Analysis Overview
SHA256
5a8465b94580aa990fb1756803d3802e442c74e20d3a7170fd11e902472e21f3
Threat Level: Shows suspicious behavior
The file gabronza.exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Executes dropped EXE
Checks computer location settings
Loads dropped DLL
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks processor information in registry
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-06 21:15
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-06 21:15
Reported
2024-04-06 21:21
Platform
win10-20240404-en
Max time kernel
300s
Max time network
290s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\DcuLs5uEk2ZkFjuexVzhTjcrTf1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Vsaver-Rat v.0.1\\Vsaver-Rat v.0.1.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\gabronza.exe
"C:\Users\Admin\AppData\Local\Temp\gabronza.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe
"C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.112.102:17995 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 102.112.67.3.in-addr.arpa | udp |
| US | 52.111.227.14:443 | tcp | |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.239.69.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
Files
memory/204-0-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/204-1-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/204-2-0x0000000002510000-0x0000000002520000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
| MD5 | ee8ee7a4d3a35b909553ba2e12507ab6 |
| SHA1 | b74640e12e3b5acd71447c2d2491238759c1e018 |
| SHA256 | 5a8465b94580aa990fb1756803d3802e442c74e20d3a7170fd11e902472e21f3 |
| SHA512 | f2e8b964594b4798d6a624f54d6f337ce5afca00743aef6273a091376664b29ca7b1d35596a1e2d8f002c7eea70a1aed49be66c7d9cbcb135e824c205d58726f |
memory/204-10-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/2956-13-0x0000000073220000-0x00000000737D0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | bd9617a3eb88ae7292fb5d4744994e9b |
| SHA1 | 73f99527df1383177e85ee6f90c421171440e96f |
| SHA256 | 432a65c9f98387a456c8f8964c1d5859c16643d4b701bfc6f0de9548db10c445 |
| SHA512 | f4df92abb3ca35989e44c47487e8e39c9d29e4623e5a1e75a25851eee514222ab97d24562aecdde2c100cbfbb207e7fc9d6bbb53666dae03d171711ae14f829f |
memory/2956-14-0x0000000002900000-0x0000000002A00000-memory.dmp
memory/2956-17-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/2956-21-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1616-22-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1616-25-0x0000000002120000-0x0000000002130000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log
| MD5 | 9424b451803882d2fc76f5ef5c124991 |
| SHA1 | 72132bc89bcf174fd4a40cfb99b309a365c8e4db |
| SHA256 | 2f7b91d8a056e89152222115fe01e54dfb3c925096efba7847a069f5d582405a |
| SHA512 | 9843c3ea376d72b7641ab7e583e88a1188e36aca6ada3a6912c6e44066bc49db673a692334a14e08bb42e7da3e2719d4decd1bc3effba928c108e1cc25c22fae |
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | d0a510c42d874d85031f1f970e264879 |
| SHA1 | 3e20bd746ec365a422e71a95c2f904f1296cbfba |
| SHA256 | 396031cf9ca1012d10c09d1ab5e4d413dee15e57dfc21921fa8c5b7a2237c734 |
| SHA512 | 43bbf174458cdc64e30390371ba3d037ce722fe855ac1941bf222091cb5fcf4a72051efd418b5516ebe460ac177e71469c03a457806dfa934eacb7c402eb13b1 |
memory/1616-32-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1912-36-0x0000000002700000-0x0000000002800000-memory.dmp
memory/1912-35-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1616-34-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1912-37-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1912-38-0x0000000073220000-0x00000000737D0000-memory.dmp
memory/1912-39-0x0000000002700000-0x0000000002800000-memory.dmp
memory/1912-40-0x0000000073220000-0x00000000737D0000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-04-06 21:15
Reported
2024-04-06 21:21
Platform
win10v2004-20240226-en
Max time kernel
300s
Max time network
288s
Command Line
Signatures
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\gabronza.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DcuLs5uEk2ZkFjuexVzhTjcrTf1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Vsaver-Rat v.0.1\\Vsaver-Rat v.0.1.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\gabronza.exe
"C:\Users\Admin\AppData\Local\Temp\gabronza.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe
"C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.112.102:17995 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 102.112.67.3.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 34.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
memory/4856-0-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/4856-1-0x00000000010B0000-0x00000000010C0000-memory.dmp
memory/4856-2-0x0000000074AF0000-0x00000000750A1000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
| MD5 | ee8ee7a4d3a35b909553ba2e12507ab6 |
| SHA1 | b74640e12e3b5acd71447c2d2491238759c1e018 |
| SHA256 | 5a8465b94580aa990fb1756803d3802e442c74e20d3a7170fd11e902472e21f3 |
| SHA512 | f2e8b964594b4798d6a624f54d6f337ce5afca00743aef6273a091376664b29ca7b1d35596a1e2d8f002c7eea70a1aed49be66c7d9cbcb135e824c205d58726f |
memory/2144-15-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/2144-16-0x0000000074AF0000-0x00000000750A1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | bd9617a3eb88ae7292fb5d4744994e9b |
| SHA1 | 73f99527df1383177e85ee6f90c421171440e96f |
| SHA256 | 432a65c9f98387a456c8f8964c1d5859c16643d4b701bfc6f0de9548db10c445 |
| SHA512 | f4df92abb3ca35989e44c47487e8e39c9d29e4623e5a1e75a25851eee514222ab97d24562aecdde2c100cbfbb207e7fc9d6bbb53666dae03d171711ae14f829f |
memory/4856-17-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/2144-27-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/4612-28-0x0000000001080000-0x0000000001090000-memory.dmp
memory/4612-26-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/4612-29-0x0000000074AF0000-0x00000000750A1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log
| MD5 | 91046f2e147049d3e53cd9bf9d4d95ed |
| SHA1 | 228e347d062840b2edcbd16904475aacad414c62 |
| SHA256 | ea92f8291b86440b98162409b1f9f04470455c22be01a1480ea5ebc37eb168dc |
| SHA512 | 071a9c6e17760a726c3a4519cf8006f36f17f50946af0129e0e1f3e480f6b7fcc804a7614b044247f2420a8b2b46bec5b8493e4869bb918bc7c0f6aa1346c3e0 |
memory/4612-41-0x0000000074AF0000-0x00000000750A1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | d0a510c42d874d85031f1f970e264879 |
| SHA1 | 3e20bd746ec365a422e71a95c2f904f1296cbfba |
| SHA256 | 396031cf9ca1012d10c09d1ab5e4d413dee15e57dfc21921fa8c5b7a2237c734 |
| SHA512 | 43bbf174458cdc64e30390371ba3d037ce722fe855ac1941bf222091cb5fcf4a72051efd418b5516ebe460ac177e71469c03a457806dfa934eacb7c402eb13b1 |
memory/5040-44-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/5040-42-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/5040-45-0x0000000074AF0000-0x00000000750A1000-memory.dmp
memory/5040-46-0x0000000074AF0000-0x00000000750A1000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2024-04-06 21:15
Reported
2024-04-06 21:21
Platform
win11-20240221-en
Max time kernel
300s
Max time network
289s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\DcuLs5uEk2ZkFjuexVzhTjcrTf1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Vsaver-Rat v.0.1\\Vsaver-Rat v.0.1.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 5.tcp.eu.ngrok.io | N/A | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\gabronza.exe
"C:\Users\Admin\AppData\Local\Temp\gabronza.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe
"C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 5.tcp.eu.ngrok.io | udp |
| DE | 3.67.112.102:17995 | 5.tcp.eu.ngrok.io | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
Files
memory/4928-0-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/4928-1-0x00000000017B0000-0x00000000017C0000-memory.dmp
memory/4928-2-0x0000000074D00000-0x00000000752B1000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
| MD5 | ee8ee7a4d3a35b909553ba2e12507ab6 |
| SHA1 | b74640e12e3b5acd71447c2d2491238759c1e018 |
| SHA256 | 5a8465b94580aa990fb1756803d3802e442c74e20d3a7170fd11e902472e21f3 |
| SHA512 | f2e8b964594b4798d6a624f54d6f337ce5afca00743aef6273a091376664b29ca7b1d35596a1e2d8f002c7eea70a1aed49be66c7d9cbcb135e824c205d58726f |
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | bd9617a3eb88ae7292fb5d4744994e9b |
| SHA1 | 73f99527df1383177e85ee6f90c421171440e96f |
| SHA256 | 432a65c9f98387a456c8f8964c1d5859c16643d4b701bfc6f0de9548db10c445 |
| SHA512 | f4df92abb3ca35989e44c47487e8e39c9d29e4623e5a1e75a25851eee514222ab97d24562aecdde2c100cbfbb207e7fc9d6bbb53666dae03d171711ae14f829f |
memory/4928-13-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/2480-16-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/5108-25-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/5108-26-0x0000000001BB0000-0x0000000001BC0000-memory.dmp
memory/2480-27-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/5108-28-0x0000000074D00000-0x00000000752B1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log
| MD5 | e7df52bc2fea4cb49c9c749bd9f8d618 |
| SHA1 | fd956953e48f15d113f59be5e6a6534d32f2a25a |
| SHA256 | 65a906ff066056f5d93198115645da23ab4f880aad5d85f2fab41248b5831373 |
| SHA512 | 538d0e3958b2b6a2d876e64ed70518aeba857b4effece13c930417754e2df23b612c7368bc4d8344bb9b10b721916d4ff2529cbac86142993170aa1d1918bae7 |
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | d0a510c42d874d85031f1f970e264879 |
| SHA1 | 3e20bd746ec365a422e71a95c2f904f1296cbfba |
| SHA256 | 396031cf9ca1012d10c09d1ab5e4d413dee15e57dfc21921fa8c5b7a2237c734 |
| SHA512 | 43bbf174458cdc64e30390371ba3d037ce722fe855ac1941bf222091cb5fcf4a72051efd418b5516ebe460ac177e71469c03a457806dfa934eacb7c402eb13b1 |
memory/5108-42-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1112-41-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1112-43-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1112-44-0x0000000074D00000-0x00000000752B1000-memory.dmp
memory/1112-45-0x0000000074D00000-0x00000000752B1000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-06 21:15
Reported
2024-04-06 21:21
Platform
win7-20240221-en
Max time kernel
121s
Max time network
125s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\gabronza.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\gabronza.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\gabronza.exe
"C:\Users\Admin\AppData\Local\Temp\gabronza.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"
C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe
"C:\Users\Admin\AppData\Local\Temp\Vsaver-Rat v.0.1\Vsaver-Rat v.0.1.exe"
Network
Files
memory/2336-0-0x0000000075010000-0x00000000755BB000-memory.dmp
memory/2336-2-0x00000000000C0000-0x0000000000100000-memory.dmp
memory/2336-1-0x0000000075010000-0x00000000755BB000-memory.dmp
\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
| MD5 | ee8ee7a4d3a35b909553ba2e12507ab6 |
| SHA1 | b74640e12e3b5acd71447c2d2491238759c1e018 |
| SHA256 | 5a8465b94580aa990fb1756803d3802e442c74e20d3a7170fd11e902472e21f3 |
| SHA512 | f2e8b964594b4798d6a624f54d6f337ce5afca00743aef6273a091376664b29ca7b1d35596a1e2d8f002c7eea70a1aed49be66c7d9cbcb135e824c205d58726f |
memory/2356-15-0x0000000000470000-0x00000000004B0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\melt.txt
| MD5 | bd9617a3eb88ae7292fb5d4744994e9b |
| SHA1 | 73f99527df1383177e85ee6f90c421171440e96f |
| SHA256 | 432a65c9f98387a456c8f8964c1d5859c16643d4b701bfc6f0de9548db10c445 |
| SHA512 | f4df92abb3ca35989e44c47487e8e39c9d29e4623e5a1e75a25851eee514222ab97d24562aecdde2c100cbfbb207e7fc9d6bbb53666dae03d171711ae14f829f |
memory/2336-16-0x0000000075010000-0x00000000755BB000-memory.dmp
memory/2356-17-0x0000000075010000-0x00000000755BB000-memory.dmp
memory/2356-19-0x0000000075010000-0x00000000755BB000-memory.dmp
memory/1960-29-0x0000000075010000-0x00000000755BB000-memory.dmp
memory/1960-30-0x0000000075010000-0x00000000755BB000-memory.dmp
memory/2356-31-0x0000000075010000-0x00000000755BB000-memory.dmp