Malware Analysis Report

2024-09-22 16:30

Sample ID 240410-n239bshh5w
Target 750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c
SHA256 750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c
Tags
babadeda outsteel crypter loader spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral23

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c

Threat Level: Known bad

The file 750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c was found to be: Known bad.

Malicious Activity Summary

babadeda outsteel crypter loader spyware stealer

Babadeda Crypter

Babadeda

OutSteel batch script

OutSteel

Loads dropped DLL

Reads user/profile data of web browsers

Executes dropped EXE

Deletes itself

Enumerates connected drives

AutoIT Executable

Unsigned PE

Enumerates physical storage devices

Program crash

NSIS installer

Kills process with taskkill

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-10 11:54

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20231215-en

Max time kernel

90s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe"

Signatures

Babadeda

loader crypter babadeda

Babadeda Crypter

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

OutSteel

stealer outsteel

OutSteel batch script

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\w: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\a: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\b: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\g: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\h: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\z: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\k: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\o: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\p: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\y: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\v: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\x: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\i: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\l: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\t: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\u: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\q: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\r: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\s: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\e: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\j: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\m: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\n: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2144 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 2144 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 2144 wrote to memory of 4976 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 4976 wrote to memory of 2800 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2800 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2800 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 620 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 620 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 620 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4792 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4792 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4792 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4980 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4980 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4980 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1204 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1204 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1204 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4488 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4488 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4488 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3144 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3144 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3144 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2076 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2076 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2076 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1420 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1420 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1420 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1384 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1384 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1384 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4176 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4176 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4176 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3712 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3712 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3712 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4692 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4692 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4692 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 892 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 892 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 892 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2032 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2032 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2032 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4520 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4520 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 4520 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 228 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 228 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 228 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1040 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1040 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 1040 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3056 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3056 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3056 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3216 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3216 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 3216 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 4976 wrote to memory of 2364 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe

"C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe"

C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe

C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

cmd /c start /min r.bat

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /K r.bat

C:\Windows\SysWOW64\cmd.exe

cmd /min /c del "C:\Users\Admin\Tools\ICUAudioSoftware\r.bat"

C:\Windows\SysWOW64\taskkill.exe

Taskkill /IM cmd.exe /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 name4050.com udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe

MD5 54716603e1b2d01a507d5d0a3a3a104c
SHA1 93b0407a05891fb797e3083c374af2e0dfb30634
SHA256 595017621ccc2b26e23d39c720c6bfaf29aa17997b59a8ba7e4506eea252b8ed
SHA512 b3ea1beef7f4b05afc5405877282f5d9c3588fb2bd0cdaa5616b82cbd752dec471e6d87a5ea16a478e3a26500c764a2bd38fd0e02a354029dee4e023d261aff0

C:\Users\Admin\Tools\ICUAudioSoftware\wxwidgetsforms2.dll

MD5 9e11ac70407744bea597411f505d16b8
SHA1 90fddf31c2def7b655742a0f98181ee47b2835c8
SHA256 69977ef94e7abde5e40ebb1b2d639e3ae396c831a0b8671bdcd141f5f101a344
SHA512 fb68fa59897d95d1a909fcb32876efcc53880fbb804ad3ebbc97fbd4eee0cf4364f43517e92245754975a1c00ecca032b06efa03791d7179f1eb6d08620cde64

C:\Users\Admin\Tools\ICUAudioSoftware\settings.ini

MD5 b226fcb1d5fc245b5ad372151ea33ed8
SHA1 ac6941c5234179a2bc8306b238413a1c740fdcfa
SHA256 daa273100ae0fdfa7aae5c6687c0e8130a68a7abae55c8380b38b9278e2c18a9
SHA512 786f2398e114e02dac925c088774a2ed895546978f1b3cb6cc944efdeabf1ec5458136caf09c3932014fbfdf0ab43fae11c11aad35f53dcbcec4b408efc8017f

memory/4976-25-0x0000000003480000-0x0000000005580000-memory.dmp

memory/4976-26-0x0000000000A60000-0x0000000000D57000-memory.dmp

memory/4976-31-0x0000000000A60000-0x0000000000D57000-memory.dmp

C:\Users\Admin\Tools\ICUAudioSoftware\r.bat

MD5 f6a86f75a098305a18cafbe90984fdb8
SHA1 0b2b5145b221487c975fb8a37894539f8af096b0
SHA256 a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512 bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47

memory/4976-33-0x0000000003480000-0x0000000005580000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

93s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"

Signatures

Babadeda

loader crypter babadeda

Babadeda Crypter

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

OutSteel

stealer outsteel

OutSteel batch script

Description Indicator Process Target
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\m: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\n: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\v: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\z: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\i: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\k: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\p: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\x: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\b: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\l: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\q: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\s: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\t: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\a: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\j: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\o: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\r: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\u: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\w: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\y: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\g: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\h: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5092 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4124 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4124 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4124 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 2964 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 928 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 928 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 928 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4112 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4112 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4112 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3524 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3524 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3524 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3656 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3656 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3656 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 312 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 312 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 312 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1848 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1848 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1848 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1812 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1812 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1812 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 5092 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe

"C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

cmd /c start /min r.bat

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /K r.bat

C:\Windows\SysWOW64\cmd.exe

cmd /min /c del "C:\Users\Admin\AppData\Local\Temp\r.bat"

C:\Windows\SysWOW64\taskkill.exe

Taskkill /IM cmd.exe /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 name4050.com udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 34.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

memory/5092-0-0x0000000003390000-0x0000000005490000-memory.dmp

memory/5092-1-0x0000000000E50000-0x0000000001147000-memory.dmp

memory/5092-6-0x0000000000E50000-0x0000000001147000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\r.bat

MD5 f6a86f75a098305a18cafbe90984fdb8
SHA1 0b2b5145b221487c975fb8a37894539f8af096b0
SHA256 a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512 bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47

memory/5092-8-0x0000000003390000-0x0000000005490000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240220-en

Max time kernel

119s

Max time network

123s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Microsoft.Expression.Interactions.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Microsoft.Expression.Interactions.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240319-en

Max time kernel

149s

Max time network

152s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\PocoInitializer.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 440 wrote to memory of 3080 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 440 wrote to memory of 3080 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 440 wrote to memory of 3080 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\PocoInitializer.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\PocoInitializer.dll,#1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 11.2.37.23.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 233.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 34.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 198.111.78.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

147s

Max time network

156s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\System.Windows.Interactivity.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\System.Windows.Interactivity.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral22

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

122s

Max time network

126s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\xmlparse.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\xmlparse.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\xmlparse.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral23

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

166s

Max time network

184s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\xmlparse.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3752 wrote to memory of 216 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3752 wrote to memory of 216 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3752 wrote to memory of 216 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\xmlparse.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\xmlparse.dll,#1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2256,i,9172343514068348080,519219714517961765,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 100.58.20.217.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 17.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 25.14.97.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 1.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

120s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"

Signatures

Babadeda

loader crypter babadeda

Babadeda Crypter

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

OutSteel

stealer outsteel

OutSteel batch script

Description Indicator Process Target
N/A N/A N/A N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\y: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\z: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\k: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\o: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\s: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\w: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\x: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\l: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\m: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\t: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\u: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\a: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\h: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\j: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\n: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\p: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\q: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\r: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\b: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\g: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\i: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A
File opened (read-only) \??\v: C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1712 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2428 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2564 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1244 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 1712 wrote to memory of 1464 N/A C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe

"C:\Users\Admin\AppData\Local\Temp\AudioManagementConsole.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

cmd /c start /min r.bat

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /K r.bat

C:\Windows\SysWOW64\cmd.exe

cmd /min /c del "C:\Users\Admin\AppData\Local\Temp\r.bat"

C:\Windows\SysWOW64\taskkill.exe

Taskkill /IM cmd.exe /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 name4050.com udp

Files

memory/1712-0-0x0000000002D10000-0x0000000004E10000-memory.dmp

memory/1712-1-0x0000000000F40000-0x0000000001237000-memory.dmp

memory/1712-5-0x0000000000F40000-0x0000000001237000-memory.dmp

memory/1712-6-0x0000000000F40000-0x0000000001237000-memory.dmp

memory/1712-7-0x0000000002D10000-0x0000000004E10000-memory.dmp

memory/1712-8-0x0000000000F40000-0x0000000001237000-memory.dmp

memory/1712-9-0x0000000000F40000-0x0000000001237000-memory.dmp

memory/1712-10-0x0000000000F40000-0x0000000001237000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\r.bat

MD5 f6a86f75a098305a18cafbe90984fdb8
SHA1 0b2b5145b221487c975fb8a37894539f8af096b0
SHA256 a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512 bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47

memory/1712-13-0x0000000000F40000-0x0000000001237000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

119s

Max time network

127s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\PocoInitializer.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2604 wrote to memory of 2612 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\PocoInitializer.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\PocoInitializer.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral13

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

142s

Max time network

125s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bzip2.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bzip2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bzip2.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 228

Network

N/A

Files

memory/2172-0-0x0000000067140000-0x0000000067156000-memory.dmp

Analysis: behavioral14

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

92s

Max time network

120s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bzip2.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2644 wrote to memory of 2820 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2644 wrote to memory of 2820 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2644 wrote to memory of 2820 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bzip2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bzip2.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2820 -ip 2820

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 600

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 34.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

memory/2820-0-0x0000000067140000-0x0000000067156000-memory.dmp

Analysis: behavioral15

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20231215-en

Max time kernel

92s

Max time network

123s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d10core.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2940 wrote to memory of 1736 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2940 wrote to memory of 1736 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2940 wrote to memory of 1736 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d10core.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d10core.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 25.14.97.104.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp

Files

N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

93s

Max time network

129s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\iconv.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1928 wrote to memory of 516 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1928 wrote to memory of 516 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1928 wrote to memory of 516 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\iconv.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\iconv.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 516 -ip 516

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 600

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp

Files

memory/516-0-0x0000000062780000-0x000000006278A000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

121s

Max time network

129s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2164 wrote to memory of 2504 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1

Network

N/A

Files

memory/2504-0-0x0000000074450000-0x00000000744A8000-memory.dmp

memory/2504-2-0x0000000000120000-0x000000000013C000-memory.dmp

Analysis: behavioral12

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

147s

Max time network

153s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 100 wrote to memory of 4848 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 100 wrote to memory of 4848 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 100 wrote to memory of 4848 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 233.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.16.208.104.in-addr.arpa udp

Files

memory/4848-0-0x0000000075220000-0x0000000075278000-memory.dmp

memory/4848-3-0x0000000001210000-0x000000000122C000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

121s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libgthread-2.0-0.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2292 wrote to memory of 2760 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libgthread-2.0-0.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libgthread-2.0-0.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral19

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

153s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libgthread-2.0-0.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4524 wrote to memory of 1128 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4524 wrote to memory of 1128 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4524 wrote to memory of 1128 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libgthread-2.0-0.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libgthread-2.0-0.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 233.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 34.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

125s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe"

Signatures

Babadeda

loader crypter babadeda

Babadeda Crypter

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

OutSteel

stealer outsteel

OutSteel batch script

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\e: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\l: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\r: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\v: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\a: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\i: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\m: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\z: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\h: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\j: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\p: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\q: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\t: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\w: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\x: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\b: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\g: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\k: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\n: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\o: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\s: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\u: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A
File opened (read-only) \??\y: C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1048 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 1048 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 1048 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 1048 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe
PID 2672 wrote to memory of 2148 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2148 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2148 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2148 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2788 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2788 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2788 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2788 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2908 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2908 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2908 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2908 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 664 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 664 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 664 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 664 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2956 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2956 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2956 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2956 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1648 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1648 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1648 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1648 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2612 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1084 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1084 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1084 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1084 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2632 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2632 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2632 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2632 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1104 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1104 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1104 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1104 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1112 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1112 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1112 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1112 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2724 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2724 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2724 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2724 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1356 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1356 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1356 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1356 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1344 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1344 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1344 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1344 N/A C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe

"C:\Users\Admin\AppData\Local\Temp\750c447d6e3c7d74ccab736a0082ef437b1cd2000d761d3aff2b73227457b29c.exe"

C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe

C:\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.doc" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pdf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppt" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.xl" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.csv" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rtf" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.dot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.mdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.accdb" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pot" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.pps" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.ppa" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.rar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.zip" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.tar" /S /B /A

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /U /C DIR "f:\*.7z" /S /B /A

C:\Windows\SysWOW64\cmd.exe

cmd /c start /min r.bat

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /K r.bat

C:\Windows\SysWOW64\cmd.exe

cmd /min /c del "C:\Users\Admin\Tools\ICUAudioSoftware\r.bat"

C:\Windows\SysWOW64\taskkill.exe

Taskkill /IM cmd.exe /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 name4050.com udp

Files

\Users\Admin\Tools\ICUAudioSoftware\AudioManagementConsole.exe

MD5 54716603e1b2d01a507d5d0a3a3a104c
SHA1 93b0407a05891fb797e3083c374af2e0dfb30634
SHA256 595017621ccc2b26e23d39c720c6bfaf29aa17997b59a8ba7e4506eea252b8ed
SHA512 b3ea1beef7f4b05afc5405877282f5d9c3588fb2bd0cdaa5616b82cbd752dec471e6d87a5ea16a478e3a26500c764a2bd38fd0e02a354029dee4e023d261aff0

C:\Users\Admin\Tools\ICUAudioSoftware\wxwidgetsforms2.dll

MD5 9e11ac70407744bea597411f505d16b8
SHA1 90fddf31c2def7b655742a0f98181ee47b2835c8
SHA256 69977ef94e7abde5e40ebb1b2d639e3ae396c831a0b8671bdcd141f5f101a344
SHA512 fb68fa59897d95d1a909fcb32876efcc53880fbb804ad3ebbc97fbd4eee0cf4364f43517e92245754975a1c00ecca032b06efa03791d7179f1eb6d08620cde64

C:\Users\Admin\Tools\ICUAudioSoftware\settings.ini

MD5 b226fcb1d5fc245b5ad372151ea33ed8
SHA1 ac6941c5234179a2bc8306b238413a1c740fdcfa
SHA256 daa273100ae0fdfa7aae5c6687c0e8130a68a7abae55c8380b38b9278e2c18a9
SHA512 786f2398e114e02dac925c088774a2ed895546978f1b3cb6cc944efdeabf1ec5458136caf09c3932014fbfdf0ab43fae11c11aad35f53dcbcec4b408efc8017f

memory/2672-26-0x0000000002820000-0x0000000004920000-memory.dmp

memory/2672-27-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-32-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-33-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-34-0x0000000002820000-0x0000000004920000-memory.dmp

memory/2672-35-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-36-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-37-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-38-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-39-0x0000000001120000-0x0000000001417000-memory.dmp

memory/2672-41-0x0000000001120000-0x0000000001417000-memory.dmp

C:\Users\Admin\Tools\ICUAudioSoftware\r.bat

MD5 f6a86f75a098305a18cafbe90984fdb8
SHA1 0b2b5145b221487c975fb8a37894539f8af096b0
SHA256 a28ad4e445a5069bb621efc516147c60248369f5fc100ee935974a9b556fb273
SHA512 bee4c243f3a60f1778c5051d0a023afde678979a5da8db23f8811654afe468a06af6181c8338fc02d755dc223c52c653baa7abab8e941aac4cf335b7fabaac47

Analysis: behavioral6

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

151s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Microsoft.Expression.Interactions.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\Microsoft.Expression.Interactions.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 16.53.126.40.in-addr.arpa udp
GB 23.44.234.16:80 tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 59.238.56.23.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 198.111.78.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

120s

Max time network

145s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\System.Windows.Interactivity.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\System.Windows.Interactivity.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral16

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240221-en

Max time kernel

140s

Max time network

126s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\iconv.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\iconv.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\iconv.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 224

Network

N/A

Files

memory/1732-0-0x0000000062780000-0x000000006278A000-memory.dmp

Analysis: behavioral20

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win7-20240319-en

Max time kernel

121s

Max time network

138s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\wxwidgetsforms2.dll,#1

Signatures

Babadeda

loader crypter babadeda

Babadeda Crypter

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2324 wrote to memory of 2872 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\wxwidgetsforms2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\wxwidgetsforms2.dll,#1

Network

N/A

Files

memory/2872-0-0x0000000002780000-0x0000000004880000-memory.dmp

memory/2872-7-0x00000000001F0000-0x00000000001FE000-memory.dmp

memory/2872-8-0x0000000002780000-0x0000000004880000-memory.dmp

Analysis: behavioral21

Detonation Overview

Submitted

2024-04-10 11:54

Reported

2024-04-10 11:57

Platform

win10v2004-20240226-en

Max time kernel

144s

Max time network

163s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\wxwidgetsforms2.dll,#1

Signatures

Babadeda

loader crypter babadeda

Babadeda Crypter

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3492 wrote to memory of 4456 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3492 wrote to memory of 4456 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3492 wrote to memory of 4456 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\wxwidgetsforms2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\wxwidgetsforms2.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4456 -ip 4456

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 620

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4456 -ip 4456

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 628

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 25.14.97.104.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 28.173.189.20.in-addr.arpa udp

Files

memory/4456-0-0x0000000002830000-0x0000000004930000-memory.dmp

memory/4456-1-0x0000000000D20000-0x0000000000D34000-memory.dmp

memory/4456-2-0x0000000002830000-0x0000000004930000-memory.dmp