Malware Analysis Report

2024-10-19 06:58

Sample ID 240319-xzyqhacg39
Target d6e9c9f3ee88f7da4a817a6303e50762
SHA256 d4a2a7cf4196088797aa8df306adf19600eccdc0b75f4c992ca4c596d02e9ccb
Tags
upx azorult netwire botnet infostealer rat stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d4a2a7cf4196088797aa8df306adf19600eccdc0b75f4c992ca4c596d02e9ccb

Threat Level: Known bad

The file d6e9c9f3ee88f7da4a817a6303e50762 was found to be: Known bad.

Malicious Activity Summary

upx azorult netwire botnet infostealer rat stealer trojan

Netwire

NetWire RAT payload

Azorult

Loads dropped DLL

UPX packed file

Executes dropped EXE

Checks computer location settings

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Program crash

Suspicious behavior: EnumeratesProcesses

NTFS ADS

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-19 19:18

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-19 19:18

Reported

2024-03-19 19:20

Platform

win7-20240221-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe"

Signatures

Azorult

trojan infostealer azorult

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2892 set thread context of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 set thread context of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\File.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2872 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 2872 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 2872 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 2872 wrote to memory of 2976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2976 wrote to memory of 2892 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2052 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2892 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2052 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2052 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2052 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2748 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\svhost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2748 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\svhost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2748 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\svhost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2748 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\svhost.exe C:\Windows\SysWOW64\WerFault.exe
PID 2892 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2052 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2764 wrote to memory of 1932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2764 wrote to memory of 1932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2764 wrote to memory of 1932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2764 wrote to memory of 1932 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2052 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2052 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2052 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2052 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe

"C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c test.exe

C:\Users\Admin\AppData\Local\Temp\test.exe

test.exe

C:\Users\Admin\AppData\Local\Temp\File.exe

"C:\Users\Admin\AppData\Local\Temp\File.exe"

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Users\Admin\AppData\Roaming\tmp.exe

"C:\Users\Admin\AppData\Roaming\tmp.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 140

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

Network

Country Destination Domain Proto
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp

Files

memory/2872-1-0x0000000000400000-0x0000000000B9D000-memory.dmp

\Users\Admin\AppData\Local\Temp\test.exe

MD5 836cda1d8a9718485cc9f9653530c2d9
SHA1 fca85ff9aa624547d9a315962d82388c300edac1
SHA256 d3793a581da66ef5840648574ce364846e7c68a559c0f5e49faf9e4892ecdc72
SHA512 07ca078d79f622706d08a534f6b5e2c896152fb0d0e452781fa6be5dc90028fdf074b3b78acac438f2acf5b3f5522e70afb7db4551874a3083860213e2790481

memory/2892-5-0x0000000000EF0000-0x0000000000FDE000-memory.dmp

memory/2892-6-0x0000000074560000-0x0000000074C4E000-memory.dmp

memory/2892-7-0x0000000004A20000-0x0000000004A60000-memory.dmp

memory/2892-8-0x00000000048C0000-0x0000000004946000-memory.dmp

\Users\Admin\AppData\Local\Temp\File.exe

MD5 37c82e15058e2f8f5e9525b956e6440d
SHA1 3bf20d00bd7a7943c4066d534f5b276cac5ae39f
SHA256 80c4716318f874881151c78c4dce9a0a01be4294834f33ee7f12a8a34bb8b2b7
SHA512 5c9c37a13cac634771ae18736845b8e7c1a33fd8c6c9ae564f6863b5033a68565f0fd3da555d15870bbc547cc549153c096c44f2d7ced828baffdcfa8641da0a

memory/2052-16-0x0000000000830000-0x000000000088C000-memory.dmp

memory/2052-17-0x0000000074560000-0x0000000074C4E000-memory.dmp

memory/2052-18-0x0000000001ED0000-0x0000000001F10000-memory.dmp

memory/2052-19-0x0000000000360000-0x0000000000384000-memory.dmp

\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 9af17c8393f0970ee5136bd3ffa27001
SHA1 4b285b72c1a11285a25f31f2597e090da6bbc049
SHA256 71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512 b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

memory/2748-24-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-25-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-28-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-26-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-30-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-32-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-37-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-36-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2748-34-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2748-40-0x0000000000400000-0x0000000000433000-memory.dmp

\Users\Admin\AppData\Roaming\tmp.exe

MD5 bae2b04e1160950e570661f55d7cd6f8
SHA1 f4abc073a091292547dda85d0ba044cab231c8da
SHA256 ab0744c19af062c698e94e8eb9ee0e67bcf9a078f53d2a6a848406e2413c4d59
SHA512 1bfef1217a6e2ecacee407eed70df9205cbfabb4ddfe06fcc11a7ddf2b42262ec3ab61421474b56b338fa76ffea9beac73530650d39eff61dffcfc25a7fe45b6

memory/2768-64-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-66-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-63-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-62-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-61-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-60-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-69-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2768-71-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk

MD5 6909e227d920cb6e6715207ea7bb8175
SHA1 12a4affb581b9b69a8f137c492296c140d81b3bf
SHA256 249e30c2cd5c76fb3ba98594fad0fc2ca0734c119cb0cea75c8fbb7abf82934a
SHA512 9743f08bc8b86bc90b0f90e2eec560324ab5e55e24c6ffc78c1e4c1df7adb206fd9a606e8989a6c688075029f75dc17a6ae1d8a413e13818fa7dc0bcdc750d24

memory/2492-82-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2872-83-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/2892-84-0x0000000074560000-0x0000000074C4E000-memory.dmp

memory/2892-85-0x0000000074560000-0x0000000074C4E000-memory.dmp

memory/2872-86-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/2052-87-0x0000000074560000-0x0000000074C4E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-19 19:18

Reported

2024-03-19 19:20

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe"

Signatures

Azorult

trojan infostealer azorult

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\test.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\File.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1468 set thread context of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 set thread context of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\File.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4468 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 4468 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 4468 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 4976 wrote to memory of 1468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 4976 wrote to memory of 1468 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1468 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 1468 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 1468 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 1916 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5088 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 1912 wrote to memory of 5088 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 1912 wrote to memory of 5088 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 1468 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1912 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1468 wrote to memory of 5024 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 5024 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 5024 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 5024 wrote to memory of 4756 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 5024 wrote to memory of 4756 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 5024 wrote to memory of 4756 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1912 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1468 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 3972 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 3972 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 3972 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 3972 wrote to memory of 1976 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3972 wrote to memory of 1976 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3972 wrote to memory of 1976 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1912 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1912 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe

"C:\Users\Admin\AppData\Local\Temp\d6e9c9f3ee88f7da4a817a6303e50762.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c test.exe

C:\Users\Admin\AppData\Local\Temp\test.exe

test.exe

C:\Users\Admin\AppData\Local\Temp\File.exe

"C:\Users\Admin\AppData\Local\Temp\File.exe"

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Users\Admin\AppData\Roaming\tmp.exe

"C:\Users\Admin\AppData\Roaming\tmp.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

Network

Country Destination Domain Proto
US 8.8.8.8:53 82.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 201.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 174.127.99.159:7882 tcp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 195.177.78.104.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 178.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 51.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 174.127.99.159:7882 tcp
US 8.8.8.8:53 206.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 139.179.17.96.in-addr.arpa udp
GB 96.17.178.201:80 tcp

Files

memory/4468-0-0x0000000000400000-0x0000000000B9D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\test.exe

MD5 836cda1d8a9718485cc9f9653530c2d9
SHA1 fca85ff9aa624547d9a315962d82388c300edac1
SHA256 d3793a581da66ef5840648574ce364846e7c68a559c0f5e49faf9e4892ecdc72
SHA512 07ca078d79f622706d08a534f6b5e2c896152fb0d0e452781fa6be5dc90028fdf074b3b78acac438f2acf5b3f5522e70afb7db4551874a3083860213e2790481

memory/1468-6-0x00000000743D0000-0x0000000074B80000-memory.dmp

memory/1468-5-0x0000000000CA0000-0x0000000000D8E000-memory.dmp

memory/1468-7-0x00000000057B0000-0x000000000584C000-memory.dmp

memory/1468-8-0x0000000005760000-0x0000000005770000-memory.dmp

memory/1468-9-0x0000000005850000-0x00000000058D6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\File.exe

MD5 37c82e15058e2f8f5e9525b956e6440d
SHA1 3bf20d00bd7a7943c4066d534f5b276cac5ae39f
SHA256 80c4716318f874881151c78c4dce9a0a01be4294834f33ee7f12a8a34bb8b2b7
SHA512 5c9c37a13cac634771ae18736845b8e7c1a33fd8c6c9ae564f6863b5033a68565f0fd3da555d15870bbc547cc549153c096c44f2d7ced828baffdcfa8641da0a

memory/1912-22-0x00000000743D0000-0x0000000074B80000-memory.dmp

memory/1912-21-0x0000000000BB0000-0x0000000000C0C000-memory.dmp

memory/1912-24-0x0000000005430000-0x0000000005454000-memory.dmp

memory/1912-23-0x00000000056D0000-0x00000000056E0000-memory.dmp

memory/1916-27-0x0000000000400000-0x0000000000433000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 8fdf47e0ff70c40ed3a17014aeea4232
SHA1 e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256 ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512 bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

memory/1916-30-0x0000000000400000-0x0000000000433000-memory.dmp

memory/1916-31-0x0000000000400000-0x0000000000433000-memory.dmp

C:\Users\Admin\AppData\Roaming\tmp.exe

MD5 bae2b04e1160950e570661f55d7cd6f8
SHA1 f4abc073a091292547dda85d0ba044cab231c8da
SHA256 ab0744c19af062c698e94e8eb9ee0e67bcf9a078f53d2a6a848406e2413c4d59
SHA512 1bfef1217a6e2ecacee407eed70df9205cbfabb4ddfe06fcc11a7ddf2b42262ec3ab61421474b56b338fa76ffea9beac73530650d39eff61dffcfc25a7fe45b6

memory/5040-41-0x0000000000400000-0x0000000000420000-memory.dmp

memory/5040-46-0x0000000000400000-0x0000000000420000-memory.dmp

memory/5040-47-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe

MD5 b546cc5a3ff4295e6dbd21996d282d31
SHA1 40e5a2ef021516ff1cdcb881bfea70f49c796bf2
SHA256 4d3c47204250d6210145ca4a8d610e435cb0eedb90d436d1572aab8ac7648045
SHA512 a989ff9fad6dab63127c5aefb65d074981d8c7f98bc28a7789f976c9f0c4669958d870a62222d857d78886f5c53a848f5cc3c73c5ab82117f3cc13caf5d49644

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier

MD5 130a75a932a2fe57bfea6a65b88da8f6
SHA1 b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c
SHA256 f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e
SHA512 6cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk

MD5 1b76d4846010a110df0eae2ce178ba6c
SHA1 0aafaa58af3e31fe18b71e1a7843b5afe1980372
SHA256 282945ac0fbf89640df004a64dc47faa4a5017595914ca96aae369bfb3901583
SHA512 100563603c39c99746ab8491fdc3d07138ef9ded3b00d0f34af885a91badda6a08d59df9a7ab494675c73b5192ce97bc2e08b717e91a20992fae16456147a2f1

memory/5088-58-0x0000000000400000-0x0000000000420000-memory.dmp

memory/4468-59-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/1468-60-0x00000000743D0000-0x0000000074B80000-memory.dmp

memory/1468-61-0x0000000005760000-0x0000000005770000-memory.dmp

memory/1468-63-0x00000000743D0000-0x0000000074B80000-memory.dmp

memory/4468-64-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/1912-66-0x00000000743D0000-0x0000000074B80000-memory.dmp