Analysis
-
max time kernel
298s -
max time network
293s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-02-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe
Resource
win10-20231220-en
General
-
Target
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe
-
Size
736KB
-
MD5
adb72c7dec5dd45c7f172f4d2d01e1ae
-
SHA1
9a375b6d4a413807e7775b87722b3f10ce1fe511
-
SHA256
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3
-
SHA512
e9da509a506028ee72cfb986bba23a158ee40f58f516b423b1cc7d20472299fc0791b7faf86ed13c94db7a98791a4bae63c783013793012dec43951783001c3c
-
SSDEEP
12288:k6B0LvP6A0BEE0/wPSZUh6p7N23h8ByUtgLtRGVA50z9btGdQCAP:kT7cgZUO7Y3WzgpchJGiCAP
Malware Config
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Signatures
-
Detect Vidar Stealer 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3752-52-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/3752-51-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/3696-50-0x0000000000610000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral2/memory/3752-46-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/3752-75-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/2932-95-0x00000000001F0000-0x00000000001F4000-memory.dmp family_vidar_v7 behavioral2/memory/4116-101-0x0000000000850000-0x0000000000950000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 16 IoCs
Processes:
resource yara_rule behavioral2/memory/224-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/224-6-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/224-4-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/224-3-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4544-2-0x0000000002180000-0x000000000229B000-memory.dmp family_djvu behavioral2/memory/224-17-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-21-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-23-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-30-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-36-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-37-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-34-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/720-72-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
build2.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 3696 build2.exe 3752 build2.exe 2932 build3.exe 600 build3.exe 4116 mstsca.exe 5044 mstsca.exe 3164 mstsca.exe 1896 mstsca.exe 4876 mstsca.exe 3744 mstsca.exe 4264 mstsca.exe 3232 mstsca.exe 2812 mstsca.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\9bf7e3e7-2191-4410-afd0-6cd2defe596b\\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe\" --AutoStart" 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 api.2ip.ua 2 api.2ip.ua 10 api.2ip.ua -
Suspicious use of SetThreadContext 8 IoCs
Processes:
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 4544 set thread context of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 set thread context of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 3696 set thread context of 3752 3696 build2.exe build2.exe PID 2932 set thread context of 600 2932 build3.exe build3.exe PID 4116 set thread context of 5044 4116 mstsca.exe mstsca.exe PID 3164 set thread context of 1896 3164 mstsca.exe mstsca.exe PID 4876 set thread context of 3744 4876 mstsca.exe mstsca.exe PID 4264 set thread context of 3232 4264 mstsca.exe mstsca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2008 3752 WerFault.exe build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4808 schtasks.exe 364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exepid process 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exedescription pid process target process PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4544 wrote to memory of 224 4544 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 224 wrote to memory of 3532 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe icacls.exe PID 224 wrote to memory of 3532 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe icacls.exe PID 224 wrote to memory of 3532 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe icacls.exe PID 224 wrote to memory of 4640 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 224 wrote to memory of 4640 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 224 wrote to memory of 4640 224 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 4640 wrote to memory of 720 4640 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe PID 720 wrote to memory of 3696 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe build2.exe PID 720 wrote to memory of 3696 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe build2.exe PID 720 wrote to memory of 3696 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 3696 wrote to memory of 3752 3696 build2.exe build2.exe PID 720 wrote to memory of 2932 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe build3.exe PID 720 wrote to memory of 2932 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe build3.exe PID 720 wrote to memory of 2932 720 81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 2932 wrote to memory of 600 2932 build3.exe build3.exe PID 600 wrote to memory of 4808 600 build3.exe schtasks.exe PID 600 wrote to memory of 4808 600 build3.exe schtasks.exe PID 600 wrote to memory of 4808 600 build3.exe schtasks.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 4116 wrote to memory of 5044 4116 mstsca.exe mstsca.exe PID 5044 wrote to memory of 364 5044 mstsca.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe"C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe"C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\9bf7e3e7-2191-4410-afd0-6cd2defe596b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe"C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe"C:\Users\Admin\AppData\Local\Temp\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exe"C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exe"C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exe"C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exe"C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 20082⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD53769f53ac22cdf6658c874805d9983a5
SHA153ba470f9cd12bbfde1d1149bcad0029e0f8a84f
SHA25687ec66df2ed0afbd05a6094ba5ad5bc5b3ef6807828d00323b1addb6addd1c17
SHA51256ce76ea6aeaaafac14128912b31e12a16a2ca85b97ece7f3034bea5ca3b249c0cfe974b2823f35d38c46d6b3faa7278732b183a86c85f469c422384f08f2925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5efbfc384914e633152a8c98d98193367
SHA16329dcc0cb0ca76d7b95f30083299ac4855f46b5
SHA256ec273b47eaa5bae72a2bf8c1e3489a1cb41d1cb1d8dccf0126c7bbe72ade4d0a
SHA512f88c8c8254a1ae10b86e49324bdd497502b5c15e10717bf4232f096e4a08262d94dd549ac6e28fecdad6ca8ec3e1f96d206c545a801792d8f409ea2d0afae2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD5de45133b27823569dc931ccc918de287
SHA1ab7491b5878a65017562c41aac87267c498cd587
SHA256e4adf8cf08a4f3b84cf3e10e46bca727a8c9cca3567469f6daaea5713c9cd417
SHA5121e6b56f99b7fed6ceca5ef8a19bee52d08de0916f47053d318b543f788ae40319d31c3b1e8136735421af94ad16865faed542debc668ec8bb34ad874171a6b44
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exeFilesize
49KB
MD50463dc021c37fa4b908d5ceb064f4004
SHA1bd8ffc42676a23351feecf215a262736db0a8a49
SHA2561eb07793b9432696d48f7fbf9e7cd6737576bf3b2a1b65e56b3d2b6f8503d74a
SHA512034ffb5b09414164160818fb14db3ae8e5e569cdfa4ce21f4ab9a0bfc6d3ade4f72f06703fd81bdd2552166d9bd6442b5c1684bc0deb53dc09c5969d5f8ff2d8
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exeFilesize
132KB
MD5c17f2146b4edb69928a0a6088ea0d38c
SHA163092204dee65dcc3562a1f7990b1fcc173f8905
SHA2564313bbe7bc8860eb1209a0d7f3bfe78685571fdff2c9255502f0fa6fc7bdb6d0
SHA51203fc8e3bddf056b2b088e653e3bde982645622b77d6708342df44b9bea9f2af19606fa379e7f953a3ee2baf9dd8a97f39ba80947ec811a14879bbf4b3d3b3530
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build2.exeFilesize
78KB
MD5be170e2b8f1ad445ab51e7e517b76e10
SHA112d7af5bdaa52bfef9070a924885e5fd5e8ccfb5
SHA256f9df58d6213732bfaa18c0029e90d5451185dec5767cf24df8f6e74f38897741
SHA512cec0f34cd68eab1714a0fd02838847b1f8c1ede5877ab75a80936e117e0b01a11f481a9db51cc27e38371a39eefb1c45a0fc5d72867d2a24860d6bd600bf6234
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exeFilesize
168KB
MD5f9f9082246a8e32f2b179336219d3a63
SHA1b2c6e58c062ecbdfa84959ed7e03ffaade287233
SHA2564e11be5e0b3369da092bd39f8056c12af589704f913daa96c3c81618c238b229
SHA512dbc0120a6a00cb679c93cedc3cb777ea27a0d2199eb1fbc1ca1f9bb7fe9c7bca1f26673f7a369ec984f79f0d28e70c80d29fd623b04ff6227a8a78ccee9e926a
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exeFilesize
101KB
MD536fd196973584cbdb10a302542d8ff4e
SHA140b81ff87cc256ca6eb3a505174221cdc83e8e10
SHA2561a695118202275c74689bcfe42e930ad69dffd537c565b3d37743f251497267a
SHA5129e4058d5d0d3cf560bc4e153a03022bb13c619e9790cdfe1cb9d5fac056f8fbb8d282de7b5fdc0617855e5ed49d03b010f532e3e32efcc0ca7ea55afda605278
-
C:\Users\Admin\AppData\Local\79c37ff8-035a-4e61-a538-37e98a8d31ed\build3.exeFilesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
C:\Users\Admin\AppData\Local\9bf7e3e7-2191-4410-afd0-6cd2defe596b\81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3.exeFilesize
202KB
MD5a3155b3a2aea1023ac3a914f17dd71c8
SHA19e7971b3589d454767da1d3fd1604b81bed54692
SHA256dfb043fc260dea49c596e2982c21019e22cc2804e32b98cba62d0bd05f36d6b3
SHA51243e83ffe498ea8a17b835301ba0bde81eafb015c0a36e4e7f139f7b4326050309a433788c49a536e25f277153c72a87ed435d1d1a48b1c2d4b51bb7ef2bd1e1c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
187KB
MD5d647fcbc88c9673e3a7f745662ff783c
SHA13a06d6716ca9430558c3295607378ec0310f2e7e
SHA2561a94246b911d97378be811d066891f6cc8323c96dc69d009c656e09702b401ee
SHA5125c79f860daf95b2e1cac5d5bf809a0fef377383fb3d9c11f5906b177c4588ef81c4b2b95e82e141f9c4ec38de289bdd87c497a460c9795f13e3d9210ad74b30d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
57KB
MD574ae9689cb04bde426e036319feeb49b
SHA1b932fd3571f6113cacf1e5eb2b3453a05887963c
SHA256b59f5c8dc70d0092f4257c3e13745f67e6324edeee709eff32336d3c93bca180
SHA512642d69ab7ef11418b9d97cfa8882ba38ba5c08fcec428a8a758b9de8ee1d576b4d1fe1a2ca93dc4f1f5e6a8eba8c21f7309975c0c43033350d51e5efe7fcafca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
77KB
MD5cfb441921b2dadfed89a713e8782ebb1
SHA11af9a779a43efc6ca928611ee0363a0e0ec1cead
SHA256969b0c26c660b6afebd4c129eb2c0c315794329a153e53c6862974600ca26c73
SHA512dcd4d2bae4cb6475463739231fbbd304f42b7d8680f258ed7f70f0c4e9e6aa88cf333f56edf268e6c3c3368fd32e9769918a8752a3668779b3ee79fa9269eaac
-
memory/224-5-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/224-17-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/224-3-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/224-4-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/224-6-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/600-83-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/600-87-0x0000000000410000-0x00000000004D5000-memory.dmpFilesize
788KB
-
memory/600-79-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/600-86-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/720-36-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-21-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-23-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-24-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-29-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-53-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-72-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-30-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-34-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/720-37-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1896-130-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/2812-212-0x0000000000ADE000-0x0000000000AEE000-memory.dmpFilesize
64KB
-
memory/2932-82-0x0000000000919000-0x000000000092A000-memory.dmpFilesize
68KB
-
memory/2932-95-0x00000000001F0000-0x00000000001F4000-memory.dmpFilesize
16KB
-
memory/2932-84-0x00000000001F0000-0x00000000001F4000-memory.dmpFilesize
16KB
-
memory/3164-141-0x0000000000820000-0x0000000000920000-memory.dmpFilesize
1024KB
-
memory/3164-133-0x0000000000820000-0x0000000000920000-memory.dmpFilesize
1024KB
-
memory/3696-49-0x0000000000510000-0x0000000000610000-memory.dmpFilesize
1024KB
-
memory/3696-50-0x0000000000610000-0x0000000000640000-memory.dmpFilesize
192KB
-
memory/3744-160-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3752-75-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3752-46-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3752-51-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3752-52-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/4116-101-0x0000000000850000-0x0000000000950000-memory.dmpFilesize
1024KB
-
memory/4264-184-0x0000000000A50000-0x0000000000B50000-memory.dmpFilesize
1024KB
-
memory/4544-1-0x00000000020D0000-0x0000000002169000-memory.dmpFilesize
612KB
-
memory/4544-2-0x0000000002180000-0x000000000229B000-memory.dmpFilesize
1.1MB
-
memory/4640-22-0x0000000002050000-0x00000000020E2000-memory.dmpFilesize
584KB
-
memory/4876-159-0x0000000000890000-0x0000000000990000-memory.dmpFilesize
1024KB