Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 22:35

General

  • Target

    71da2b68e73b0aa53f731cf9465bff04c64649d0e6bf346070df115adb1e3ddf.exe

  • Size

    1.8MB

  • MD5

    cbc7c6a1aa60ff6b8f67a39af4064455

  • SHA1

    f81391ceb2d1dc02f695f90f67ecfe2fe4909c9b

  • SHA256

    71da2b68e73b0aa53f731cf9465bff04c64649d0e6bf346070df115adb1e3ddf

  • SHA512

    55d3204c746fe89860a0e65ab55cb11bb5703ce964468fcf19183b1817e4c26b43883de7c37dc0ccd6191ef4a9ed717fb2bdcf64f4f9d65b808051b2664edd80

  • SSDEEP

    49152:suOQ3oQk+8IG7WC3gP6hx12VSFFFrMajeHUs:sfQk+8ImtZZFtV

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

lumma

C2

https://enthusiasimtitleow.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 30 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71da2b68e73b0aa53f731cf9465bff04c64649d0e6bf346070df115adb1e3ddf.exe
    "C:\Users\Admin\AppData\Local\Temp\71da2b68e73b0aa53f731cf9465bff04c64649d0e6bf346070df115adb1e3ddf.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3236
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:3876
    • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
      "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:3060
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4356
          • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
            "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1364
          • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
            "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2804
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
            4⤵
              PID:232
              • C:\Windows\SysWOW64\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:3420
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4812
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
              3⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4436
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                4⤵
                  PID:3700
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\999976163400_Desktop.zip' -CompressionLevel Optimal
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3796
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
              2⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              PID:2188
            • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
              "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
              2⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1772
              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:4352
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                  4⤵
                  • Loads dropped DLL
                  PID:3544
                  • C:\Windows\system32\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                    5⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4992
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profiles
                      6⤵
                        PID:3288
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\999976163400_Desktop.zip' -CompressionLevel Optimal
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1716
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                    4⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    PID:4244
              • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4540
              • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3008
              • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
                "C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4276
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3236
              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"
                2⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3956
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F
                  3⤵
                  • Creates scheduled task(s)
                  PID:3620
              • C:\Users\Admin\AppData\Local\Temp\1001063001\Jsholum.exe
                "C:\Users\Admin\AppData\Local\Temp\1001063001\Jsholum.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3660
              • C:\Users\Admin\AppData\Local\Temp\1001065001\koooooo.exe
                "C:\Users\Admin\AppData\Local\Temp\1001065001\koooooo.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4016
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2856
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 884
                  3⤵
                  • Program crash
                  PID:2152
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4016 -ip 4016
              1⤵
                PID:2424
              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                1⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:3100
              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                1⤵
                • Executes dropped EXE
                PID:4276

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Virtualization/Sandbox Evasion

              2
              T1497

              Modify Registry

              2
              T1112

              Subvert Trust Controls

              1
              T1553

              Install Root Certificate

              1
              T1553.004

              Credential Access

              Unsecured Credentials

              5
              T1552

              Credentials In Files

              4
              T1552.001

              Credentials in Registry

              1
              T1552.002

              Discovery

              Query Registry

              5
              T1012

              Virtualization/Sandbox Evasion

              2
              T1497

              System Information Discovery

              3
              T1082

              Collection

              Data from Local System

              5
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                Filesize

                3KB

                MD5

                fe3aab3ae544a134b68e881b82b70169

                SHA1

                926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                SHA256

                bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                SHA512

                3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                1KB

                MD5

                ff0c4d1d716cd693c25e0f06318a365e

                SHA1

                a70b0e67b39ba3e0cbbbf5ae35b9164dea01f74b

                SHA256

                1cdc4247161db2e6de9e2ec1af6ac8b975985a8c141a25afb68fcfc95e2a2fac

                SHA512

                97f0332af0bc06b966d2b13434b8afeb051c5f041300fcb43a5edff96b5c67d0969450d514ea8afd9707238a41d67db08e36d810c83d9992011780c8f3bd852a

              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                Filesize

                1.8MB

                MD5

                cbc7c6a1aa60ff6b8f67a39af4064455

                SHA1

                f81391ceb2d1dc02f695f90f67ecfe2fe4909c9b

                SHA256

                71da2b68e73b0aa53f731cf9465bff04c64649d0e6bf346070df115adb1e3ddf

                SHA512

                55d3204c746fe89860a0e65ab55cb11bb5703ce964468fcf19183b1817e4c26b43883de7c37dc0ccd6191ef4a9ed717fb2bdcf64f4f9d65b808051b2664edd80

              • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                Filesize

                3.0MB

                MD5

                a6a1ed73f0e8c7ab6a8bb49a5e17352b

                SHA1

                26112a8231646fe8b6cff139792584d33f1da603

                SHA256

                28e68514192fc37f428e9947075d5401dd0f1331ebb595f26cba5c1b6ea15983

                SHA512

                44fa4123386e20255798e1a32523c1401ce19dc07afdeba371ea497d7f297085403386fe8ad77975d859f149f840214910374e0272282d4f6b1fd89755ee5299

              • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                Filesize

                1.7MB

                MD5

                85a15f080b09acace350ab30460c8996

                SHA1

                3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                SHA256

                3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                SHA512

                ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

              • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
                Filesize

                1.8MB

                MD5

                5230998503613f5b3ac771f1097390d3

                SHA1

                4f38d1b460c3e9b9ecab48d73133ac80c6cae49d

                SHA256

                2383f24a2d223591d89cbd19d1eb4ac0c0632bd1276953a462d2d3956597b1c2

                SHA512

                8d82a93a76438997e0677b12f409972623e7e0d2e79bbcdc65cbf5352b6f7c7ba3fdd683e00b31e04effab524af76d38f6fdfe839ec68491efd1dc109ef284a2

              • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                Filesize

                301KB

                MD5

                832eb4dc3ed8ceb9a1735bd0c7acaf1b

                SHA1

                b622a406927fbb8f6cd5081bd4455fb831948fca

                SHA256

                2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

                SHA512

                3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

              • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                Filesize

                499KB

                MD5

                83d0b41c7a3a0d29a268b49a313c5de5

                SHA1

                46f3251c771b67b40b1f3268caef8046174909a5

                SHA256

                09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

                SHA512

                705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

              • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
                Filesize

                464KB

                MD5

                c084d6f6ba40534fbfc5a64b21ef99ab

                SHA1

                0b4a17da83c0a8abbc8fab321931d5447b32b720

                SHA256

                afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                SHA512

                a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                Filesize

                418KB

                MD5

                0099a99f5ffb3c3ae78af0084136fab3

                SHA1

                0205a065728a9ec1133e8a372b1e3864df776e8c

                SHA256

                919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                SHA512

                5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

              • C:\Users\Admin\AppData\Local\Temp\1001063001\Jsholum.exe
                Filesize

                2.4MB

                MD5

                93e590ddbf788288603f6e3732b08ab9

                SHA1

                6b6d66ecff1ca546f3a63d038cacf21d84ae5577

                SHA256

                01eee1eccb32c1a97ca03c8d5dde19c6ad6fa6a840d55ba9c88baa5aa57891d1

                SHA512

                a699c2514c75433170c2b3d85b7130500c2efc9123e01f4b749f6c599d7ae341573dd3326558f23a362586e0b7915f1072cb84378c1ddf968e87083aa0b45f81

              • C:\Users\Admin\AppData\Local\Temp\1001065001\koooooo.exe
                Filesize

                379KB

                MD5

                90f41880d631e243cec086557cb74d63

                SHA1

                cb385e4172cc227ba72baf29ca1c4411fa99a26d

                SHA256

                23b62a27e3f5c424b16f31e5009af4f24c8bd13b1f035f87879e2a29236be7a0

                SHA512

                eeb85b34aa66a7e9a1b1807012999ee439433df23126a52ffa8d4b3cb2026be3bcf63ca25f143de58ba929c0d4feeaf2a603fd6ec6b5379fc48147c22f3783e3

              • C:\Users\Admin\AppData\Local\Temp\1001066001\Akh.exe
                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • C:\Users\Admin\AppData\Local\Temp\Tmp2BA.tmp
                Filesize

                2KB

                MD5

                1420d30f964eac2c85b2ccfe968eebce

                SHA1

                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                SHA256

                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                SHA512

                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_flbhkadt.1fp.ps1
                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\tmp9C7E.tmp
                Filesize

                46KB

                MD5

                02d2c46697e3714e49f46b680b9a6b83

                SHA1

                84f98b56d49f01e9b6b76a4e21accf64fd319140

                SHA256

                522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                SHA512

                60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

              • C:\Users\Admin\AppData\Local\Temp\tmp9DC9.tmp
                Filesize

                48KB

                MD5

                349e6eb110e34a08924d92f6b334801d

                SHA1

                bdfb289daff51890cc71697b6322aa4b35ec9169

                SHA256

                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                SHA512

                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                109KB

                MD5

                2afdbe3b99a4736083066a13e4b5d11a

                SHA1

                4d4856cf02b3123ac16e63d4a448cdbcb1633546

                SHA256

                8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                SHA512

                d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                1.2MB

                MD5

                92fbdfccf6a63acef2743631d16652a7

                SHA1

                971968b1378dd89d59d7f84bf92f16fc68664506

                SHA256

                b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                SHA512

                b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                Filesize

                109KB

                MD5

                726cd06231883a159ec1ce28dd538699

                SHA1

                404897e6a133d255ad5a9c26ac6414d7134285a2

                SHA256

                12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                SHA512

                9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                Filesize

                1.2MB

                MD5

                15a42d3e4579da615a384c717ab2109b

                SHA1

                22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                SHA256

                3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                SHA512

                1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                Filesize

                541KB

                MD5

                1fc4b9014855e9238a361046cfbf6d66

                SHA1

                c17f18c8246026c9979ab595392a14fe65cc5e9f

                SHA256

                f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                SHA512

                2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                Filesize

                304KB

                MD5

                cc90e3326d7b20a33f8037b9aab238e4

                SHA1

                236d173a6ac462d85de4e866439634db3b9eeba3

                SHA256

                bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                SHA512

                b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

              • C:\Users\Admin\Desktop\Microsoft Edge.lnk
                Filesize

                2KB

                MD5

                a89afd1d806ca8e04963f57eba669bbf

                SHA1

                582cd7b4023792fd28683d324cd0a4da5b36ec41

                SHA256

                ce258941ea05a60e2de78b563e9bdf3180a5583ec80a2fb1eaca6dfd118fea78

                SHA512

                7eb8d8b60db12e60d307fe9ba8bb0f0575e5bdb52764fb526c05811f5af781a3f9a4a6c4d6252e797d224ee7d7b28558f95d3ec483e2883d4ba6613b4986a060

              • C:\Users\Public\Desktop\Google Chrome.lnk
                Filesize

                2KB

                MD5

                1c5590191afdd0de6b02c0d2a9d94aaf

                SHA1

                62c3206801a737dbc17b017a4a73531a04087d43

                SHA256

                0ccf290aec8595eac785eb2a3444e55410d2ed19856bdd9f41437ff09182aac8

                SHA512

                f316754df4e8dd8d7ea4aff490bc209de4b945db9faa1dd501c21f6db09c60e06095e12167286b8e83346eed32147971905bc9f935bae90d7b897a5e1ca77e73

              • memory/1364-149-0x000000001ED10000-0x000000001EE1A000-memory.dmp
                Filesize

                1.0MB

              • memory/1364-150-0x000000001B680000-0x000000001B692000-memory.dmp
                Filesize

                72KB

              • memory/1364-111-0x00007FF810CA0000-0x00007FF811761000-memory.dmp
                Filesize

                10.8MB

              • memory/1364-110-0x00000000008A0000-0x000000000092C000-memory.dmp
                Filesize

                560KB

              • memory/1364-176-0x000000001B660000-0x000000001B67E000-memory.dmp
                Filesize

                120KB

              • memory/1364-151-0x000000001CDC0000-0x000000001CDFC000-memory.dmp
                Filesize

                240KB

              • memory/1364-184-0x00007FF810CA0000-0x00007FF811761000-memory.dmp
                Filesize

                10.8MB

              • memory/1364-182-0x000000001FD70000-0x0000000020298000-memory.dmp
                Filesize

                5.2MB

              • memory/1364-181-0x000000001F670000-0x000000001F832000-memory.dmp
                Filesize

                1.8MB

              • memory/1364-170-0x000000001F120000-0x000000001F196000-memory.dmp
                Filesize

                472KB

              • memory/1772-260-0x0000000000B20000-0x0000000000FCB000-memory.dmp
                Filesize

                4.7MB

              • memory/2804-128-0x0000000005970000-0x00000000059E6000-memory.dmp
                Filesize

                472KB

              • memory/2804-129-0x00000000062D0000-0x00000000062EE000-memory.dmp
                Filesize

                120KB

              • memory/2804-103-0x0000000000430000-0x0000000000482000-memory.dmp
                Filesize

                328KB

              • memory/2804-102-0x00000000737F0000-0x0000000073FA0000-memory.dmp
                Filesize

                7.7MB

              • memory/2804-104-0x00000000052C0000-0x0000000005864000-memory.dmp
                Filesize

                5.6MB

              • memory/2804-105-0x0000000004DB0000-0x0000000004E42000-memory.dmp
                Filesize

                584KB

              • memory/2804-136-0x0000000006670000-0x00000000066BC000-memory.dmp
                Filesize

                304KB

              • memory/2804-109-0x0000000004D70000-0x0000000004D7A000-memory.dmp
                Filesize

                40KB

              • memory/2804-135-0x0000000006500000-0x000000000653C000-memory.dmp
                Filesize

                240KB

              • memory/2804-108-0x0000000004F80000-0x0000000004F90000-memory.dmp
                Filesize

                64KB

              • memory/2804-134-0x00000000064A0000-0x00000000064B2000-memory.dmp
                Filesize

                72KB

              • memory/2804-133-0x0000000006560000-0x000000000666A000-memory.dmp
                Filesize

                1.0MB

              • memory/2804-132-0x0000000006A10000-0x0000000007028000-memory.dmp
                Filesize

                6.1MB

              • memory/2804-178-0x00000000067B0000-0x0000000006816000-memory.dmp
                Filesize

                408KB

              • memory/3236-4-0x0000000004AD0000-0x0000000004AD1000-memory.dmp
                Filesize

                4KB

              • memory/3236-3-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
                Filesize

                4KB

              • memory/3236-2-0x00000000006B0000-0x0000000000B60000-memory.dmp
                Filesize

                4.7MB

              • memory/3236-0-0x00000000006B0000-0x0000000000B60000-memory.dmp
                Filesize

                4.7MB

              • memory/3236-1-0x0000000077E74000-0x0000000077E76000-memory.dmp
                Filesize

                8KB

              • memory/3236-5-0x0000000004AB0000-0x0000000004AB1000-memory.dmp
                Filesize

                4KB

              • memory/3236-6-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
                Filesize

                4KB

              • memory/3236-7-0x0000000004A90000-0x0000000004A91000-memory.dmp
                Filesize

                4KB

              • memory/3236-321-0x0000000000400000-0x0000000000450000-memory.dmp
                Filesize

                320KB

              • memory/3236-8-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
                Filesize

                4KB

              • memory/3236-9-0x0000000004B10000-0x0000000004B11000-memory.dmp
                Filesize

                4KB

              • memory/3236-14-0x00000000006B0000-0x0000000000B60000-memory.dmp
                Filesize

                4.7MB

              • memory/3660-479-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-419-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-421-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-417-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-424-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-415-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-427-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-430-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-432-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-405-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-434-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-436-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-438-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-440-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-403-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-442-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-402-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-444-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-455-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-467-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-471-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-473-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-476-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-481-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-483-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3660-485-0x00000000050E0000-0x000000000531B000-memory.dmp
                Filesize

                2.2MB

              • memory/3796-157-0x00000248EC5A0000-0x00000248EC5B0000-memory.dmp
                Filesize

                64KB

              • memory/3796-177-0x00007FF810CA0000-0x00007FF811761000-memory.dmp
                Filesize

                10.8MB

              • memory/3796-155-0x00007FF810CA0000-0x00007FF811761000-memory.dmp
                Filesize

                10.8MB

              • memory/3796-156-0x00000248EC5A0000-0x00000248EC5B0000-memory.dmp
                Filesize

                64KB

              • memory/3796-167-0x00000248ECF60000-0x00000248ECF82000-memory.dmp
                Filesize

                136KB

              • memory/3796-168-0x00000248ECFF0000-0x00000248ED002000-memory.dmp
                Filesize

                72KB

              • memory/3796-169-0x00000248ECFE0000-0x00000248ECFEA000-memory.dmp
                Filesize

                40KB

              • memory/3876-47-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/3876-153-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/3876-199-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/3876-456-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/3876-349-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/3876-48-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/3876-154-0x0000000000040000-0x00000000003F5000-memory.dmp
                Filesize

                3.7MB

              • memory/4276-70-0x0000000005350000-0x0000000005360000-memory.dmp
                Filesize

                64KB

              • memory/4276-68-0x00000000006E0000-0x000000000089C000-memory.dmp
                Filesize

                1.7MB

              • memory/4276-69-0x00000000737F0000-0x0000000073FA0000-memory.dmp
                Filesize

                7.7MB

              • memory/4276-78-0x00000000737F0000-0x0000000073FA0000-memory.dmp
                Filesize

                7.7MB

              • memory/4276-79-0x0000000002C90000-0x0000000004C90000-memory.dmp
                Filesize

                32.0MB

              • memory/4352-372-0x00000000002B0000-0x000000000075B000-memory.dmp
                Filesize

                4.7MB

              • memory/4356-82-0x00000000737F0000-0x0000000073FA0000-memory.dmp
                Filesize

                7.7MB

              • memory/4356-80-0x0000000005380000-0x0000000005390000-memory.dmp
                Filesize

                64KB

              • memory/4356-73-0x0000000000400000-0x0000000000592000-memory.dmp
                Filesize

                1.6MB

              • memory/4700-107-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-24-0x0000000005190000-0x0000000005191000-memory.dmp
                Filesize

                4KB

              • memory/4700-185-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-152-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-351-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-226-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-27-0x0000000005200000-0x0000000005201000-memory.dmp
                Filesize

                4KB

              • memory/4700-26-0x0000000005210000-0x0000000005211000-memory.dmp
                Filesize

                4KB

              • memory/4700-25-0x00000000051E0000-0x00000000051E1000-memory.dmp
                Filesize

                4KB

              • memory/4700-81-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-22-0x00000000051F0000-0x00000000051F1000-memory.dmp
                Filesize

                4KB

              • memory/4700-23-0x0000000005180000-0x0000000005181000-memory.dmp
                Filesize

                4KB

              • memory/4700-19-0x00000000051B0000-0x00000000051B1000-memory.dmp
                Filesize

                4KB

              • memory/4700-21-0x00000000051A0000-0x00000000051A1000-memory.dmp
                Filesize

                4KB

              • memory/4700-20-0x00000000051C0000-0x00000000051C1000-memory.dmp
                Filesize

                4KB

              • memory/4700-18-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB

              • memory/4700-17-0x0000000000830000-0x0000000000CE0000-memory.dmp
                Filesize

                4.7MB