Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-03-2024 05:30

General

  • Target

    2dda3dd0377dd66baf80e22f9cf502f2ddffe8d6ddc191e7ea52609bf7ad2f32.exe

  • Size

    203KB

  • MD5

    13797dc7a31a9e87ecccf44c67013b4d

  • SHA1

    9f65cc05399f0e71a379cf2aa6db4741fffaaa94

  • SHA256

    2dda3dd0377dd66baf80e22f9cf502f2ddffe8d6ddc191e7ea52609bf7ad2f32

  • SHA512

    9d609f78ffd132f2ff61ccee41c93411b51df5aa4b564dad460ee950389ec9b1279befe70b7d36d165b0124d2d1ab399a4f3c24b5ce3b62c12a2546e2536f255

  • SSDEEP

    3072:+H6LqhgTI5JJfgKfWDYGYbY7lW2KvSy9VY042+emJZXwMZeK9Y89:+nhgTI5JRg6WcFYxY9V+2+eCSM5N

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.0:29587

Signatures

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 8 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 13 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 61 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dda3dd0377dd66baf80e22f9cf502f2ddffe8d6ddc191e7ea52609bf7ad2f32.exe
    "C:\Users\Admin\AppData\Local\Temp\2dda3dd0377dd66baf80e22f9cf502f2ddffe8d6ddc191e7ea52609bf7ad2f32.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3988
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\976D.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:1552
    • C:\Users\Admin\AppData\Local\Temp\BBBF.exe
      C:\Users\Admin\AppData\Local\Temp\BBBF.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\BBBF.exe
        C:\Users\Admin\AppData\Local\Temp\BBBF.exe
        2⤵
        • DcRat
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\ccda89d8-81c2-4e73-8212-bd67770f22a0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:2564
        • C:\Users\Admin\AppData\Local\Temp\BBBF.exe
          "C:\Users\Admin\AppData\Local\Temp\BBBF.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4796
          • C:\Users\Admin\AppData\Local\Temp\BBBF.exe
            "C:\Users\Admin\AppData\Local\Temp\BBBF.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            PID:1044
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 236
              5⤵
              • Program crash
              PID:4892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1044 -ip 1044
      1⤵
        PID:5020
      • C:\Users\Admin\AppData\Local\Temp\C6DC.exe
        C:\Users\Admin\AppData\Local\Temp\C6DC.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 844
          2⤵
          • Program crash
          PID:3924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5052 -ip 5052
        1⤵
          PID:1528
        • C:\Users\Admin\AppData\Local\Temp\F82E.exe
          C:\Users\Admin\AppData\Local\Temp\F82E.exe
          1⤵
          • Executes dropped EXE
          PID:2660
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FC36.bat" "
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1060
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
            2⤵
              PID:2880
          • C:\Users\Admin\AppData\Local\Temp\2599.exe
            C:\Users\Admin\AppData\Local\Temp\2599.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:2208
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              2⤵
                PID:688
            • C:\Users\Admin\AppData\Local\Temp\3D39.exe
              C:\Users\Admin\AppData\Local\Temp\3D39.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2224
              • C:\Users\Admin\AppData\Local\Temp\3D39.exe
                "C:\Users\Admin\AppData\Local\Temp\3D39.exe"
                2⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:2588
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:4016
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  3⤵
                    PID:2564
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      4⤵
                      • Modifies Windows Firewall
                      PID:2284
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:5044
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:1184
                  • C:\Windows\rss\csrss.exe
                    C:\Windows\rss\csrss.exe
                    3⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Manipulates WinMonFS driver.
                    • Drops file in Windows directory
                    PID:3032
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:4208
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      4⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:4908
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /delete /tn ScheduledUpdate /f
                      4⤵
                        PID:3652
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:2820
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:4596
                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                        4⤵
                        • Executes dropped EXE
                        PID:1928
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        4⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:4560
                      • C:\Windows\windefender.exe
                        "C:\Windows\windefender.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:3692
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          5⤵
                            PID:1352
                            • C:\Windows\SysWOW64\sc.exe
                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              6⤵
                              • Launches sc.exe
                              PID:1124
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                    • Modifies Installed Components in the registry
                    • Enumerates connected drives
                    • Checks SCSI registry key(s)
                    • Modifies registry class
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:4984
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:2948
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                    1⤵
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:4376
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                    1⤵
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:2260
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                    1⤵
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:4752
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                    1⤵
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:1704
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                    1⤵
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:4752
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                    1⤵
                    • Enumerates system info in registry
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:1092
                  • C:\Windows\windefender.exe
                    C:\Windows\windefender.exe
                    1⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    PID:4216

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Execution

                  Scheduled Task/Job

                  1
                  T1053

                  Persistence

                  Boot or Logon Autostart Execution

                  2
                  T1547

                  Registry Run Keys / Startup Folder

                  2
                  T1547.001

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Scheduled Task/Job

                  1
                  T1053

                  Privilege Escalation

                  Boot or Logon Autostart Execution

                  2
                  T1547

                  Registry Run Keys / Startup Folder

                  2
                  T1547.001

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Scheduled Task/Job

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Impair Defenses

                  1
                  T1562

                  Disable or Modify System Firewall

                  1
                  T1562.004

                  File and Directory Permissions Modification

                  1
                  T1222

                  Credential Access

                  Unsecured Credentials

                  3
                  T1552

                  Credentials In Files

                  3
                  T1552.001

                  Discovery

                  Query Registry

                  5
                  T1012

                  Peripheral Device Discovery

                  2
                  T1120

                  System Information Discovery

                  5
                  T1082

                  Collection

                  Data from Local System

                  3
                  T1005

                  Command and Control

                  Web Service

                  1
                  T1102

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
                    Filesize

                    1022B

                    MD5

                    f8f9edf1081ea378f7fcdccf407cd631

                    SHA1

                    df82f894dc01ec156cb1e3a80b9630b1c2442014

                    SHA256

                    21210b42b1115cc408383434d5898d8f27aece11819e88b4d43ce232be3568fa

                    SHA512

                    065cbce0688d3c7226021cbe85cf67af4ee4451415c836e43a54ed8927c51fd4194219268a6738cc5edd32d2292a7ccb8addc1fff6751e489a336c973882176b

                  • C:\Users\Admin\AppData\Local\Temp\2599.exe
                    Filesize

                    30.6MB

                    MD5

                    ff35671d54d612772b0c22c141a3056e

                    SHA1

                    d005a27cd48556bf17eb9c2b43af49b67347cc0e

                    SHA256

                    2f625ea35f82332c639049c4a849f39cd2b74acb013880d156a2f647497c2512

                    SHA512

                    9a40a657f196036ef07c410db225f7a023f7299abc078cefd5d97489e7359ce9c640d72b98fedbf3f11ebaba1987b0acd5c7892b1ba5b5ae18709037df45790e

                  • C:\Users\Admin\AppData\Local\Temp\3D39.exe
                    Filesize

                    4.1MB

                    MD5

                    cd86175e48a32ed7191466bcad199e62

                    SHA1

                    bed533b2623941e4e4c062b0009c64dd091fb5a7

                    SHA256

                    d7c6d0fa2e29eb3a3e3e14d9536858d388cfa9625540cad5f5125ea826a9b5a2

                    SHA512

                    4f6a124b53a20838d52872a49af7e59fd1ae3c3d488c31a3d4defa9388b692ae186dd27ea1665b0d056f1721905beea80448bb35bfb1068688b4cbc556bae886

                  • C:\Users\Admin\AppData\Local\Temp\976D.bat
                    Filesize

                    77B

                    MD5

                    55cc761bf3429324e5a0095cab002113

                    SHA1

                    2cc1ef4542a4e92d4158ab3978425d517fafd16d

                    SHA256

                    d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                    SHA512

                    33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                  • C:\Users\Admin\AppData\Local\Temp\BBBF.exe
                    Filesize

                    733KB

                    MD5

                    cc4b213535ca360dbf9d08590939972d

                    SHA1

                    a1ac443d9c2f2a809b01fc7968235a9b9992f89b

                    SHA256

                    33b7a85c7b3ba67d21e108440ea3a755639875314fce7c922865e723479aeb38

                    SHA512

                    9de6129de378164c5454a8833a31bbaeb9c7718d9f149a141d014c72a55d25207be7826124def4fd7e2a02e9178287e5ac912c9bc0abcbf896ebf3311ea77eb3

                  • C:\Users\Admin\AppData\Local\Temp\C6DC.exe
                    Filesize

                    392KB

                    MD5

                    89ec2c6bf09ed9a38bd11acb2a41cd1b

                    SHA1

                    408549982b687ca8dd5efb0e8b704a374bd8909d

                    SHA256

                    da1e155c46ca6b23409d059b6d85341c0b86c92d2c69dbda85eef3894313662d

                    SHA512

                    c565dbb25dd35ae8dce2a4cf15640053aca8b99c5c78db23648e6618ef316362b77142c6524b47089a7ea05632adee091ec5e82ed95aeb86d2331b8c5f8cc56a

                  • C:\Users\Admin\AppData\Local\Temp\F82E.exe
                    Filesize

                    6.5MB

                    MD5

                    9e52aa572f0afc888c098db4c0f687ff

                    SHA1

                    ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b

                    SHA256

                    4a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443

                    SHA512

                    d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bxo2r5xx.ebx.ps1
                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    Filesize

                    281KB

                    MD5

                    d98e33b66343e7c96158444127a117f6

                    SHA1

                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                    SHA256

                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                    SHA512

                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                    Filesize

                    2KB

                    MD5

                    ac4917a885cf6050b1a483e4bc4d2ea5

                    SHA1

                    b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                    SHA256

                    e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                    SHA512

                    092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                    Filesize

                    19KB

                    MD5

                    2e01f7736fd79bf2cb28af6b5e5334f7

                    SHA1

                    16fa5aea2f93a39ade6969f65473d339acaebf5e

                    SHA256

                    ed8c63c8a212ea5a904444535dccc628c0207cead1b98ad3309b89827f8246a8

                    SHA512

                    c0ff4e21db04c951ec6665859bde0db74b99c5599c53436463dee9f7c5dbf231d51cbc0afb8380c625c053a34efe2d907f6571217c76f166ee410af5acb0e956

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                    Filesize

                    19KB

                    MD5

                    53724ebd39951ba7f57becac59293a58

                    SHA1

                    ea61df7b2249e60a9e925bdc98084ea0113e9178

                    SHA256

                    2c7d6972aa7f989bcd427b85091b794c5c4091a0b6a3a0ce09eab87262dd801a

                    SHA512

                    495e6dd4f34681d97ce7805cca5a3740305716003ac2c35c846b9ed6f532c088906ba58bd72052e5bdda739e8f8c831a1df8d79ea1fdff93557ed2a510eeacc7

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                    Filesize

                    19KB

                    MD5

                    a76f67c6ae881062cee3bd0a9981c373

                    SHA1

                    6288d8e909e0f1580c1c42b80f29575d0a0ef0e6

                    SHA256

                    71a784200b579eb808f93e16793d5dab878bcda4f721872ea859ab181fabd9b0

                    SHA512

                    054b768005d55875bfc311ed1772229c10e36a1cdc6d561910bea3056e0e39ed7ec61c245007cc9183369b2b77255c3806608de124c49bf51f7d19d7192d5fe9

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                    Filesize

                    19KB

                    MD5

                    1cdf1e167ce8a2e77b114b73bd06f8d2

                    SHA1

                    ae96d26ce46176e031bef917d270750a256a1f97

                    SHA256

                    634ae7b874c368863a84d6a5acc0d5e7b9b2b33a6693d3b0618854ffa3de0906

                    SHA512

                    11a94d6fef9ffcecd01f5b71a178e378aa1913669c6d85a04dae1f7cacd07635c6b752bc25d622ddc93ce6bf65b6f3385279e0730086e4519f5ca9e98fd8124a

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                    Filesize

                    19KB

                    MD5

                    53fecca54cbaf514afec0ef78093c7a4

                    SHA1

                    2a02f12a266683ec69f91a696622b624737410d8

                    SHA256

                    1fb5de9f31ec4e6faf3d0941d5540f51fc30383a06ec7e171932c1e2cb290161

                    SHA512

                    cefe1bd2445a2100e6fe724f8e36f08e62498f59bca8663d1446bf524b7baebeb5b443ded9c8f42fa623945fa163c3c48779703466b5087fefbff6abf97897b3

                  • C:\Windows\windefender.exe
                    Filesize

                    2.0MB

                    MD5

                    8e67f58837092385dcf01e8a2b4f5783

                    SHA1

                    012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                    SHA256

                    166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                    SHA512

                    40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                  • memory/688-404-0x00000000010F0000-0x000000000113B000-memory.dmp
                    Filesize

                    300KB

                  • memory/688-407-0x00000000010F0000-0x000000000113B000-memory.dmp
                    Filesize

                    300KB

                  • memory/1044-44-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1044-45-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1044-47-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/1384-67-0x0000000005320000-0x000000000532A000-memory.dmp
                    Filesize

                    40KB

                  • memory/1384-71-0x0000000005670000-0x000000000577A000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/1384-61-0x0000000000400000-0x0000000000450000-memory.dmp
                    Filesize

                    320KB

                  • memory/1384-78-0x0000000007800000-0x0000000007D2C000-memory.dmp
                    Filesize

                    5.2MB

                  • memory/1384-64-0x0000000005860000-0x0000000005E06000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/1384-65-0x0000000005350000-0x00000000053E2000-memory.dmp
                    Filesize

                    584KB

                  • memory/1384-66-0x0000000074310000-0x0000000074AC1000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1384-68-0x0000000005180000-0x0000000005190000-memory.dmp
                    Filesize

                    64KB

                  • memory/1384-101-0x0000000074310000-0x0000000074AC1000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1384-77-0x0000000007100000-0x00000000072C2000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/1384-70-0x0000000006430000-0x0000000006A48000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/1384-76-0x0000000006DE0000-0x0000000006E30000-memory.dmp
                    Filesize

                    320KB

                  • memory/1384-72-0x0000000005590000-0x00000000055A2000-memory.dmp
                    Filesize

                    72KB

                  • memory/1384-73-0x00000000055F0000-0x000000000562C000-memory.dmp
                    Filesize

                    240KB

                  • memory/1384-74-0x0000000005780000-0x00000000057CC000-memory.dmp
                    Filesize

                    304KB

                  • memory/1384-75-0x0000000005EA0000-0x0000000005F06000-memory.dmp
                    Filesize

                    408KB

                  • memory/2208-346-0x00007FF638680000-0x00007FF63A5CC000-memory.dmp
                    Filesize

                    31.3MB

                  • memory/2208-406-0x00007FF638680000-0x00007FF63A5CC000-memory.dmp
                    Filesize

                    31.3MB

                  • memory/2248-24-0x00000000023F0000-0x000000000250B000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/2248-20-0x0000000002350000-0x00000000023E5000-memory.dmp
                    Filesize

                    596KB

                  • memory/2588-560-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/2588-579-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/2660-107-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-129-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-92-0x0000000000520000-0x0000000001205000-memory.dmp
                    Filesize

                    12.9MB

                  • memory/2660-93-0x00000000018E0000-0x00000000018E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2660-91-0x00000000018D0000-0x00000000018D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2660-94-0x00000000018F0000-0x00000000018F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2660-99-0x0000000001900000-0x0000000001901000-memory.dmp
                    Filesize

                    4KB

                  • memory/2660-89-0x0000000001880000-0x0000000001881000-memory.dmp
                    Filesize

                    4KB

                  • memory/2660-102-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-103-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-104-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-105-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-106-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-83-0x0000000000520000-0x0000000001205000-memory.dmp
                    Filesize

                    12.9MB

                  • memory/2660-108-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-109-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-110-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-111-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-112-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-113-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-114-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-115-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-116-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-117-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-118-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-119-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-120-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-121-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-122-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-124-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-123-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-125-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-126-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-127-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-128-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-90-0x0000000001890000-0x0000000001891000-memory.dmp
                    Filesize

                    4KB

                  • memory/2660-130-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-131-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-133-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-132-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-135-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-134-0x0000000003FC0000-0x00000000040C0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2660-88-0x0000000001870000-0x0000000001871000-memory.dmp
                    Filesize

                    4KB

                  • memory/3032-797-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/3032-810-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/3032-805-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/3032-801-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/3032-780-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/3032-798-0x0000000000400000-0x0000000000D1C000-memory.dmp
                    Filesize

                    9.1MB

                  • memory/3396-298-0x0000000002B90000-0x0000000002B91000-memory.dmp
                    Filesize

                    4KB

                  • memory/3396-4-0x0000000002AE0000-0x0000000002AF6000-memory.dmp
                    Filesize

                    88KB

                  • memory/3692-794-0x0000000000400000-0x00000000008DF000-memory.dmp
                    Filesize

                    4.9MB

                  • memory/3988-1-0x0000000000850000-0x0000000000950000-memory.dmp
                    Filesize

                    1024KB

                  • memory/3988-2-0x0000000002380000-0x000000000238B000-memory.dmp
                    Filesize

                    44KB

                  • memory/3988-3-0x0000000000400000-0x0000000000536000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/3988-5-0x0000000000400000-0x0000000000536000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4216-799-0x0000000000400000-0x00000000008DF000-memory.dmp
                    Filesize

                    4.9MB

                  • memory/4216-806-0x0000000000400000-0x00000000008DF000-memory.dmp
                    Filesize

                    4.9MB

                  • memory/4796-42-0x0000000002360000-0x00000000023FA000-memory.dmp
                    Filesize

                    616KB

                  • memory/4828-23-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4828-21-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4828-25-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4828-26-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/4828-38-0x0000000000400000-0x0000000000537000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/5052-55-0x0000000000E70000-0x0000000000ED4000-memory.dmp
                    Filesize

                    400KB

                  • memory/5052-56-0x0000000074310000-0x0000000074AC1000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/5052-57-0x0000000005B30000-0x0000000005B40000-memory.dmp
                    Filesize

                    64KB

                  • memory/5052-58-0x00000000033A0000-0x00000000033A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/5052-63-0x00000000033E0000-0x00000000053E0000-memory.dmp
                    Filesize

                    32.0MB

                  • memory/5052-69-0x0000000074310000-0x0000000074AC1000-memory.dmp
                    Filesize

                    7.7MB