination Domain Proto
US 8.8.8.8:53 testandoo.hopto.org udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 testandoo.hopto.org udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
US 8.8.8.8:53 testandoo.hopto.org udp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp
BR 186.225.144.196:5552 testandoo.hopto.org tcp

Files

memory/1732-0-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/1732-1-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/1732-2-0x00000000002F0000-0x0000000000330000-memory.dmp

memory/1732-3-0x00000000002F0000-0x0000000000330000-memory.dmp

memory/1732-4-0x00000000002F0000-0x0000000000330000-memory.dmp

memory/1732-5-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/1732-6-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/1732-7-0x00000000002F0000-0x0000000000330000-memory.dmp

memory/1732-8-0x00000000002F0000-0x0000000000330000-memory.dmp

memory/1732-9-0x00000000002F0000-0x0000000000330000-memory.dmp

memory/2704-10-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/2704-11-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/2704-12-0x00000000005E0000-0x0000000000620000-memory.dmp

memory/2704-13-0x00000000005E0000-0x0000000000620000-memory.dmp

memory/2704-15-0x00000000005E0000-0x0000000000620000-memory.dmp

memory/2704-14-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/796-16-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/796-17-0x0000000000BE0000-0x0000000000C20000-memory.dmp

memory/796-18-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/796-19-0x0000000000BE0000-0x0000000000C20000-memory.dmp

memory/796-20-0x0000000000BE0000-0x0000000000C20000-memory.dmp

memory/796-21-0x00000000747E0000-0x0000000074D8B000-memory.dmp

memory/796-22-0x0000000000BE0000-0x0000000000C20000-memory.dmp