Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe
Resource
win10v2004-20240226-en
General
-
Target
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe
-
Size
1.8MB
-
MD5
b6042f0984c283f28b8b78cece2a1c54
-
SHA1
867568b9bf1f2975516c88255386f3e1352a746d
-
SHA256
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a
-
SHA512
e97d24e60777bbb84b8fd8617c331904dfa115fb5c01e317a8ce861a6b79b253b21c8adc7dec68e6af57b2e86d8a64b173cd31d9d9694385de8c4514a61c8520
-
SSDEEP
49152:8huG/+Mn6MT7MNhe6lOiAt08q0Ur+djH:wuG/+o1aLxAtc+p
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
lumma
https://relevantvoicelesskw.shop/api
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4188-239-0x0000022E57C30000-0x0000022E5B502000-memory.dmp family_zgrat_v1 behavioral1/memory/4188-241-0x0000022E75E20000-0x0000022E75F2E000-memory.dmp family_zgrat_v1 behavioral1/memory/4188-245-0x0000022E75BD0000-0x0000022E75BF4000-memory.dmp family_zgrat_v1 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 79 3740 rundll32.exe 89 2368 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AFBKKFBAEG.exeexplorgu.exeISetup3.exeu1s4.1.exeu1s4.0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation AFBKKFBAEG.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation ISetup3.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation u1s4.1.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation u1s4.0.exe -
Executes dropped EXE 6 IoCs
Processes:
explorgu.exelummalg.exeISetup3.exeu1s4.0.exeu1s4.1.exeAFBKKFBAEG.exepid process 3000 explorgu.exe 2348 lummalg.exe 2308 ISetup3.exe 2176 u1s4.0.exe 4912 u1s4.1.exe 5024 AFBKKFBAEG.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Wine 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Wine explorgu.exe -
Loads dropped DLL 5 IoCs
Processes:
rundll32.exerundll32.exerundll32.exeu1s4.0.exepid process 1360 rundll32.exe 3740 rundll32.exe 2368 rundll32.exe 2176 u1s4.0.exe 2176 u1s4.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AFBKKFBAEG.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\AFBKKFBAEG.exe" AFBKKFBAEG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exeexplorgu.exepid process 3320 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe 3000 explorgu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lummalg.exedescription pid process target process PID 2348 set thread context of 4072 2348 lummalg.exe RegAsm.exe -
Drops file in Windows directory 1 IoCs
Processes:
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 364 4072 WerFault.exe RegAsm.exe 4056 2308 WerFault.exe ISetup3.exe 2024 2176 WerFault.exe u1s4.0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u1s4.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1s4.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1s4.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1s4.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1s4.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1s4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1s4.0.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exeexplorgu.exeu1s4.0.exerundll32.exepowershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeAFBKKFBAEG.exepid process 3320 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe 3320 285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe 3000 explorgu.exe 3000 explorgu.exe 2176 u1s4.0.exe 2176 u1s4.0.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 3740 rundll32.exe 1776 powershell.exe 1776 powershell.exe 1776 powershell.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2176 u1s4.0.exe 2176 u1s4.0.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe 5024 AFBKKFBAEG.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeAFBKKFBAEG.exedescription pid process Token: SeDebugPrivilege 1776 powershell.exe Token: SeDebugPrivilege 4188 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 5024 AFBKKFBAEG.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
u1s4.1.exepid process 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u1s4.1.exepid process 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe 4912 u1s4.1.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
explorgu.exelummalg.exeISetup3.exerundll32.exerundll32.exeu1s4.1.exeu1s4.0.execmd.exeAFBKKFBAEG.execmd.exedescription pid process target process PID 3000 wrote to memory of 2348 3000 explorgu.exe lummalg.exe PID 3000 wrote to memory of 2348 3000 explorgu.exe lummalg.exe PID 3000 wrote to memory of 2348 3000 explorgu.exe lummalg.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 2348 wrote to memory of 4072 2348 lummalg.exe RegAsm.exe PID 3000 wrote to memory of 2308 3000 explorgu.exe ISetup3.exe PID 3000 wrote to memory of 2308 3000 explorgu.exe ISetup3.exe PID 3000 wrote to memory of 2308 3000 explorgu.exe ISetup3.exe PID 2308 wrote to memory of 2176 2308 ISetup3.exe u1s4.0.exe PID 2308 wrote to memory of 2176 2308 ISetup3.exe u1s4.0.exe PID 2308 wrote to memory of 2176 2308 ISetup3.exe u1s4.0.exe PID 2308 wrote to memory of 4912 2308 ISetup3.exe u1s4.1.exe PID 2308 wrote to memory of 4912 2308 ISetup3.exe u1s4.1.exe PID 2308 wrote to memory of 4912 2308 ISetup3.exe u1s4.1.exe PID 3000 wrote to memory of 1360 3000 explorgu.exe rundll32.exe PID 3000 wrote to memory of 1360 3000 explorgu.exe rundll32.exe PID 3000 wrote to memory of 1360 3000 explorgu.exe rundll32.exe PID 1360 wrote to memory of 3740 1360 rundll32.exe rundll32.exe PID 1360 wrote to memory of 3740 1360 rundll32.exe rundll32.exe PID 3740 wrote to memory of 4312 3740 rundll32.exe netsh.exe PID 3740 wrote to memory of 4312 3740 rundll32.exe netsh.exe PID 3740 wrote to memory of 1776 3740 rundll32.exe powershell.exe PID 3740 wrote to memory of 1776 3740 rundll32.exe powershell.exe PID 4912 wrote to memory of 4188 4912 u1s4.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 4912 wrote to memory of 4188 4912 u1s4.1.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe PID 3000 wrote to memory of 2368 3000 explorgu.exe rundll32.exe PID 3000 wrote to memory of 2368 3000 explorgu.exe rundll32.exe PID 3000 wrote to memory of 2368 3000 explorgu.exe rundll32.exe PID 2176 wrote to memory of 1396 2176 u1s4.0.exe cmd.exe PID 2176 wrote to memory of 1396 2176 u1s4.0.exe cmd.exe PID 2176 wrote to memory of 1396 2176 u1s4.0.exe cmd.exe PID 1396 wrote to memory of 5024 1396 cmd.exe AFBKKFBAEG.exe PID 1396 wrote to memory of 5024 1396 cmd.exe AFBKKFBAEG.exe PID 1396 wrote to memory of 5024 1396 cmd.exe AFBKKFBAEG.exe PID 5024 wrote to memory of 1232 5024 AFBKKFBAEG.exe cmd.exe PID 5024 wrote to memory of 1232 5024 AFBKKFBAEG.exe cmd.exe PID 5024 wrote to memory of 1232 5024 AFBKKFBAEG.exe cmd.exe PID 1232 wrote to memory of 4852 1232 cmd.exe PING.EXE PID 1232 wrote to memory of 4852 1232 cmd.exe PING.EXE PID 1232 wrote to memory of 4852 1232 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe"C:\Users\Admin\AppData\Local\Temp\285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 12644⤵
- Program crash
PID:364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe"C:\Users\Admin\AppData\Local\Temp\1001010001\ISetup3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\u1s4.0.exe"C:\Users\Admin\AppData\Local\Temp\u1s4.0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AFBKKFBAEG.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\AFBKKFBAEG.exe"C:\Users\Admin\AppData\Local\Temp\AFBKKFBAEG.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AFBKKFBAEG.exe6⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:4852
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 24524⤵
- Program crash
PID:2024
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1s4.1.exe"C:\Users\Admin\AppData\Local\Temp\u1s4.1.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 16123⤵
- Program crash
PID:4056
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\999976163400_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4072 -ip 40721⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2308 -ip 23081⤵PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2176 -ip 21761⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.8MB
MD5b6042f0984c283f28b8b78cece2a1c54
SHA1867568b9bf1f2975516c88255386f3e1352a746d
SHA256285601c9d8ba5030cb23a22f0f78ead412ce73b55ed978137a8f66015ea6278a
SHA512e97d24e60777bbb84b8fd8617c331904dfa115fb5c01e317a8ce861a6b79b253b21c8adc7dec68e6af57b2e86d8a64b173cd31d9d9694385de8c4514a61c8520
-
Filesize
350KB
MD504df085b57814d1a1accead4e153909e
SHA16d277da314ef185ba9072a9b677b599b1f46c35b
SHA25691a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd
SHA512f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa
-
Filesize
299KB
MD5a2b161448fadc60d1be2f5e2e1e50851
SHA146703a8785f0685266cbd971440cee3240dcbb30
SHA2562e66f1f05115b2b8d308a3273a38c5ee289d9ebb284fe20609c34c3e1c4d8f62
SHA512e303435418b9e147f9ca03fdf8680e24933ade7ab4ee5c17c7af816be01c402c3856709698dc35904e0a1fcbf738e166190e289f3da0719c0487c7ebcd02af82
-
Filesize
85KB
MD511a6fbce3e9242fcbc0bc75564ff4efc
SHA1c757fe159a80b43bc8f7a29654fb06bcd201ed2c
SHA2565794b9ce85d60509b64e94e07970dcd8fd0100b2d0c5c3a24e4942a6fd0b04b1
SHA512be8b6925460374caac3e92fe2633ca041cdfa47568e5878bd80855392d2396cd67a2a9c2e674c84b51c17ec5d7ce306f1c17835e5eb4f1f6b113a3e0dd13e8ee
-
Filesize
25KB
MD5bfa68a66095e8b33d0e90e964d9b3a99
SHA137ab809f1a184fe223cb7df74f4b23d23d0095ca
SHA2565c0c146be2cecd9cc3f86e4581076ae6c3edb0125ec6f127884e2112baea9031
SHA512f6ae6a29dcb3c2c7004fc2c6a3f2d965f8a0f863ac1913765a721f77383f954bcc23bf945f77ccdd498beed189d6420c829a03df6ed7b493c08bc2b9f92c5d82
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5aeb028b3fa826a5182af7aeec73f3cc7
SHA1c69055ed3ad17edfc0164f201ab8021d92e2599d
SHA256ea18218f4138ec0388c17b2ac8445cffd366124de77a75dda0027f3a4dde7027
SHA51261d6047b301b66863a86ea02f10956c3f6db6009a9fdbb175b3611a83606370786e1095375a98e60bc0b81f4971d64ca7116e32791e675c31484911392e8867d
-
Filesize
261KB
MD5369bcf5627230da1e49844148acf3fe1
SHA1929b7947ca9e37b4b7f9e8c881ac31f86a6d29e3
SHA256347ea599612fa73c1ad9b66eb576f6e74d4435bd1bdc4488f6d93e7564e3e1f4
SHA5123274e4d9482b58eef43058ce6355db3b74f038f8af08bed04b0e86b5f5eb56ffbbe84c7b6cd4e0357d306069e30bc86de558f4e559c32a8a0bb9c8f040bbb490
-
Filesize
240KB
MD5ef80c08ab326ed351d465e4e6ae9c3bf
SHA184d16018c2fee326d1599c5e8860f97af0267564
SHA25628cf98ce9806dafc20138b9ee6b75e88c782a36ed57af763e6a382646e3552c5
SHA51254e8dceefc81e4808143e90d21464f748251659e37c14492f0f99c20bbdf4a3a5165c4ef1774c476f8727ad88ca320f49110162cdc691e6c7009cef366fd3613
-
Filesize
2.6MB
MD50677f4c375a19ad442abab9133039c90
SHA1a6a1548c9349b63a6cdb39e2be3d3b0ef6f96042
SHA2561696811c588552f090fdeeeb0efb3b55bed77a29347a2c4177f70de1095e32d6
SHA512940da7cf772e62526a9188f19c2a3ed471d3a93084f2b26af51bbd75e32327d3c4d5009b864ed7c593126796da1ab66523c84b022e6e3073bb18093f27dc4d72
-
Filesize
2.9MB
MD568f9bc9923b79152210656edef39d178
SHA1c2fcdb51d47df3ac6e5c70d2ac719b57117d177c
SHA256de86b9b1343ef20ed842fb2c6ad1665510060fca405bac40db3ee8962c3ec1f5
SHA512483642f8dbef00ef0c81308f7725c8065517876a9486a4be8cfe233071116c197ffd3b220e254e65008ab51f5aefd93356f712e0e2083bce41999c6cb597642c
-
Filesize
2.1MB
MD52a9f0ded21b6dc8e4f2638160d2b9a4a
SHA1a2a31b48ee56644f9acf10be07f378eaa4836f8a
SHA256856f54fd2c9f9215ac4d8ed3362f780b0eada47fc0e03023469ac6dedcb2a578
SHA512b1c3e47efa2b7ebda33317489a32668d82ea36660075d9448d04e46b873f15168ab148791b01adeee73768d70717766dca136242a8876d283f8176da06031744
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117