Malware Analysis Report

2024-09-22 11:57

Sample ID 240414-nzpm6abc5v
Target ca13f4913d90017fd5cd552b30c25349
SHA256 25c3a5bf8a33e941286f5f271843a480e4f8669086eac047abdfd6f8d5f96a06
Tags
troldesh discovery persistence ransomware spyware stealer trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

25c3a5bf8a33e941286f5f271843a480e4f8669086eac047abdfd6f8d5f96a06

Threat Level: Known bad

The file ca13f4913d90017fd5cd552b30c25349 was found to be: Known bad.

Malicious Activity Summary

troldesh discovery persistence ransomware spyware stealer trojan upx

Troldesh, Shade, Encoder.858

Reads user/profile data of web browsers

UPX packed file

Adds Run key to start application

Checks installed software on the system

Enumerates physical storage devices

Suspicious use of UnmapMainImage

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-14 11:50

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-14 11:50

Reported

2024-04-14 12:01

Platform

win7-20240221-en

Max time kernel

433s

Max time network

438s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Network

Country Destination Domain Proto
N/A 127.0.0.1:49211 tcp
DE 131.188.40.189:443 tcp
US 154.35.32.5:443 tcp
DE 193.23.244.244:443 tcp

Files

memory/1704-0-0x0000000001EB0000-0x0000000001F85000-memory.dmp

memory/1704-1-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-2-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-3-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-4-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-6-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-5-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-7-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-11-0x0000000001EB0000-0x0000000001F85000-memory.dmp

memory/1704-12-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1704-13-0x0000000000400000-0x0000000000608000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-14 11:50

Reported

2024-04-14 12:01

Platform

win10-20240404-en

Max time kernel

592s

Max time network

506s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Network

Country Destination Domain Proto
SG 76.73.17.194:9090 tcp
N/A 127.0.0.1:49795 tcp
NL 194.109.206.212:443 tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
AT 86.59.21.38:443 tcp
US 8.8.8.8:53 24.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 138.136.73.23.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
DE 131.188.40.189:443 tcp
US 8.8.8.8:53 189.40.188.131.in-addr.arpa udp

Files

memory/1320-0-0x00000000022F0000-0x00000000023C5000-memory.dmp

memory/1320-1-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-2-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-3-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-4-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-5-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-7-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-11-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-12-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-13-0x00000000022F0000-0x00000000023C5000-memory.dmp

memory/1320-14-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-15-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-16-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-17-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-18-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-19-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-22-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-23-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-24-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-25-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-26-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-27-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-28-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-29-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-30-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-31-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-32-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-33-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-34-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-35-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-36-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-37-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-38-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-39-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-40-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-41-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-42-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-43-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-44-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-45-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-46-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-47-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-48-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-49-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-50-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-51-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-52-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-53-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-54-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-55-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-56-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-57-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-58-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-59-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-60-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-61-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-62-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-63-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-64-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-65-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-66-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-67-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-68-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-69-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-70-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-71-0x0000000000400000-0x0000000000608000-memory.dmp

memory/1320-72-0x0000000000400000-0x0000000000608000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-14 11:50

Reported

2024-04-14 12:01

Platform

win10v2004-20240412-en

Max time kernel

590s

Max time network

587s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
NL 194.109.206.212:443 tcp
N/A 127.0.0.1:53104 tcp
US 208.83.223.34:80 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 128.31.0.39:9101 tcp
US 8.8.8.8:53 123.10.44.20.in-addr.arpa udp
AT 86.59.21.38:443 tcp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp

Files

memory/4216-0-0x0000000002400000-0x00000000024D5000-memory.dmp

memory/4216-1-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-2-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-3-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-4-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-5-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-8-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-11-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-12-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-13-0x0000000002400000-0x00000000024D5000-memory.dmp

memory/4216-14-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-15-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-16-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-17-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-20-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-21-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-22-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-23-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-24-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-25-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-26-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-27-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-28-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-29-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-30-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-31-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-32-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-33-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-34-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-35-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-36-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-37-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-38-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-39-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-40-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-41-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-42-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-43-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-44-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-45-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-46-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-47-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-48-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-49-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-50-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-51-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-52-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-53-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-54-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-55-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-56-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-57-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-58-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-59-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-60-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-61-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-62-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-63-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-64-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-65-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-66-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-67-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-68-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-69-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-70-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-71-0x0000000000400000-0x0000000000608000-memory.dmp

memory/4216-72-0x0000000000400000-0x0000000000608000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-04-14 11:50

Reported

2024-04-14 12:01

Platform

win11-20240412-en

Max time kernel

592s

Max time network

466s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Signatures

Troldesh, Shade, Encoder.858

ransomware trojan troldesh

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-825860316-2493133627-3905166409-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe N/A

Checks installed software on the system

discovery

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe

"C:\Users\Admin\AppData\Local\Temp\ca13f4913d90017fd5cd552b30c25349.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
N/A 127.0.0.1:49754 tcp
DE 131.188.40.189:443 tcp
US 154.35.32.5:443 tcp
SG 76.73.17.194:9090 tcp

Files

memory/2212-0-0x0000000002600000-0x00000000026D5000-memory.dmp

memory/2212-1-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-2-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-3-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-4-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-5-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-7-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-11-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-12-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-13-0x0000000002600000-0x00000000026D5000-memory.dmp

memory/2212-14-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-15-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-16-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-17-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-18-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-19-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-22-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-23-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-24-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-25-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-26-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-27-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-28-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-29-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-30-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-31-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-32-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-33-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-34-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-35-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-36-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-37-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-38-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-39-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-40-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-41-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-42-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-43-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-44-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-45-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-46-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-47-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-48-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-49-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-50-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-51-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-52-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-53-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-54-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-55-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-56-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-57-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-58-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-59-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-60-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-61-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-62-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-63-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-64-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-65-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-66-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-67-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-68-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-69-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-70-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-71-0x0000000000400000-0x0000000000608000-memory.dmp

memory/2212-72-0x0000000000400000-0x0000000000608000-memory.dmp