Malware Analysis Report

2024-10-19 02:41

Sample ID 240307-ncj46aba3s
Target 03fa96650130466d43c4b486c615294a.exe
SHA256 15bf2e47fd14a3a676452ca26d5c2551a67140ed8e8d3f1ebce9e5fcb7aa3fb4
Tags
povertystealer persistence stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

15bf2e47fd14a3a676452ca26d5c2551a67140ed8e8d3f1ebce9e5fcb7aa3fb4

Threat Level: Known bad

The file 03fa96650130466d43c4b486c615294a.exe was found to be: Known bad.

Malicious Activity Summary

povertystealer persistence stealer

Poverty Stealer

Detect Poverty Stealer Payload

Suspicious use of NtCreateUserProcessOtherParentProcess

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Enumerates connected drives

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Uses Task Scheduler COM API

GoLang User-Agent

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Enumerates processes with tasklist

Suspicious use of SendNotifyMessage

Runs ping.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-07 11:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-07 11:15

Reported

2024-03-07 11:17

Platform

win7-20240215-en

Max time kernel

117s

Max time network

117s

Command Line

C:\Windows\Explorer.EXE

Signatures

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 2468 created 1204 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Windows\Explorer.EXE

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2468 set thread context of 2848 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif

Enumerates physical storage devices

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2972 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 2972 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 2972 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 2972 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2648 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2648 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2648 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2648 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2660 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 2204 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 2204 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2204 wrote to memory of 2468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2204 wrote to memory of 2468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2204 wrote to memory of 2468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2204 wrote to memory of 2468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2204 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2204 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2204 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2204 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2468 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2468 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2468 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2468 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif
PID 2468 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe

"C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k move Bathrooms Bathrooms.bat & Bathrooms.bat & exit

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr /I "wrsa.exe opssvc.exe"

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c md 17040

C:\Windows\SysWOW64\cmd.exe

cmd /c copy /b Compound + Injection + Emotions + Worm + Participants + Richmond + Alot 17040\Enters.pif

C:\Windows\SysWOW64\cmd.exe

cmd /c copy /b Disco 17040\r

C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif

17040\Enters.pif 17040\r

C:\Windows\SysWOW64\PING.EXE

ping -n 5 127.0.0.1

C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif

C:\Users\Admin\AppData\Local\Temp\17040\Enters.pif

Network

Country Destination Domain Proto
US 8.8.8.8:53 hRDHAYtAoQH.hRDHAYtAoQH udp

Files

C:\Users\Admin\AppData\Local\Temp\Bathrooms

MD5 a0d9b89b48e8fc49b82d019ee8500484
SHA1 5ca4d2e68d734e2314bc226f0bd6b5c04e0bdac3
SHA256 f231fe2acf36b89ade78b80eb336650de0e4a7e9bfee25e70bce55a93c77e02a
SHA512 1ac26f3815f4477a1ba6e73fe90587952fda18dd4da2ccd201bb5a36eebbe76270ace8b5f8764e279568ed394e5bdcf9ee10a429ad6c76f9b462c37043034fe5

C:\Users\Admin\AppData\Local\Temp\Compound

MD5 da2be5607513a22a9d61d9538f5f0636
SHA1 e77975bb6f507b4089409a06ab2226a6d54bfefd
SHA256 640dd32f2764bdb5c0578093a02e828ff53e18d397512a1992bba583d1d2e648
SHA512 1f432b70928e2b41fe74427e086bca411c88710adba700c32bc6089d02684edd04859503269b95bfa64be7439ebbfd41d928d9a464717517db18e68bc3eb63f4

C:\Users\Admin\AppData\Local\Temp\Emotions

MD5 8a83e45fdfd2f28ef8210428fecdef9c
SHA1 db669761c961b72e7771cd8317c582ef8e48ddd1
SHA256 7e9d688abe2dd7d1ac4796a62d9e816d8c3efe719f2de72ce6c49221e027d2a7
SHA512 74dff439e42139117e9d384cb6323039683aaf5c18ed71285eec65d215eb4bf4a4c3e284231f1e7da6af9147606e9ccf13f081fb84f7f311f4e444878a7ab1e2

C:\Users\Admin\AppData\Local\Temp\Worm

MD5 1624046c22d7d232e3ad77d456743551
SHA1 6ac978fe79d62baec9626ae3d18e2263ea91ede7
SHA256 0795d6a6fdc1bac55de379cd7f33e4440dc3645e748f91d2b3b4dddf38a8635a
SHA512 da89fc52fab7905d82fd1d9abb92ba53ec5f93f1ed296acab297aeeb8ce0b708052f8b519300926323001274d769b859778fbb7e736375f6e7c196f6287dcdc3

C:\Users\Admin\AppData\Local\Temp\Injection

MD5 4d21c2eec34495a74f67de9c7944bff3
SHA1 f9241a3fc121e397e23d6f3d07a3ee24b14137c2
SHA256 647a49b0eab7039c74d69e4142ed1be7f01afe9cbd6483d01039cf5b289973da
SHA512 8091201ebe4c08b105e558d2085aed1e90366ce289effa3e2d2a6b51d9364f1f68e3c1d8e54502931800a34d469152bb615e688d7563ac8b299de02c7161110c

C:\Users\Admin\AppData\Local\Temp\Participants

MD5 53c678fa488852a4533e20624a3f4ac2
SHA1 22af659f0f7b6f09e3780ecafa87dff857c29707
SHA256 33f67ac58e056d541e9ffc261620bb6069bc3bdc0690cf6b1b4402cf64476da4
SHA512 79f7f93f9bc6b731bed2a69868cf2451b4c255fda7500914e8a0580b0fa6a8d468b2a2ec27c01f9b007e0addf9b5bc1abd569edeea16496464461cb09cb71fd7

C:\Users\Admin\AppData\Local\Temp\Alot

MD5 0c257b9edbcc7f41af6e1027bc0713ee
SHA1 2149a7bb22476f85610c842c34628b2f22d8a549
SHA256 7ac226e081d090f2e3cb99104b4226fcd5e77cb83f7edb23081c1a2bd376533c
SHA512 f98b584e5112a81336ad4d7f2a1a4066028fc0c9d7a0b5b148172bd4c9a0485983ea868522a61999415837fdbd73401cb703138729e03831dc39bbe6c1f3f25b

C:\Users\Admin\AppData\Local\Temp\Richmond

MD5 bc70f3222d729f92658b32a28c6d7375
SHA1 8591ee5231e1efcf3eadc507909ec98b2cf29614
SHA256 5f9ba61683e3b51ca21cb15674306b7c58b62ee68210d96ecf8fb00b1d396a2f
SHA512 10e7738f01e40321e305f89115df545c29a60bad47b91fca651cec8d1dcacb4551c72f838ac0a10f7d5739090d042ac429c85ebced5056809d0251d8c909f3c6

C:\Users\Admin\AppData\Local\Temp\Disco

MD5 8de31c24cb7fe99ff6348875de7cd146
SHA1 8e2afafc129d1ddfc6de010029bb867f1708c6f6
SHA256 dc30e0b588b256bd593502a28b6ce43f0da029b38fd70408b19b415d219066df
SHA512 6a20368a0cbc03e25fb699815f584727c050f4b583ff8ee467e4a03ce4123c29d2f90dc8a4745831f5bc860b7deaa68a2bc19364c46bfe136956d265539ac133

\Users\Admin\AppData\Local\Temp\17040\Enters.pif

MD5 bfa84dbde0df8f1cad3e179bd46a6e34
SHA1 06ae3c38d4b2f8125656268925ebde9eca6a1f9e
SHA256 6de412b8674ffba5d78ff9d36abffbe2cf86fd08b2231592fca2fcf41f1f2314
SHA512 edd4c839437570003e1cc4a04e6cb7bf8c70c0ebdae741e69782e9bdf47c42441cd8d709170898859b94b3248cccf0e9dfa5e183c110b93ded935ce69a0ff82a

memory/2468-25-0x0000000000510000-0x0000000000511000-memory.dmp

memory/2848-28-0x0000000000460000-0x000000000060C000-memory.dmp

memory/2848-29-0x0000000000460000-0x000000000060C000-memory.dmp

memory/2848-31-0x0000000000460000-0x000000000060C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-07 11:15

Reported

2024-03-07 11:17

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

156s

Command Line

C:\Windows\Explorer.EXE

Signatures

Detect Poverty Stealer Payload

Description Indicator Process Target
N/A N/A N/A N/A

Poverty Stealer

stealer povertystealer

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 3912 created 3344 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\Explorer.EXE

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\App = "C:\\Windows\\SysWoW64\\calc.exe" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\t: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\y: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\n: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\w: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\q: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\o: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\m: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\s: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\x: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\b: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\i: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\k: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\l: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\p: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\a: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\g: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\r: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\v: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\h: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\u: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\z: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\j: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3912 set thread context of 1692 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 1692 set thread context of 2368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 set thread context of 1368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe

Enumerates physical storage devices

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A
N/A N/A C:\Windows\SysWOW64\tasklist.exe N/A

GoLang User-Agent

Description Indicator Process Target
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A
HTTP User-Agent header Go-http-client/1.1 N/A N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3768 wrote to memory of 1632 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 3768 wrote to memory of 1632 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 3768 wrote to memory of 1632 N/A C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 3484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1632 wrote to memory of 3484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1632 wrote to memory of 3484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1632 wrote to memory of 3944 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1632 wrote to memory of 3944 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1632 wrote to memory of 3944 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1632 wrote to memory of 4104 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1632 wrote to memory of 4104 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1632 wrote to memory of 4104 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\tasklist.exe
PID 1632 wrote to memory of 2472 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1632 wrote to memory of 2472 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1632 wrote to memory of 2472 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\findstr.exe
PID 1632 wrote to memory of 3444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 3444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 3444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 1264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 1264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 1264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 2140 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 2140 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 2140 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1632 wrote to memory of 3912 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 1632 wrote to memory of 3912 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 1632 wrote to memory of 1764 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 1632 wrote to memory of 1764 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 1632 wrote to memory of 1764 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3912 wrote to memory of 1692 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 3912 wrote to memory of 1692 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 3912 wrote to memory of 1692 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 3912 wrote to memory of 1692 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif
PID 1692 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 2368 wrote to memory of 1448 N/A C:\Windows\SysWoW64\calc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2368 wrote to memory of 1448 N/A C:\Windows\SysWoW64\calc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2368 wrote to memory of 1448 N/A C:\Windows\SysWoW64\calc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1692 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe
PID 1692 wrote to memory of 1368 N/A C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif C:\Windows\SysWoW64\calc.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe

"C:\Users\Admin\AppData\Local\Temp\03fa96650130466d43c4b486c615294a.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k move Bathrooms Bathrooms.bat & Bathrooms.bat & exit

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr /I "wrsa.exe opssvc.exe"

C:\Windows\SysWOW64\tasklist.exe

tasklist

C:\Windows\SysWOW64\findstr.exe

findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c md 17059

C:\Windows\SysWOW64\cmd.exe

cmd /c copy /b Compound + Injection + Emotions + Worm + Participants + Richmond + Alot 17059\Enters.pif

C:\Windows\SysWOW64\cmd.exe

cmd /c copy /b Disco 17059\r

C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif

17059\Enters.pif 17059\r

C:\Windows\SysWOW64\PING.EXE

ping -n 5 127.0.0.1

C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif

C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif

C:\Windows\SysWoW64\calc.exe

C:\Windows\SysWoW64\calc.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\")) { Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Windows\SysWoW64\calc.exe\" }"

C:\Windows\SysWoW64\calc.exe

C:\Windows\SysWoW64\calc.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 84.177.190.20.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 71.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 133.113.22.20.in-addr.arpa udp
US 8.8.8.8:53 hRDHAYtAoQH.hRDHAYtAoQH udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 hostregister.info udp
US 188.114.96.2:443 hostregister.info tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 188.114.96.2:443 hostregister.info tcp
US 188.114.96.2:443 hostregister.info tcp
US 8.8.8.8:53 2.96.114.188.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 195.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 188.114.96.2:443 hostregister.info tcp
US 188.114.96.2:443 hostregister.info tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 188.114.96.2:443 hostregister.info tcp
US 8.8.8.8:53 24.134.221.88.in-addr.arpa udp
RU 195.2.70.38:30001 195.2.70.38 tcp
RU 91.142.74.28:30001 91.142.74.28 tcp
US 8.8.8.8:53 38.70.2.195.in-addr.arpa udp
US 8.8.8.8:53 28.74.142.91.in-addr.arpa udp
DE 146.70.169.164:2227 tcp
US 8.8.8.8:53 164.169.70.146.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
RU 195.2.70.38:30001 195.2.70.38 tcp
RU 91.142.74.28:30001 91.142.74.28 tcp
US 8.8.8.8:53 210.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 188.114.96.2:443 hostregister.info tcp
RU 195.2.70.38:30001 195.2.70.38 tcp
RU 91.142.74.28:30001 91.142.74.28 tcp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 34.134.221.88.in-addr.arpa udp
RU 195.2.70.38:30001 195.2.70.38 tcp
RU 91.142.74.28:30001 91.142.74.28 tcp
US 8.8.8.8:53 196.178.17.96.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Bathrooms

MD5 a0d9b89b48e8fc49b82d019ee8500484
SHA1 5ca4d2e68d734e2314bc226f0bd6b5c04e0bdac3
SHA256 f231fe2acf36b89ade78b80eb336650de0e4a7e9bfee25e70bce55a93c77e02a
SHA512 1ac26f3815f4477a1ba6e73fe90587952fda18dd4da2ccd201bb5a36eebbe76270ace8b5f8764e279568ed394e5bdcf9ee10a429ad6c76f9b462c37043034fe5

C:\Users\Admin\AppData\Local\Temp\Compound

MD5 da2be5607513a22a9d61d9538f5f0636
SHA1 e77975bb6f507b4089409a06ab2226a6d54bfefd
SHA256 640dd32f2764bdb5c0578093a02e828ff53e18d397512a1992bba583d1d2e648
SHA512 1f432b70928e2b41fe74427e086bca411c88710adba700c32bc6089d02684edd04859503269b95bfa64be7439ebbfd41d928d9a464717517db18e68bc3eb63f4

C:\Users\Admin\AppData\Local\Temp\Emotions

MD5 8a83e45fdfd2f28ef8210428fecdef9c
SHA1 db669761c961b72e7771cd8317c582ef8e48ddd1
SHA256 7e9d688abe2dd7d1ac4796a62d9e816d8c3efe719f2de72ce6c49221e027d2a7
SHA512 74dff439e42139117e9d384cb6323039683aaf5c18ed71285eec65d215eb4bf4a4c3e284231f1e7da6af9147606e9ccf13f081fb84f7f311f4e444878a7ab1e2

C:\Users\Admin\AppData\Local\Temp\Richmond

MD5 bc70f3222d729f92658b32a28c6d7375
SHA1 8591ee5231e1efcf3eadc507909ec98b2cf29614
SHA256 5f9ba61683e3b51ca21cb15674306b7c58b62ee68210d96ecf8fb00b1d396a2f
SHA512 10e7738f01e40321e305f89115df545c29a60bad47b91fca651cec8d1dcacb4551c72f838ac0a10f7d5739090d042ac429c85ebced5056809d0251d8c909f3c6

C:\Users\Admin\AppData\Local\Temp\Alot

MD5 0c257b9edbcc7f41af6e1027bc0713ee
SHA1 2149a7bb22476f85610c842c34628b2f22d8a549
SHA256 7ac226e081d090f2e3cb99104b4226fcd5e77cb83f7edb23081c1a2bd376533c
SHA512 f98b584e5112a81336ad4d7f2a1a4066028fc0c9d7a0b5b148172bd4c9a0485983ea868522a61999415837fdbd73401cb703138729e03831dc39bbe6c1f3f25b

C:\Users\Admin\AppData\Local\Temp\Worm

MD5 1624046c22d7d232e3ad77d456743551
SHA1 6ac978fe79d62baec9626ae3d18e2263ea91ede7
SHA256 0795d6a6fdc1bac55de379cd7f33e4440dc3645e748f91d2b3b4dddf38a8635a
SHA512 da89fc52fab7905d82fd1d9abb92ba53ec5f93f1ed296acab297aeeb8ce0b708052f8b519300926323001274d769b859778fbb7e736375f6e7c196f6287dcdc3

C:\Users\Admin\AppData\Local\Temp\Participants

MD5 53c678fa488852a4533e20624a3f4ac2
SHA1 22af659f0f7b6f09e3780ecafa87dff857c29707
SHA256 33f67ac58e056d541e9ffc261620bb6069bc3bdc0690cf6b1b4402cf64476da4
SHA512 79f7f93f9bc6b731bed2a69868cf2451b4c255fda7500914e8a0580b0fa6a8d468b2a2ec27c01f9b007e0addf9b5bc1abd569edeea16496464461cb09cb71fd7

C:\Users\Admin\AppData\Local\Temp\Injection

MD5 4d21c2eec34495a74f67de9c7944bff3
SHA1 f9241a3fc121e397e23d6f3d07a3ee24b14137c2
SHA256 647a49b0eab7039c74d69e4142ed1be7f01afe9cbd6483d01039cf5b289973da
SHA512 8091201ebe4c08b105e558d2085aed1e90366ce289effa3e2d2a6b51d9364f1f68e3c1d8e54502931800a34d469152bb615e688d7563ac8b299de02c7161110c

C:\Users\Admin\AppData\Local\Temp\Disco

MD5 8de31c24cb7fe99ff6348875de7cd146
SHA1 8e2afafc129d1ddfc6de010029bb867f1708c6f6
SHA256 dc30e0b588b256bd593502a28b6ce43f0da029b38fd70408b19b415d219066df
SHA512 6a20368a0cbc03e25fb699815f584727c050f4b583ff8ee467e4a03ce4123c29d2f90dc8a4745831f5bc860b7deaa68a2bc19364c46bfe136956d265539ac133

C:\Users\Admin\AppData\Local\Temp\17059\Enters.pif

MD5 bfa84dbde0df8f1cad3e179bd46a6e34
SHA1 06ae3c38d4b2f8125656268925ebde9eca6a1f9e
SHA256 6de412b8674ffba5d78ff9d36abffbe2cf86fd08b2231592fca2fcf41f1f2314
SHA512 edd4c839437570003e1cc4a04e6cb7bf8c70c0ebdae741e69782e9bdf47c42441cd8d709170898859b94b3248cccf0e9dfa5e183c110b93ded935ce69a0ff82a

memory/3912-24-0x0000022817000000-0x0000022817001000-memory.dmp

memory/1692-26-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-27-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-29-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-30-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-31-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-32-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-33-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-34-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-35-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-36-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-37-0x00000253D1E80000-0x00000253D202C000-memory.dmp

memory/1692-39-0x00000253D23D0000-0x00000253D23D3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\THCECC1.tmp

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2368-42-0x00000000009F0000-0x000000000120C000-memory.dmp

memory/1448-44-0x0000000074880000-0x0000000075030000-memory.dmp

memory/1448-46-0x0000000002AC0000-0x0000000002AF6000-memory.dmp

memory/1448-45-0x0000000002AB0000-0x0000000002AC0000-memory.dmp

memory/1448-48-0x0000000002AB0000-0x0000000002AC0000-memory.dmp

memory/1448-50-0x00000000053C0000-0x00000000059E8000-memory.dmp

memory/1448-51-0x00000000050E0000-0x0000000005102000-memory.dmp

memory/1448-52-0x0000000005280000-0x00000000052E6000-memory.dmp

memory/1368-54-0x0000000000880000-0x0000000000881000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oywjn0ox.5tr.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1448-53-0x0000000005A60000-0x0000000005AC6000-memory.dmp

memory/1448-64-0x0000000005CC0000-0x0000000006014000-memory.dmp

memory/1448-65-0x00000000060C0000-0x00000000060DE000-memory.dmp

memory/1448-66-0x0000000006110000-0x000000000615C000-memory.dmp

memory/1448-67-0x0000000002AB0000-0x0000000002AC0000-memory.dmp

memory/1448-68-0x00000000072A0000-0x0000000007336000-memory.dmp

memory/1448-69-0x00000000065A0000-0x00000000065BA000-memory.dmp

memory/1448-70-0x0000000006620000-0x0000000006642000-memory.dmp

memory/1448-71-0x00000000078F0000-0x0000000007E94000-memory.dmp

memory/1448-74-0x0000000074880000-0x0000000075030000-memory.dmp

memory/1368-75-0x0000000000710000-0x000000000071A000-memory.dmp

memory/2368-76-0x00000000009F0000-0x000000000120C000-memory.dmp

memory/2368-79-0x00000000009F0000-0x000000000120C000-memory.dmp

memory/2368-83-0x00000000009F0000-0x000000000120C000-memory.dmp

memory/2368-84-0x00000000009F0000-0x000000000120C000-memory.dmp

memory/2368-86-0x00000000009F0000-0x000000000120C000-memory.dmp

memory/2368-87-0x00000000009F0000-0x000000000120C000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-03-07 11:15

Reported

2024-03-07 11:15

Platform

win7-20240221-en

Max time kernel

0s

Max time network

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-03-07 11:15

Reported

2024-03-07 11:15

Platform

win10v2004-20240226-en

Max time kernel

0s

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 20.106.86.13:443 tcp
N/A 192.229.221.95:80 tcp

Files

N/A