Analysis
-
max time kernel
300s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-02-2024 04:55
Static task
static1
Behavioral task
behavioral1
Sample
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe
Resource
win10-20231220-en
General
-
Target
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe
-
Size
729KB
-
MD5
3f51b9adc83302f0a3a63a9ce89b5a25
-
SHA1
934d5c5b4e3c86c9ae3e7df7150cbdee9d24c113
-
SHA256
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4
-
SHA512
d7f5d7a15bb6df80234c818e8e92c310643f3493030ac6cf02f7c8865e97125ed530c0a9819b22aec0311b34d329239f33cd4563238d198e6a43b1ca5a90efc4
-
SSDEEP
12288:Yd+RYmXPSXL6YOcrS0sKN+mR7Z1JFVFaM1Nolw6OWqY:YcXX6LOcrSwNXR7TOMXcOWH
Malware Config
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Signatures
-
Detect Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral1/memory/864-77-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/864-82-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/864-83-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2956-80-0x0000000000240000-0x0000000000270000-memory.dmp family_vidar_v7 behavioral1/memory/864-233-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 13 IoCs
Processes:
resource yara_rule behavioral1/memory/1316-4-0x00000000004D0000-0x00000000005EB000-memory.dmp family_djvu behavioral1/memory/2580-8-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2580-7-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2580-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2580-26-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-34-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-48-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-49-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-56-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-55-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-57-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2300-253-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
build2.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 2956 build2.exe 864 build2.exe 2680 build3.exe 2992 build3.exe 1348 mstsca.exe 2204 mstsca.exe 1708 mstsca.exe 1632 mstsca.exe 2708 mstsca.exe 2664 mstsca.exe -
Loads dropped DLL 11 IoCs
Processes:
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exeWerFault.exepid process 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\be2b4102-5765-4db7-8fb8-b08c113d98eb\\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe\" --AutoStart" 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.2ip.ua 4 api.2ip.ua 9 api.2ip.ua -
Suspicious use of SetThreadContext 7 IoCs
Processes:
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 1316 set thread context of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 set thread context of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2956 set thread context of 864 2956 build2.exe build2.exe PID 2680 set thread context of 2992 2680 build3.exe build3.exe PID 1348 set thread context of 2204 1348 mstsca.exe mstsca.exe PID 1708 set thread context of 1632 1708 mstsca.exe mstsca.exe PID 2708 set thread context of 2664 2708 mstsca.exe mstsca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1772 864 WerFault.exe build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2944 schtasks.exe 2700 schtasks.exe -
Processes:
build2.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exepid process 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exebuild2.exebuild2.exebuild3.exebuild3.exedescription pid process target process PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 1316 wrote to memory of 2580 1316 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2580 wrote to memory of 2736 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe icacls.exe PID 2580 wrote to memory of 2736 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe icacls.exe PID 2580 wrote to memory of 2736 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe icacls.exe PID 2580 wrote to memory of 2736 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe icacls.exe PID 2580 wrote to memory of 2640 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2580 wrote to memory of 2640 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2580 wrote to memory of 2640 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2580 wrote to memory of 2640 2580 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2640 wrote to memory of 2300 2640 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe PID 2300 wrote to memory of 2956 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build2.exe PID 2300 wrote to memory of 2956 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build2.exe PID 2300 wrote to memory of 2956 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build2.exe PID 2300 wrote to memory of 2956 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 2956 wrote to memory of 864 2956 build2.exe build2.exe PID 864 wrote to memory of 1772 864 build2.exe WerFault.exe PID 864 wrote to memory of 1772 864 build2.exe WerFault.exe PID 864 wrote to memory of 1772 864 build2.exe WerFault.exe PID 864 wrote to memory of 1772 864 build2.exe WerFault.exe PID 2300 wrote to memory of 2680 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build3.exe PID 2300 wrote to memory of 2680 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build3.exe PID 2300 wrote to memory of 2680 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build3.exe PID 2300 wrote to memory of 2680 2300 7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2680 wrote to memory of 2992 2680 build3.exe build3.exe PID 2992 wrote to memory of 2944 2992 build3.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe"C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe"C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\be2b4102-5765-4db7-8fb8-b08c113d98eb" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe"C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe"C:\Users\Admin\AppData\Local\Temp\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build2.exe"C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build2.exe"C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build2.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 14687⤵
- Loads dropped DLL
- Program crash
PID:1772
-
-
-
-
C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build3.exe"C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build3.exe"C:\Users\Admin\AppData\Local\e046b004-9d9b-4fa8-9499-81be6b31cd13\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:2944
-
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {427BC519-4EFE-4F74-9704-71942F59FE20} S-1-5-21-1268429524-3929314613-1992311491-1000:XBTLDBHN\Admin:Interactive:[1]1⤵PID:2968
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1348 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:2700
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1708 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:1632
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2708 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c59708a86e78530488f2356251e775a2
SHA117e33e077261cdd9e54d4e58dfb168f15ee93efb
SHA25671719971666e64a4f767e8f9d0b52e822189c4bfb1fe449a0e7c8066c82813c2
SHA51242afd4d2c791ea8cb239130cf4f4d43da0ec39c63049c56796e082282e2ba2f0cd0fd8934b7de3b359ca433b0609ad159fda6f92168168f2d4517f13fbbb3fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ad0fafd895aaf0efc25bd40e830ca022
SHA1d3ffe467b40adc737868e31ca3e43f1878d58706
SHA256fd7458877448f89ee56be460758b429110de7ef19a48123c147461e6b4573f6d
SHA512211b1d516042af5370516aac826fea4c03cd1559fd2ae74b54cb9663a37d7d7643f799b305f208326ca8846f8e5337ea3358059ef71d1d4894589dc1f9ff3c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5892a0e6eace07ab757ba47e668b31
SHA1a5a0498aa2421899a7bbabe8f14df2f1fb932a62
SHA256ba6261756b5fa620fb09b5d03726aa457fc8cc44d550be6be91c82a922781da7
SHA5125cd63f1ccfb8c52d52454683a5d297d1ead16283a4946bb1eafa2d9498fc942dc3b9d5e13b0ca0495a206e919c4209f00e7ec58560bb909cb5393b8de9fbcdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2f110d09e5b9016cf85d6b7468e70b6
SHA1e05da7e34480018ce98c3a64500379df3c32d2a1
SHA25644969306180fac17b6a6894878a479de3779f7fa48c3c56668e4ea4457fbccd5
SHA51247fb3f655dcb90974892c937dd7a1cd30734059b7f246725872a63cacc21d68bd8b423546602af6fae38ba0a30ed303b90637008a05e5a758281f0d86d6be814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD515dfbf47c1ec67aee1e44e5019f36934
SHA1f4638c26f42cab0c5103810b411827b4d52d3b72
SHA2566953b2a61f12b32147ca61ad62699ece5bf331ffd3d3418fd3a6cc12f3693798
SHA512eea158417f618a165f02953f1b92ceb469ba900ec5190a06ad2a73cbfb609eaf600d46001d87a3714d85709e2f8d5cd2dbad28b76956e2c22d38fae013e8c231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55c11d19ecce0b6ddc6a677d0e685f6fe
SHA10fc58c97435d5000f9c77c0747c5e25e111ad090
SHA2568b38d954dce58dc9918bb3baee092a29462424754e84d09ff7b67215ab9b62fd
SHA512207837423baff17ece5ad9ff97ff3586820f447c0685a4a007e7f69d13596a7af2f258899ee1ef15910276df93b73466d618bf137688f3134774cedc5e6e063f
-
Filesize
1KB
MD51f1a3b101012e27df35286ed1cf74aa6
SHA146f36d1c9715589e45558bd53b721e8f7f52a888
SHA2567f0b1fe38c7502bea9c056e7a462ab9f507dd9124f84b1d4666fb7d37cf1b83c
SHA512d6f6787de85049d884bf8906292b0df134287cc548f9f3fadd60d44545652d55c296ed50e72687f776f0bf6b131102b4bf9b33143998cb897f21427fbc8306a3
-
Filesize
92KB
MD571e4ce8b3a1b89f335a6936bbdafce4c
SHA16e0d450eb5f316a9924b3e58445b26bfb727001e
SHA256a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5
SHA512b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7
-
C:\Users\Admin\AppData\Local\be2b4102-5765-4db7-8fb8-b08c113d98eb\7c7654e6f0c8b70f2317787fe7b17ba8f42349786243b8438596d89404f968e4.exe
Filesize32KB
MD515e04ff3bfa51394e94c9f3fe6843e2c
SHA145960864ab94bf5fc58b7a4324e21dc41402b926
SHA2565bcdc2c820ace347cf738791bf3d7fef9591b62bbe204d3aa0a4e7bf538c8ec1
SHA5128deadce5b0621dda5a1e0c448f34bb0cf35cfaddd37321cb6f0e20031fd1a6d8d95c20f3f58bd737205c3925ce228f27e825ffd6531b6d76a4bbbf8e7d0eec23
-
Filesize
1KB
MD54b49c6fe09c9c2d4b59bd6cfbeacb12c
SHA134592ba710ba16b6df0cda4dc8cfd6db93600062
SHA256284c248d8da39b056cd78802f016eeecd4d0f55c272de796f9fc3744d3db67bf
SHA5124a31d9edca2c3c4b21113489627930a2bc444c68a507c08b72ae15f41d23d555b75b4bfe84ab81dd3891735057c0f6eda89143ba49b8940f0a0c7b9e6501d5b3
-
Filesize
45KB
MD5dcceebec97dd6ae117945f23eab2470f
SHA1e855d3a02f307e47d6e161f034750d818eb4aa5b
SHA2561c5eb663482dff546241439bb61b4a182aae235801b72d58f4a8becc28224fb6
SHA51293d2481665c6e17853bd51f2136f770062d8037886de8390f0fba32f963cc3dc4879afbd3c96345c9ab60f866a9220e624c7a7b4a4ac66648e6bab86f3b5571e
-
Filesize
111KB
MD58b7d26ac2903f22dff32fad35316751f
SHA1854d926e68f86dcd511932cab2669d3caa636f5d
SHA25689834a835463bcdfbd732c1369c4918e7631ba3897126a97455ff854fe90340a
SHA512908bcb98c7123707e67267b86ec52448b6f7111774d434d788da0432363a6b41fb3312062bca5a71d693f48cd074b72f7189b588c6305749e6f67e9832bf4cd5
-
Filesize
6KB
MD53b4f247a45d63b072477330e8d017f64
SHA1e0de02b2741312a453388ac191e5aaafb826f466
SHA2564af69bdece4d156b0775a441b7e31b843671ad0e1497572421caa248bd45a969
SHA5129823c5f4c6669e3fe7c2149b8d8b7477df43822f4613f61a6b91f2de18eba9e6783861c519214d5fd619d021cddae2b91bbeced21e94361ff615b0f37b221c0b
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
185KB
MD5172642f72806343d6ec77e414f8395fc
SHA1cad84b443c4fcfde79d130c3cc1166216ab05f70
SHA2567452d43b49629c2c903f303644d88f90bf72dc07a75880e0be9dbc7c23e6773f
SHA51296a2fe5f82e78fc3a0619f9d3ed5ad2c685e9a0e1ebc64ed5bc229fae83cf5f124eb690b49d61c47c98fa666efde50a9fbe3d47392fe42a4ca0c6f53dda15f1f
-
Filesize
42KB
MD5ebb5f6046a0affb9b43a58465c347376
SHA1c76dc91a8dae53a4bfbd41fb7dd863a37880117f
SHA256892d93eb7c3962ef6af3b3111cebcc80f0fb97f0548e24dfd42b4138661c1e98
SHA51287913eb4c4e6ea3a47b17eb79f885804d9ba7475c215858efa484d0af73e1ba31607b80084911ac03b2150d4fc06370ff4dc50429b085447f4492b5de318bd8a
-
Filesize
161KB
MD5c429fd1332910a1bfa07176eb7a333af
SHA1baa68530d967ae5c45569cedda87e94f4af38d50
SHA2568492341e4e0a7e8c05756dfbdd86d64ebbec93791ad4283d906cd867cd278713
SHA512aca84851f856790726e00ce4ac397fd89729b76109b532164fbb3b457ca556a183ba2023d50ed23c58c1563960c7b27c5545763efe20919032fc7174446a616f
-
Filesize
45KB
MD5b44497fdf97fefa1559011f843ac784d
SHA1c7489899d0c9eaaa7509cabb4ae06a899b55b749
SHA25646bfd9274fe174f42db988489ff0f730adeb20f1e065a3a9f9ca43d27770a5e8
SHA512e685aa1485984e7b564adfd0c9acbbac43d697f3427983e1942891c8395752c7c0f5cc26e6d49c753daec7bb6e1a0a13599b57be586ed2fbeb0aa9f0a0cfcd11
-
Filesize
135KB
MD5dca51914f6481c4d8d26546bf3cb65f4
SHA18ad4584ffef6072636ebd95c92e9b05808cb2cdf
SHA256af31f1999560fd36f92e1c54decf5705adcae1d8e8df5442ff2548535e516142
SHA51286ccb3d6aaf146b93c3ea192e758c0e9b0569e51766bec10f64be9ea958564cebc9f2533053a8557919f3819db33fe34c9d3f7e44b9312c35806a4a5e929f845
-
Filesize
199KB
MD52b97721b98c2d4f7e13df6871c710024
SHA122896ea5b3fda0b6db0014bb591f605075891db2
SHA2563d39bfecd287abb784647f8b7ddd5134230a3cf0dfcc60b25d7d8a445eedb056
SHA512c31054d6a0935b912a547f177f902656144d4337f1cd6fb66aa11eb573d2f9ae41a5989ff172ea4d0921c8d5a4dd1bc2748deaafc60cb19303d377b42ec84d0c
-
Filesize
20KB
MD5a9803d806d88c1f340be12184c37fb10
SHA1b031612f7e5557629cbb6bbdd46f803e71588214
SHA2565e38ad87088d085787a42569b65c48f6c51a108b1e1fb18be4598ae391ae35c3
SHA5123754a245853deecf540833e8cb315f6bfe7315f7a84d3959eca77f48b7ffea3cab15dd99103e7eb1b58409778d570c28ae40832c2831bc7a547299e63cce1275
-
Filesize
46KB
MD5806a48f32a4bf4c2de808ad09b4eb344
SHA1ef540cf97742f805e540fd864cc12ecc5b0ea2a8
SHA256247acf1e060c8335ca6a1497d1161218bcfaaac199438377851b68ae1a8bdb0d
SHA512a2f128d7220c37c19dd0be874eeb22877739c320a95310c49c35ee249641c27c5703d7097f933c067f292e73e793159bbb873cae01c4c27951ed0f26a4b05cab
-
Filesize
20KB
MD50e9479f18f9116f92c8b9e44eb57827a
SHA18f4fbbb10d1aaa47125259c08a12e4d1ec66d829
SHA25681b63db510e7e894a022fe9f9bef84c7d40d145ec64bc15be19183b0014cc728
SHA512065215cb6d0d4f4f0089a0ca4de5efe61998d2d87b000d9c1a77278431c46a74bc37bc8641995351b8dcf55995e699efe719cf6fee5c4fcb8173077409f52427
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e