Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe
Resource
win10v2004-20231222-en
General
-
Target
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe
-
Size
286KB
-
MD5
b711abfd1d3f342fd53e7234672e23a3
-
SHA1
abba6fdf4ce45cfc9121bc8f93658b0875ba1f4f
-
SHA256
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c
-
SHA512
f3d3e2e2bad6975e45c9b90568604085c92b7016ee7c56504593d1fea695b3be5c05991515c7ebe9442cc315084a75f59d19630e108806f78f912521efa5e242
-
SSDEEP
3072:Wz6T6oy729nhffLbCWeia4bU3qrf9tExSD2w3TA4xFgIzSUxaIa2Vd:3T6o28XC7AU3gvEx/6TA4LiUxaIh
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.lkhy
-
offline_id
OxV6DGl22io8sqMOW1zCCOlzPiv4f1Vqzw7Y8zt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-uNdL2KHHdy Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0851ASdw
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
5.42.65.38:46185
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
Signatures
-
Detected Djvu ransomware 10 IoCs
Processes:
resource yara_rule behavioral2/memory/2432-23-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2432-25-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1904-27-0x00000000049D0000-0x0000000004AEB000-memory.dmp family_djvu behavioral2/memory/2432-28-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2432-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2432-43-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1256-49-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1256-50-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1256-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1904-79-0x00000000049D0000-0x0000000004AEB000-memory.dmp family_djvu -
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4584-165-0x0000000001170000-0x000000000117D000-memory.dmp family_lgoogloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4372-62-0x0000000000B00000-0x0000000000B54000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
E3B.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" E3B.exe -
Processes:
E3B.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths E3B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\E3B.exe = "0" E3B.exe -
Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF 1 IoCs
Processes:
resource yara_rule behavioral2/memory/876-155-0x0000000009830000-0x000000000994A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4584-165-0x0000000001170000-0x000000000117D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
Processes:
resource yara_rule behavioral2/memory/876-155-0x0000000009830000-0x000000000994A000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
Processes:
resource yara_rule behavioral2/memory/876-155-0x0000000009830000-0x000000000994A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM -
Detects executables packed with Themida 14 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\filename.exe INDICATOR_EXE_Packed_Themida C:\Users\Admin\AppData\Local\Temp\filename.exe INDICATOR_EXE_Packed_Themida C:\Users\Admin\AppData\Local\Temp\filename.exe INDICATOR_EXE_Packed_Themida behavioral2/memory/3428-221-0x00007FF667390000-0x00007FF6680E3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3428-225-0x00007FF667390000-0x00007FF6680E3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3428-227-0x00007FF667390000-0x00007FF6680E3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3428-243-0x00007FF667390000-0x00007FF6680E3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3428-263-0x00007FF667390000-0x00007FF6680E3000-memory.dmp INDICATOR_EXE_Packed_Themida C:\ProgramData\Google\Chrome\updater.exe INDICATOR_EXE_Packed_Themida C:\ProgramData\Google\Chrome\updater.exe INDICATOR_EXE_Packed_Themida behavioral2/memory/3956-269-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3956-270-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3956-271-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/3956-321-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp INDICATOR_EXE_Packed_Themida -
Detects executables packed with unregistered version of .NET Reactor 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4372-62-0x0000000000B00000-0x0000000000B54000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/memory/2412-102-0x0000000004B10000-0x0000000004B7C000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/memory/2412-104-0x00000000051F0000-0x000000000525A000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral2/memory/2412-106-0x0000000004B80000-0x0000000004B90000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor -
Detects executables potentially checking for WinJail sandbox window 2 IoCs
Processes:
resource yara_rule behavioral2/memory/876-155-0x0000000009830000-0x000000000994A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Anti_WinJail behavioral2/memory/876-155-0x0000000009830000-0x000000000994A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
996.exefilename.exeupdater.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 996.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ filename.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
UPX dump on OEP (original entry point) 9 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-319-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-320-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-322-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-324-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-325-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-326-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-328-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-329-0x0000000140000000-0x0000000140848000-memory.dmp UPX behavioral2/memory/3652-330-0x0000000140000000-0x0000000140848000-memory.dmp UPX -
XMRig Miner payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-325-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3652-326-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3652-328-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3652-329-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/3652-330-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 158 2808 rundll32.exe 159 2232 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
filename.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts filename.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
filename.exeupdater.exeexplorgu.exe996.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 996.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 996.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion filename.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
A9CE.exeE3B.exeRegAsm.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation A9CE.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation E3B.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation explorgu.exe -
Deletes itself 1 IoCs
Processes:
pid process 3420 -
Drops startup file 1 IoCs
Processes:
RegAsm.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe RegAsm.exe -
Executes dropped EXE 14 IoCs
Processes:
971F.exeA9CE.exeA9CE.exeA9CE.exeA9CE.exeBD95.exeEBAB.exeF9D6.exe996.exeE3B.exefilename.exeqemu-ga.exeupdater.exeexplorgu.exepid process 1924 971F.exe 1904 A9CE.exe 2432 A9CE.exe 1472 A9CE.exe 1256 A9CE.exe 2056 BD95.exe 3492 EBAB.exe 2412 F9D6.exe 2184 996.exe 876 E3B.exe 3428 filename.exe 4704 qemu-ga.exe 3956 updater.exe 3804 explorgu.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
996.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Wine 996.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Wine explorgu.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4656 rundll32.exe 2808 rundll32.exe 2232 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\filename.exe themida C:\Users\Admin\AppData\Local\Temp\filename.exe themida C:\Users\Admin\AppData\Local\Temp\filename.exe themida behavioral2/memory/3428-221-0x00007FF667390000-0x00007FF6680E3000-memory.dmp themida behavioral2/memory/3428-225-0x00007FF667390000-0x00007FF6680E3000-memory.dmp themida behavioral2/memory/3428-227-0x00007FF667390000-0x00007FF6680E3000-memory.dmp themida behavioral2/memory/3428-243-0x00007FF667390000-0x00007FF6680E3000-memory.dmp themida behavioral2/memory/3428-263-0x00007FF667390000-0x00007FF6680E3000-memory.dmp themida C:\ProgramData\Google\Chrome\updater.exe themida C:\ProgramData\Google\Chrome\updater.exe themida behavioral2/memory/3956-269-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp themida behavioral2/memory/3956-270-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp themida behavioral2/memory/3956-271-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp themida behavioral2/memory/3956-321-0x00007FF6A65A0000-0x00007FF6A72F3000-memory.dmp themida -
Processes:
resource yara_rule behavioral2/memory/3652-318-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-319-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-320-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-322-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-324-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-325-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-326-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-328-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-329-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/3652-330-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Processes:
E3B.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths E3B.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions E3B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\E3B.exe = "0" E3B.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
A9CE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\d8505720-1bf6-40ce-b0c3-5071a9d2bb7a\\A9CE.exe\" --AutoStart" A9CE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
updater.exeE3B.exefilename.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E3B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" E3B.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA filename.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 46 api.2ip.ua 45 api.2ip.ua -
Drops file in System32 directory 4 IoCs
Processes:
filename.exepowershell.exeupdater.exedescription ioc process File opened for modification C:\Windows\system32\MRT.exe filename.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
996.exefilename.exeupdater.exeexplorgu.exepid process 2184 996.exe 3428 filename.exe 3956 updater.exe 3804 explorgu.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
A9CE.exeA9CE.exeBD95.exeF9D6.exeE3B.exeupdater.exedescription pid process target process PID 1904 set thread context of 2432 1904 A9CE.exe A9CE.exe PID 1472 set thread context of 1256 1472 A9CE.exe A9CE.exe PID 2056 set thread context of 4372 2056 BD95.exe jsc.exe PID 2412 set thread context of 3716 2412 F9D6.exe RegAsm.exe PID 876 set thread context of 4584 876 E3B.exe calc.exe PID 3956 set thread context of 652 3956 updater.exe conhost.exe PID 3956 set thread context of 3652 3956 updater.exe explorer.exe -
Drops file in Windows directory 1 IoCs
Processes:
996.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 996.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3748 sc.exe 3472 sc.exe 3284 sc.exe 3372 sc.exe 1424 sc.exe 1792 sc.exe 1924 sc.exe 724 sc.exe 5048 sc.exe 1492 sc.exe 4576 sc.exe 1000 sc.exe 1448 sc.exe 2468 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2680 1256 WerFault.exe A9CE.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe971F.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 971F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 971F.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 971F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exepid process 3972 a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe 3972 a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 3420 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe971F.exepid process 3972 a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe 1924 971F.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
jsc.exeRegAsm.exepowershell.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 4372 jsc.exe Token: SeDebugPrivilege 3716 RegAsm.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 3240 powershell.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 Token: SeDebugPrivilege 4832 powershell.exe Token: SeShutdownPrivilege 3288 powercfg.exe Token: SeCreatePagefilePrivilege 3288 powercfg.exe Token: SeShutdownPrivilege 1280 powercfg.exe Token: SeCreatePagefilePrivilege 1280 powercfg.exe Token: SeShutdownPrivilege 2920 powercfg.exe Token: SeCreatePagefilePrivilege 2920 powercfg.exe Token: SeShutdownPrivilege 3824 powercfg.exe Token: SeCreatePagefilePrivilege 3824 powercfg.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeShutdownPrivilege 4148 powercfg.exe Token: SeCreatePagefilePrivilege 4148 powercfg.exe Token: SeShutdownPrivilege 3272 powercfg.exe Token: SeCreatePagefilePrivilege 3272 powercfg.exe Token: SeShutdownPrivilege 4056 powercfg.exe Token: SeCreatePagefilePrivilege 4056 powercfg.exe Token: SeShutdownPrivilege 1312 powercfg.exe Token: SeCreatePagefilePrivilege 1312 powercfg.exe Token: SeLockMemoryPrivilege 3652 explorer.exe Token: SeShutdownPrivilege 3420 Token: SeCreatePagefilePrivilege 3420 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
A9CE.exeA9CE.exeA9CE.exeBD95.execmd.exeF9D6.exeE3B.exedescription pid process target process PID 3420 wrote to memory of 1924 3420 971F.exe PID 3420 wrote to memory of 1924 3420 971F.exe PID 3420 wrote to memory of 1924 3420 971F.exe PID 3420 wrote to memory of 1904 3420 A9CE.exe PID 3420 wrote to memory of 1904 3420 A9CE.exe PID 3420 wrote to memory of 1904 3420 A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 1904 wrote to memory of 2432 1904 A9CE.exe A9CE.exe PID 2432 wrote to memory of 3596 2432 A9CE.exe icacls.exe PID 2432 wrote to memory of 3596 2432 A9CE.exe icacls.exe PID 2432 wrote to memory of 3596 2432 A9CE.exe icacls.exe PID 2432 wrote to memory of 1472 2432 A9CE.exe A9CE.exe PID 2432 wrote to memory of 1472 2432 A9CE.exe A9CE.exe PID 2432 wrote to memory of 1472 2432 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 1472 wrote to memory of 1256 1472 A9CE.exe A9CE.exe PID 3420 wrote to memory of 2056 3420 BD95.exe PID 3420 wrote to memory of 2056 3420 BD95.exe PID 2056 wrote to memory of 4372 2056 BD95.exe jsc.exe PID 2056 wrote to memory of 4372 2056 BD95.exe jsc.exe PID 2056 wrote to memory of 4372 2056 BD95.exe jsc.exe PID 2056 wrote to memory of 4372 2056 BD95.exe jsc.exe PID 2056 wrote to memory of 4372 2056 BD95.exe jsc.exe PID 3420 wrote to memory of 3492 3420 EBAB.exe PID 3420 wrote to memory of 3492 3420 EBAB.exe PID 3420 wrote to memory of 3492 3420 EBAB.exe PID 3420 wrote to memory of 436 3420 cmd.exe PID 3420 wrote to memory of 436 3420 cmd.exe PID 436 wrote to memory of 3324 436 cmd.exe reg.exe PID 436 wrote to memory of 3324 436 cmd.exe reg.exe PID 3420 wrote to memory of 2412 3420 F9D6.exe PID 3420 wrote to memory of 2412 3420 F9D6.exe PID 3420 wrote to memory of 2412 3420 F9D6.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 2412 wrote to memory of 3716 2412 F9D6.exe RegAsm.exe PID 3420 wrote to memory of 2184 3420 996.exe PID 3420 wrote to memory of 2184 3420 996.exe PID 3420 wrote to memory of 2184 3420 996.exe PID 3420 wrote to memory of 876 3420 E3B.exe PID 3420 wrote to memory of 876 3420 E3B.exe PID 3420 wrote to memory of 876 3420 E3B.exe PID 876 wrote to memory of 3240 876 E3B.exe powershell.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
E3B.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" E3B.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe"C:\Users\Admin\AppData\Local\Temp\a6bda3b1e990cdc4da5b889f8c4d5a717ac32107a22720e81c9268d0af553e9c.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3972
-
C:\Users\Admin\AppData\Local\Temp\971F.exeC:\Users\Admin\AppData\Local\Temp\971F.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1924
-
C:\Users\Admin\AppData\Local\Temp\A9CE.exeC:\Users\Admin\AppData\Local\Temp\A9CE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\A9CE.exeC:\Users\Admin\AppData\Local\Temp\A9CE.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d8505720-1bf6-40ce-b0c3-5071a9d2bb7a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\A9CE.exe"C:\Users\Admin\AppData\Local\Temp\A9CE.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\A9CE.exe"C:\Users\Admin\AppData\Local\Temp\A9CE.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 5685⤵
- Program crash
PID:2680
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1256 -ip 12561⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\BD95.exeC:\Users\Admin\AppData\Local\Temp\BD95.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3428 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:5004
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4648
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1424
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4576
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:1792
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:1924
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:3748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:724
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:3284
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:3372
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:1000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EBAB.exeC:\Users\Admin\AppData\Local\Temp\EBAB.exe1⤵
- Executes dropped EXE
PID:3492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F0CC.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\F9D6.exeC:\Users\Admin\AppData\Local\Temp\F9D6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\996.exeC:\Users\Admin\AppData\Local\Temp\996.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:2184
-
C:\Users\Admin\AppData\Local\Temp\E3B.exeC:\Users\Admin\AppData\Local\Temp\E3B.exe1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\E3B.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"2⤵PID:4584
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:3956 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1448
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:3472
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1492
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:4364
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart1⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3804 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:4656 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2808 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:3324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\168293393341_Desktop.zip' -CompressionLevel Optimal4⤵PID:2992
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD54441f05ac8dec68544e546329b79f347
SHA1b6cd59f90cf793a060d55cb6d512d4cd02aa92ce
SHA25671f61ce4f30dc92954abcb396ed306c30f83b98a08081b5088cf2c62f47932ef
SHA512310319682a72ff27047fdd272bccae4f445835c204e47dce44643035b8f2c08200f38ab5435049287c76015e352ea256359ba809b4a8c5b99cca472272788d77
-
Filesize
7.1MB
MD5448a4fe7cf78414bdf0b17c4e37bb867
SHA11fceca49b49953ab7b71782c435c923b640fe973
SHA256b7c31c96bd76ea4fb440faf1df78e8c9ee42dcccfbfd1549b313a0cc992714ed
SHA512ec75be5b46b4ca5938c5eff6a8c27d3d8daaab5edf7f78ded15ea829968464a98a5695dc70fcc72a03d17331bffde130dc29389dd0c6fd08155fcc9865deb465
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
18KB
MD56c8459e360a63712575e1141bd832d45
SHA12e88c55f5e673581ae25c2eba856c3e1e3d3cadf
SHA2569d0ce10452c7fe5efcd82b3fc141db46e275bc9dfd850d13dc914898686894b9
SHA51277ce5c5d64d4d17246d6b536fe1811049eaa6396b9c1fd675ff98ef24ccfe228f075061aa71f9f367add87b84f2845c81db09b1741288a7ce51fd4361357cd78
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
259KB
MD55ead0a4dc3bf605775d48f0442ba371e
SHA136250ca49ef272946f09e442a65625bbde8ce714
SHA2564f61b6ed6fa23715adf50cd5f3a74a427fc65006404338d9d9ad242d02f1222f
SHA51206f479022c5cb1de9fa5ae96766f8b35c8e692bb86f7bfad4fa583a65b0b44f68ce0b895f9845b55b02b49a02462377561a3d06eed00ef84ec9f3290a8bc2b85
-
Filesize
1.8MB
MD501cc26ecbfdeebceb71a8164da05fef3
SHA12bcadbcc1329fde8d7eb7b4ddee33a9690715b0a
SHA256b8c3dd017ddb8ea416e886acf134b17e91c44b8ccc1eec03f760bb4b328ab00f
SHA512006da3cbcca6bebfa82bb6d6d046e1a9a9a5bf8346bbc5ce30c1eb8b8249b930f9aaf8bbf92058183529e31827a8504f8f6b3710c0bb3e6a8a02b888e6766bb1
-
Filesize
788KB
MD51e962c67893e14647c2b57a8b4fe25d4
SHA12f2ce07ed3712576d8629f42bc7d377cc5b2d62a
SHA256c87c4bf8647258e7215f77f8b2ca29a4c507a2ff0f55f434cc3706f805291a3f
SHA5121d256f3d66e252f54e46a56f01aca379d823d3e40af517604363a939084702e3ebb71eeed0c174ea608b4752b07f1f0493955f062167f0114462e06df58f1f37
-
Filesize
64KB
MD559dd29909befb805686848c910a6fdde
SHA148305e6e90f206ac7d5b2805cab0eb65f6ca8b69
SHA2562745d3a9694961784385adb15bb26852f66e867bfa813244f80da8d37b0fa924
SHA51297dc5fe9fa3488ca7b8f063f1f195a4628bd02afb5b89decc29b0d825e9e5312183c9164b3ff6bb4c91a06ffceb0ca38f9b98fb3aefb0a0ae3363e9b5ff3d3bc
-
Filesize
2.4MB
MD57ea4ead4fc9c5c7a9f3309cab716a28f
SHA1b5457c2c7529585e02dac132b5adeed3a4f1f260
SHA256431452b0cb6b0ee3d623c3394b120b104e24826585530708942690eeba34055a
SHA512f6ca00aa0331da628514f982a4627c338c1c9f29a70146c7324e9212f73487a1a146a93f438be93f13cf08574da73769bdfefdbb02b689ffa6d8fc98a6993d1b
-
Filesize
63KB
MD5cbfbeaf0a6e70056f43406053cd61f1e
SHA1b7088a9f29b8ab84aedaffec81441580775d5393
SHA256fa776a4e5e0653f7856a19c3a9fbdad306eb9365cb553bc223d8075be5f5cd3b
SHA5122930b11123191108d66e1bba5cb43f34ca963c424f6dd9c61751db62cef3039773dd100c179909d30099953513ca6eb07e29732af7928d2602c35a8020271c5c
-
Filesize
6.3MB
MD5b1e8d4d7dd26612c17eccbf66b280e7c
SHA197dd5e81a4014fb54ef5ac3f1db88519843c85c2
SHA256e3940372b04a4cb2177ae409c195debccfe004600d73a39d429a577d248d4cb2
SHA512ff70dd3103128cd36bd1da3a734e635ec76d53a5629fc1f05941d6cadb9e82310da0ea298dcf449ef17c42a70ea7d787a75585ffa37a74f9007ca91a4481ecc8
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
535KB
MD5c85359e6fcc2b3aad2407a8769d8d1f1
SHA177adb2c84465aeef9ef0f8ddb12b0165610b57da
SHA2568934e11fa9c967fe8e67d9fc1c1f518f18c107b6abc91b143e03e5b18f892782
SHA5122f3c97978972293ca5a17838d173ad4554731edcc12e848bc27063a13ed5ca9bf0b8483f247891cf97be83e531ddab011d3c2b8156c92da8ec56a1a0b4c033a3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.7MB
MD58cae9c02800103cbbc078e51f21f3980
SHA1c9e1916eac0fe681b8f534f34d26e68d1b4dbcba
SHA2560a87d24d64c60b42d15f7a34b683b9c3d10972e623e35baad0d2525d9595430b
SHA51251ddc863bab598866c92d6170c1482060b6e9bef7b420017708c5dab176858389ea153f8767b4eda2a44280d0f78dc062e31f6ce1fd2e3b21158211913f09475
-
Filesize
1.8MB
MD5da6737aec1f8a62a0cfc56a5a5ceb1cd
SHA1e44b2a27a9c493e989bc666f2de41b024cf03a99
SHA256d8000ed61b73abc457336807d26187bc85234b222447e10b9e45072f31eda22e
SHA512932a9f2f01ca2352443f434068d9ee85e6dfbf3746b6c8386e736904db370ef75addb69e56999d1844295cc1e54e4c5f87c011cece5b9b8f22c57266072f46c0
-
Filesize
2.3MB
MD539609539fee0f3b192d04f93a1d75606
SHA18cf6fd1a8858d6861926462405ecb203439d9908
SHA2568e3432b341f9ebd8fe25ee6c2140b07d7b72e17cd10d7c0b2e26d2e4fbbda589
SHA5126e42a9ed162d890ff2154a8c84edd6ec39ac9d3197a5bdb994113d09fdc171b110594a19dcc33d335edf702ae406d5110fd433d50764ee167ceae0c9acfcb83c
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
Filesize
3KB
MD52d29fd3ae57f422e2b2121141dc82253
SHA1c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA25680a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68