Malware Analysis Report

2024-10-19 06:58

Sample ID 240326-nphrvshb39
Target df0fb789d8099c9c9756f2723b165871
SHA256 2d99c983f587910d35aa83bd136d29afea18ad09a0e3af222811918be7747103
Tags
azorult netwire botnet infostealer rat stealer trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2d99c983f587910d35aa83bd136d29afea18ad09a0e3af222811918be7747103

Threat Level: Known bad

The file df0fb789d8099c9c9756f2723b165871 was found to be: Known bad.

Malicious Activity Summary

azorult netwire botnet infostealer rat stealer trojan upx

Netwire

Azorult

NetWire RAT payload

UPX packed file

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

NTFS ADS

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-26 11:34

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-26 11:34

Reported

2024-03-26 11:36

Platform

win7-20240319-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe"

Signatures

Azorult

trojan infostealer azorult

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2320 set thread context of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 set thread context of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\File.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1932 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 1932 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 1932 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 1932 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1876 wrote to memory of 2320 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2492 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2492 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2492 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2492 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2320 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 676 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2320 wrote to memory of 2460 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 2460 wrote to memory of 1320 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2460 wrote to memory of 1320 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2460 wrote to memory of 1320 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2460 wrote to memory of 1320 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2492 wrote to memory of 876 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 876 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 876 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2492 wrote to memory of 876 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe

"C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c test.exe

C:\Users\Admin\AppData\Local\Temp\test.exe

test.exe

C:\Users\Admin\AppData\Local\Temp\File.exe

"C:\Users\Admin\AppData\Local\Temp\File.exe"

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Users\Admin\AppData\Roaming\tmp.exe

"C:\Users\Admin\AppData\Roaming\tmp.exe"

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

Network

Country Destination Domain Proto
US 174.127.99.159:7882 tcp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 174.127.99.159:7882 tcp

Files

memory/1932-1-0x0000000000400000-0x0000000000B9D000-memory.dmp

\Users\Admin\AppData\Local\Temp\test.exe

MD5 836cda1d8a9718485cc9f9653530c2d9
SHA1 fca85ff9aa624547d9a315962d82388c300edac1
SHA256 d3793a581da66ef5840648574ce364846e7c68a559c0f5e49faf9e4892ecdc72
SHA512 07ca078d79f622706d08a534f6b5e2c896152fb0d0e452781fa6be5dc90028fdf074b3b78acac438f2acf5b3f5522e70afb7db4551874a3083860213e2790481

memory/2320-5-0x0000000001330000-0x000000000141E000-memory.dmp

memory/2320-6-0x0000000073EB0000-0x000000007459E000-memory.dmp

memory/2320-7-0x0000000004C40000-0x0000000004C80000-memory.dmp

memory/2320-8-0x0000000001250000-0x00000000012D6000-memory.dmp

\Users\Admin\AppData\Local\Temp\File.exe

MD5 37c82e15058e2f8f5e9525b956e6440d
SHA1 3bf20d00bd7a7943c4066d534f5b276cac5ae39f
SHA256 80c4716318f874881151c78c4dce9a0a01be4294834f33ee7f12a8a34bb8b2b7
SHA512 5c9c37a13cac634771ae18736845b8e7c1a33fd8c6c9ae564f6863b5033a68565f0fd3da555d15870bbc547cc549153c096c44f2d7ced828baffdcfa8641da0a

memory/2492-16-0x0000000000C60000-0x0000000000CBC000-memory.dmp

memory/2492-17-0x0000000073EB0000-0x000000007459E000-memory.dmp

memory/2492-18-0x0000000002150000-0x0000000002190000-memory.dmp

memory/2492-19-0x0000000000540000-0x0000000000564000-memory.dmp

memory/1932-21-0x0000000000400000-0x0000000000B9D000-memory.dmp

\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 9af17c8393f0970ee5136bd3ffa27001
SHA1 4b285b72c1a11285a25f31f2597e090da6bbc049
SHA256 71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512 b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

memory/2664-25-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-27-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-30-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-29-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-32-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-31-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-35-0x0000000000400000-0x0000000000433000-memory.dmp

\Users\Admin\AppData\Roaming\tmp.exe

MD5 bae2b04e1160950e570661f55d7cd6f8
SHA1 f4abc073a091292547dda85d0ba044cab231c8da
SHA256 ab0744c19af062c698e94e8eb9ee0e67bcf9a078f53d2a6a848406e2413c4d59
SHA512 1bfef1217a6e2ecacee407eed70df9205cbfabb4ddfe06fcc11a7ddf2b42262ec3ab61421474b56b338fa76ffea9beac73530650d39eff61dffcfc25a7fe45b6

memory/2664-45-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2664-47-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2664-50-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2508-52-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2508-54-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2664-55-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2508-57-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2508-61-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2508-64-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2508-59-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2508-67-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2508-68-0x0000000000401000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk

MD5 d052a7b04b73f8f8487c13e8b6bd6033
SHA1 815e659d5edce224bdde53dd770abf4f282b8889
SHA256 366143eac3de51862a2dc682ad1dfb96ae0a549645db953fe87318882b3a0cbe
SHA512 3f54bd061ec860621c8a66e9a28e0d18e40dba234ae6a8d962c63f7d50cb8454f2a87365c2a82fee3f44c4a09d79645f3187034f36df73d502cbf61a54d3c43b

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2556-83-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2320-84-0x0000000073EB0000-0x000000007459E000-memory.dmp

memory/2320-85-0x0000000004C40000-0x0000000004C80000-memory.dmp

memory/2492-87-0x0000000073EB0000-0x000000007459E000-memory.dmp

memory/2320-88-0x0000000073EB0000-0x000000007459E000-memory.dmp

memory/2492-89-0x0000000073EB0000-0x000000007459E000-memory.dmp

memory/1932-90-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/2664-91-0x0000000000400000-0x0000000000433000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-26 11:34

Reported

2024-03-26 11:36

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe"

Signatures

Azorult

trojan infostealer azorult

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\test.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\File.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1096 set thread context of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 set thread context of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\test.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\File.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5020 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 5020 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 5020 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe C:\Windows\SysWOW64\cmd.exe
PID 2916 wrote to memory of 1096 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2916 wrote to memory of 1096 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 2916 wrote to memory of 1096 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\test.exe
PID 1096 wrote to memory of 1456 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 1096 wrote to memory of 1456 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 1096 wrote to memory of 1456 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\File.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1096 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1096 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1096 wrote to memory of 4448 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 1340 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 1456 wrote to memory of 1340 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 1456 wrote to memory of 1340 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Roaming\tmp.exe
PID 1096 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1096 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1096 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1456 wrote to memory of 4880 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2952 wrote to memory of 4504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2952 wrote to memory of 4504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2952 wrote to memory of 4504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1096 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1096 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1096 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\test.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 2332 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 2332 wrote to memory of 3708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2332 wrote to memory of 3708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2332 wrote to memory of 3708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1456 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe
PID 1456 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\File.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe

"C:\Users\Admin\AppData\Local\Temp\df0fb789d8099c9c9756f2723b165871.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c test.exe

C:\Users\Admin\AppData\Local\Temp\test.exe

test.exe

C:\Users\Admin\AppData\Local\Temp\File.exe

"C:\Users\Admin\AppData\Local\Temp\File.exe"

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y

C:\Users\Admin\AppData\Roaming\tmp.exe

"C:\Users\Admin\AppData\Roaming\tmp.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 35.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 174.127.99.159:7882 tcp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 8.8.8.8:53 gemateknindoperkasa.co.id udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 174.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 211.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 210.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 174.127.99.159:7882 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 178.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
N/A 88.221.134.56:80 tcp

Files

memory/5020-0-0x0000000000400000-0x0000000000B9D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\test.exe

MD5 836cda1d8a9718485cc9f9653530c2d9
SHA1 fca85ff9aa624547d9a315962d82388c300edac1
SHA256 d3793a581da66ef5840648574ce364846e7c68a559c0f5e49faf9e4892ecdc72
SHA512 07ca078d79f622706d08a534f6b5e2c896152fb0d0e452781fa6be5dc90028fdf074b3b78acac438f2acf5b3f5522e70afb7db4551874a3083860213e2790481

memory/1096-5-0x0000000000110000-0x00000000001FE000-memory.dmp

memory/1096-6-0x0000000074880000-0x0000000075030000-memory.dmp

memory/1096-7-0x0000000004A70000-0x0000000004B0C000-memory.dmp

memory/1096-8-0x00000000022E0000-0x00000000022F0000-memory.dmp

memory/1096-9-0x0000000004B30000-0x0000000004BB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\File.exe

MD5 37c82e15058e2f8f5e9525b956e6440d
SHA1 3bf20d00bd7a7943c4066d534f5b276cac5ae39f
SHA256 80c4716318f874881151c78c4dce9a0a01be4294834f33ee7f12a8a34bb8b2b7
SHA512 5c9c37a13cac634771ae18736845b8e7c1a33fd8c6c9ae564f6863b5033a68565f0fd3da555d15870bbc547cc549153c096c44f2d7ced828baffdcfa8641da0a

memory/1456-21-0x0000000074880000-0x0000000075030000-memory.dmp

memory/1456-22-0x00000000002F0000-0x000000000034C000-memory.dmp

memory/1456-24-0x0000000002610000-0x0000000002634000-memory.dmp

memory/1456-23-0x0000000004D60000-0x0000000004D70000-memory.dmp

memory/2544-27-0x0000000000400000-0x0000000000433000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 8fdf47e0ff70c40ed3a17014aeea4232
SHA1 e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256 ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512 bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

memory/2544-30-0x0000000000400000-0x0000000000433000-memory.dmp

memory/2544-31-0x0000000000400000-0x0000000000433000-memory.dmp

C:\Users\Admin\AppData\Roaming\tmp.exe

MD5 bae2b04e1160950e570661f55d7cd6f8
SHA1 f4abc073a091292547dda85d0ba044cab231c8da
SHA256 ab0744c19af062c698e94e8eb9ee0e67bcf9a078f53d2a6a848406e2413c4d59
SHA512 1bfef1217a6e2ecacee407eed70df9205cbfabb4ddfe06fcc11a7ddf2b42262ec3ab61421474b56b338fa76ffea9beac73530650d39eff61dffcfc25a7fe45b6

memory/4880-43-0x0000000000400000-0x0000000000420000-memory.dmp

memory/4880-46-0x0000000000400000-0x0000000000420000-memory.dmp

memory/4880-47-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk

MD5 2ad566b9140c800388a22076b90fcfb7
SHA1 e311f09277bf74b47221204c5056b6aaffb0add3
SHA256 cd8120ea8fa1fac7f7c26a306a6176fc5d3a78276413fd945439d16d06a3c31f
SHA512 d3063188d440f4fd769dc24174970a81c3407f0642d6f1bb729f41bb6399a66ffc627ceaf8bd979a6d7487c0aaa3559102e313d193a778e71aa494cfcb348750

memory/1340-58-0x0000000000400000-0x0000000000420000-memory.dmp

memory/5020-59-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/1096-60-0x0000000074880000-0x0000000075030000-memory.dmp

memory/1096-61-0x00000000022E0000-0x00000000022F0000-memory.dmp

memory/1096-63-0x0000000074880000-0x0000000075030000-memory.dmp

memory/5020-64-0x0000000000400000-0x0000000000B9D000-memory.dmp

memory/1456-66-0x0000000074880000-0x0000000075030000-memory.dmp

memory/4880-67-0x0000000000400000-0x0000000000420000-memory.dmp