Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
b23d6c569893579789695f3d05accbe1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b23d6c569893579789695f3d05accbe1.exe
Resource
win10v2004-20240226-en
General
-
Target
b23d6c569893579789695f3d05accbe1.exe
-
Size
1.4MB
-
MD5
b23d6c569893579789695f3d05accbe1
-
SHA1
fa6b1d998500175e122de2c264869fda667bcd26
-
SHA256
93ddf61c1aa7c0b867ffbd579b9febdeed4b027d14f8b86d62f7da493706731c
-
SHA512
e816f5121406e32178afeabece8b63c4d773e183d18f705b5a884664013f0fe082830785c2c87913101c5c504a7a7ee60b9987d064c4e5624c681a3674a2e633
-
SSDEEP
24576:ckJ57Lut19vrBg9qm+BZkvgt7DYOl+FbSoLCwcpN5tgLG6OI8mMe2WLPFouz:T7LG1V/dBZkY1Yo+X+tgLGPi2WLPFou
Malware Config
Extracted
raccoon
43aae292cfe6f58a13bd7111bdd7d5ded5b23ec3
-
url4cnc
https://telete.in/brikitiki
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/4636-210-0x0000000006E40000-0x0000000006F64000-memory.dmp family_zgrat_v1 behavioral2/memory/4636-211-0x0000000006E40000-0x0000000006F5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4636-212-0x0000000006E40000-0x0000000006F5E000-memory.dmp family_zgrat_v1 -
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule behavioral2/memory/1784-2499-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Oggnfkemtibcinconsoleapp16.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Hsbvhggsqlrfmuvyptooonsoleapp5.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation b23d6c569893579789695f3d05accbe1.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 5 IoCs
pid Process 3924 Oggnfkemtibcinconsoleapp16.exe 3620 Oggnfkemtibcinconsoleapp16.exe 1484 Oggnfkemtibcinconsoleapp16.exe 4484 Hsbvhggsqlrfmuvyptooonsoleapp5.exe 3228 Hsbvhggsqlrfmuvyptooonsoleapp5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4636 set thread context of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 3924 set thread context of 1484 3924 Oggnfkemtibcinconsoleapp16.exe 142 PID 4484 set thread context of 3228 4484 Hsbvhggsqlrfmuvyptooonsoleapp5.exe 164 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3308 3228 WerFault.exe 164 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings Oggnfkemtibcinconsoleapp16.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings b23d6c569893579789695f3d05accbe1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4060 powershell.exe 4060 powershell.exe 4296 powershell.exe 4296 powershell.exe 1636 powershell.exe 1636 powershell.exe 2868 powershell.exe 2868 powershell.exe 1920 powershell.exe 1920 powershell.exe 4992 powershell.exe 4992 powershell.exe 1328 powershell.exe 1328 powershell.exe 2892 powershell.exe 2892 powershell.exe 4176 powershell.exe 4176 powershell.exe 1704 powershell.exe 1704 powershell.exe 4636 b23d6c569893579789695f3d05accbe1.exe 4636 b23d6c569893579789695f3d05accbe1.exe 1276 powershell.exe 1276 powershell.exe 3772 powershell.exe 3772 powershell.exe 3388 powershell.exe 3388 powershell.exe 2004 powershell.exe 2004 powershell.exe 1112 powershell.exe 1112 powershell.exe 780 powershell.exe 780 powershell.exe 3152 powershell.exe 3152 powershell.exe 684 powershell.exe 684 powershell.exe 4916 powershell.exe 4916 powershell.exe 2448 powershell.exe 2448 powershell.exe 3924 Oggnfkemtibcinconsoleapp16.exe 3924 Oggnfkemtibcinconsoleapp16.exe 3924 Oggnfkemtibcinconsoleapp16.exe 3924 Oggnfkemtibcinconsoleapp16.exe 3924 Oggnfkemtibcinconsoleapp16.exe 3924 Oggnfkemtibcinconsoleapp16.exe 676 powershell.exe 676 powershell.exe 1668 powershell.exe 1668 powershell.exe 2312 powershell.exe 2312 powershell.exe 3868 powershell.exe 3868 powershell.exe 3552 powershell.exe 3552 powershell.exe 4452 powershell.exe 4452 powershell.exe 4172 powershell.exe 4172 powershell.exe 1556 powershell.exe 1556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4060 powershell.exe Token: SeIncreaseQuotaPrivilege 4060 powershell.exe Token: SeSecurityPrivilege 4060 powershell.exe Token: SeTakeOwnershipPrivilege 4060 powershell.exe Token: SeLoadDriverPrivilege 4060 powershell.exe Token: SeSystemProfilePrivilege 4060 powershell.exe Token: SeSystemtimePrivilege 4060 powershell.exe Token: SeProfSingleProcessPrivilege 4060 powershell.exe Token: SeIncBasePriorityPrivilege 4060 powershell.exe Token: SeCreatePagefilePrivilege 4060 powershell.exe Token: SeBackupPrivilege 4060 powershell.exe Token: SeRestorePrivilege 4060 powershell.exe Token: SeShutdownPrivilege 4060 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeSystemEnvironmentPrivilege 4060 powershell.exe Token: SeRemoteShutdownPrivilege 4060 powershell.exe Token: SeUndockPrivilege 4060 powershell.exe Token: SeManageVolumePrivilege 4060 powershell.exe Token: 33 4060 powershell.exe Token: 34 4060 powershell.exe Token: 35 4060 powershell.exe Token: 36 4060 powershell.exe Token: SeIncreaseQuotaPrivilege 4060 powershell.exe Token: SeSecurityPrivilege 4060 powershell.exe Token: SeTakeOwnershipPrivilege 4060 powershell.exe Token: SeLoadDriverPrivilege 4060 powershell.exe Token: SeSystemProfilePrivilege 4060 powershell.exe Token: SeSystemtimePrivilege 4060 powershell.exe Token: SeProfSingleProcessPrivilege 4060 powershell.exe Token: SeIncBasePriorityPrivilege 4060 powershell.exe Token: SeCreatePagefilePrivilege 4060 powershell.exe Token: SeBackupPrivilege 4060 powershell.exe Token: SeRestorePrivilege 4060 powershell.exe Token: SeShutdownPrivilege 4060 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeSystemEnvironmentPrivilege 4060 powershell.exe Token: SeRemoteShutdownPrivilege 4060 powershell.exe Token: SeUndockPrivilege 4060 powershell.exe Token: SeManageVolumePrivilege 4060 powershell.exe Token: 33 4060 powershell.exe Token: 34 4060 powershell.exe Token: 35 4060 powershell.exe Token: 36 4060 powershell.exe Token: SeDebugPrivilege 4296 powershell.exe Token: SeIncreaseQuotaPrivilege 4296 powershell.exe Token: SeSecurityPrivilege 4296 powershell.exe Token: SeTakeOwnershipPrivilege 4296 powershell.exe Token: SeLoadDriverPrivilege 4296 powershell.exe Token: SeSystemProfilePrivilege 4296 powershell.exe Token: SeSystemtimePrivilege 4296 powershell.exe Token: SeProfSingleProcessPrivilege 4296 powershell.exe Token: SeIncBasePriorityPrivilege 4296 powershell.exe Token: SeCreatePagefilePrivilege 4296 powershell.exe Token: SeBackupPrivilege 4296 powershell.exe Token: SeRestorePrivilege 4296 powershell.exe Token: SeShutdownPrivilege 4296 powershell.exe Token: SeDebugPrivilege 4296 powershell.exe Token: SeSystemEnvironmentPrivilege 4296 powershell.exe Token: SeRemoteShutdownPrivilege 4296 powershell.exe Token: SeUndockPrivilege 4296 powershell.exe Token: SeManageVolumePrivilege 4296 powershell.exe Token: 33 4296 powershell.exe Token: 34 4296 powershell.exe Token: 35 4296 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4060 4636 b23d6c569893579789695f3d05accbe1.exe 92 PID 4636 wrote to memory of 4060 4636 b23d6c569893579789695f3d05accbe1.exe 92 PID 4636 wrote to memory of 4060 4636 b23d6c569893579789695f3d05accbe1.exe 92 PID 4636 wrote to memory of 4296 4636 b23d6c569893579789695f3d05accbe1.exe 95 PID 4636 wrote to memory of 4296 4636 b23d6c569893579789695f3d05accbe1.exe 95 PID 4636 wrote to memory of 4296 4636 b23d6c569893579789695f3d05accbe1.exe 95 PID 4636 wrote to memory of 1636 4636 b23d6c569893579789695f3d05accbe1.exe 99 PID 4636 wrote to memory of 1636 4636 b23d6c569893579789695f3d05accbe1.exe 99 PID 4636 wrote to memory of 1636 4636 b23d6c569893579789695f3d05accbe1.exe 99 PID 4636 wrote to memory of 2868 4636 b23d6c569893579789695f3d05accbe1.exe 101 PID 4636 wrote to memory of 2868 4636 b23d6c569893579789695f3d05accbe1.exe 101 PID 4636 wrote to memory of 2868 4636 b23d6c569893579789695f3d05accbe1.exe 101 PID 4636 wrote to memory of 1920 4636 b23d6c569893579789695f3d05accbe1.exe 103 PID 4636 wrote to memory of 1920 4636 b23d6c569893579789695f3d05accbe1.exe 103 PID 4636 wrote to memory of 1920 4636 b23d6c569893579789695f3d05accbe1.exe 103 PID 4636 wrote to memory of 4992 4636 b23d6c569893579789695f3d05accbe1.exe 105 PID 4636 wrote to memory of 4992 4636 b23d6c569893579789695f3d05accbe1.exe 105 PID 4636 wrote to memory of 4992 4636 b23d6c569893579789695f3d05accbe1.exe 105 PID 4636 wrote to memory of 1328 4636 b23d6c569893579789695f3d05accbe1.exe 107 PID 4636 wrote to memory of 1328 4636 b23d6c569893579789695f3d05accbe1.exe 107 PID 4636 wrote to memory of 1328 4636 b23d6c569893579789695f3d05accbe1.exe 107 PID 4636 wrote to memory of 2892 4636 b23d6c569893579789695f3d05accbe1.exe 109 PID 4636 wrote to memory of 2892 4636 b23d6c569893579789695f3d05accbe1.exe 109 PID 4636 wrote to memory of 2892 4636 b23d6c569893579789695f3d05accbe1.exe 109 PID 4636 wrote to memory of 4176 4636 b23d6c569893579789695f3d05accbe1.exe 111 PID 4636 wrote to memory of 4176 4636 b23d6c569893579789695f3d05accbe1.exe 111 PID 4636 wrote to memory of 4176 4636 b23d6c569893579789695f3d05accbe1.exe 111 PID 4636 wrote to memory of 1704 4636 b23d6c569893579789695f3d05accbe1.exe 113 PID 4636 wrote to memory of 1704 4636 b23d6c569893579789695f3d05accbe1.exe 113 PID 4636 wrote to memory of 1704 4636 b23d6c569893579789695f3d05accbe1.exe 113 PID 4636 wrote to memory of 1636 4636 b23d6c569893579789695f3d05accbe1.exe 116 PID 4636 wrote to memory of 1636 4636 b23d6c569893579789695f3d05accbe1.exe 116 PID 4636 wrote to memory of 1636 4636 b23d6c569893579789695f3d05accbe1.exe 116 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 4636 wrote to memory of 1784 4636 b23d6c569893579789695f3d05accbe1.exe 117 PID 1636 wrote to memory of 3924 1636 WScript.exe 118 PID 1636 wrote to memory of 3924 1636 WScript.exe 118 PID 1636 wrote to memory of 3924 1636 WScript.exe 118 PID 3924 wrote to memory of 1276 3924 Oggnfkemtibcinconsoleapp16.exe 119 PID 3924 wrote to memory of 1276 3924 Oggnfkemtibcinconsoleapp16.exe 119 PID 3924 wrote to memory of 1276 3924 Oggnfkemtibcinconsoleapp16.exe 119 PID 3924 wrote to memory of 3772 3924 Oggnfkemtibcinconsoleapp16.exe 121 PID 3924 wrote to memory of 3772 3924 Oggnfkemtibcinconsoleapp16.exe 121 PID 3924 wrote to memory of 3772 3924 Oggnfkemtibcinconsoleapp16.exe 121 PID 3924 wrote to memory of 3388 3924 Oggnfkemtibcinconsoleapp16.exe 123 PID 3924 wrote to memory of 3388 3924 Oggnfkemtibcinconsoleapp16.exe 123 PID 3924 wrote to memory of 3388 3924 Oggnfkemtibcinconsoleapp16.exe 123 PID 3924 wrote to memory of 2004 3924 Oggnfkemtibcinconsoleapp16.exe 125 PID 3924 wrote to memory of 2004 3924 Oggnfkemtibcinconsoleapp16.exe 125 PID 3924 wrote to memory of 2004 3924 Oggnfkemtibcinconsoleapp16.exe 125 PID 3924 wrote to memory of 1112 3924 Oggnfkemtibcinconsoleapp16.exe 127 PID 3924 wrote to memory of 1112 3924 Oggnfkemtibcinconsoleapp16.exe 127 PID 3924 wrote to memory of 1112 3924 Oggnfkemtibcinconsoleapp16.exe 127 PID 3924 wrote to memory of 780 3924 Oggnfkemtibcinconsoleapp16.exe 129 PID 3924 wrote to memory of 780 3924 Oggnfkemtibcinconsoleapp16.exe 129 PID 3924 wrote to memory of 780 3924 Oggnfkemtibcinconsoleapp16.exe 129 PID 3924 wrote to memory of 3152 3924 Oggnfkemtibcinconsoleapp16.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23d6c569893579789695f3d05accbe1.exe"C:\Users\Admin\AppData\Local\Temp\b23d6c569893579789695f3d05accbe1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Dewgkwlbhkrsncbybkhtfpkb.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe"C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ddmmvlnwvosotwcisp.vbs"4⤵
- Checks computer location settings
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe"C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵PID:2964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com6⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exeC:\Users\Admin\AppData\Local\Temp\Hsbvhggsqlrfmuvyptooonsoleapp5.exe6⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 13247⤵
- Program crash
PID:3308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exeC:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe4⤵
- Executes dropped EXE
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exeC:\Users\Admin\AppData\Local\Temp\Oggnfkemtibcinconsoleapp16.exe4⤵
- Executes dropped EXE
PID:1484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b23d6c569893579789695f3d05accbe1.exeC:\Users\Admin\AppData\Local\Temp\b23d6c569893579789695f3d05accbe1.exe2⤵PID:1784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3228 -ip 32281⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD58e6ed0e063f11f70636a3f17f2a6ff0a
SHA14eb2da6280255683781c4b2e3e2e77de09d7d3ba
SHA256bfd0eeb6d76e800e9fc6ffc2924ed0f8a4562bd2446ec503362ed325094e7561
SHA512061a55f826961a96609717eb173b3f4bade372e4e26f9eae6b84f45b2bcdb97687e7d79b6d450f6a92a9805c799f623a04c7bb59550e2027ba3cf5d172a34e0e
-
Filesize
114B
MD5eedf5b01d8c6919df80fb4eeef481b96
SHA1c2f13824ede4e9781aa1d231c3bfe65ee57a5202
SHA256c470d243098a7051aa0914fcda227fa4ae3b752556a5de16da5d73a169005aa4
SHA512c9db4dff46d7517270dda041eca132368edc87bac7d0926b5179d7c385696a7b648c2b99bb444a08c60c95fd4dbd01700f17a8c9cb678bef680a8f681d248822
-
Filesize
367KB
MD581b52a797709cd2b43a567beb918f288
SHA191f7feded933ff4861dd2c00f971595d7dd89513
SHA256ce7db669ec00c7169451964b79a5b3ac018e87c5dfd2ed0c89482c30f74d4bae
SHA51270cfe54f9bf63e5d639b377efbb530b0983dcaaf6f09b0ac74b349ab1640a5eeeb98d9f22f4241a5e2da28868f183574393ffd6823bdfab00c5b102ae9443123
-
Filesize
754KB
MD5bff1438036ccf8be218ec89f2e92230b
SHA1805cabda5796988cdf0b624585fc4fcc514f141d
SHA256493aa6892b773d1e49a1f861eb163134759fa1a9f44708bfdf1148231606b4be
SHA512f9f3b256998e157d5140c0d3e8f1aa103a8d361c6cafb745e22bc1f805cad0f3d4599880534c50443ec1fd9ae907e2e6d6643c89e503e71df8e4769bc02034ff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82