Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 05:00
Static task
static1
General
-
Target
f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
f05e4420dfc79226b34b0f7e3d1a65f1
-
SHA1
95c5fc288a628e2fba01879b0dbe0dbbd79ae74f
-
SHA256
bd887a31360a06cf6094b3b889bf7ec9d835c9642bff6a0ed98bb248f225bf24
-
SHA512
d427c45f260e9bd38fa5a843c4eeff5482c102ace9b3f083ce015e9ce303dd9c481b70a715764c3cec16c6dc0246ad66f251197945f52a13e4e5eab77542ce38
-
SSDEEP
98304:qw3BM5HPz7UtPTkJY58taa7RTBQl50HeaCdRd9zojPGuH:qw3EHPzOTkJYla7RTBQl509CdRd9zojH
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.wygexde.xyz/
Extracted
asyncrat
0.5.7B
Default
whiteshadows.ddns.net:9731
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
microsoft 2.exe
-
install_folder
%AppData%
Extracted
gcleaner
g-prtnrs.top
g-prtrs.top
Extracted
redline
UPD
185.215.113.45:41009
Extracted
redline
Liez
liezaphare.xyz:80
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/1360-112-0x0000000000580000-0x00000000005A0000-memory.dmp family_redline behavioral1/memory/1360-116-0x0000000000860000-0x000000000087E000-memory.dmp family_redline behavioral1/memory/1204-227-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1204-228-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1204-237-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1204-235-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1204-231-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 7 IoCs
resource yara_rule behavioral1/memory/1360-112-0x0000000000580000-0x00000000005A0000-memory.dmp family_sectoprat behavioral1/memory/1360-116-0x0000000000860000-0x000000000087E000-memory.dmp family_sectoprat behavioral1/memory/1204-227-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1204-228-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1204-237-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1204-235-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/1204-231-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Socelars payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122bf-13.dat family_socelars -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000155f6-55.dat family_asyncrat -
OnlyLogger payload 3 IoCs
resource yara_rule behavioral1/memory/2688-111-0x0000000000400000-0x0000000000477000-memory.dmp family_onlylogger behavioral1/memory/2688-110-0x0000000000270000-0x000000000029E000-memory.dmp family_onlylogger behavioral1/memory/2688-301-0x0000000000400000-0x0000000000477000-memory.dmp family_onlylogger -
Executes dropped EXE 16 IoCs
pid Process 2520 3002.exe 2760 askinstall54.exe 2572 3002.exe 2116 BearVpn 3.exe 2676 Chrome3 2.exe 2444 GLKbrow.exe 1668 jhuuee.exe 1624 microsoft 2.exe 2324 NGlorySetp.exe 2688 setup.exe 1360 updatenew.exe 1204 GLKbrow.exe 1208 microsoft 2.exe 2796 services64.exe 2388 sihost64.exe 2428 services64.exe -
Loads dropped DLL 29 IoCs
pid Process 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 2520 3002.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 2444 GLKbrow.exe 1360 updatenew.exe 1360 updatenew.exe 1360 updatenew.exe 2688 setup.exe 2688 setup.exe 2688 setup.exe 2448 cmd.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 2676 Chrome3 2.exe 2796 services64.exe 2388 sihost64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 69 raw.githubusercontent.com 70 raw.githubusercontent.com 125 raw.githubusercontent.com 18 iplogger.org 19 iplogger.org 22 iplogger.org 31 iplogger.org 33 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 1204 2444 GLKbrow.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3000 2688 WerFault.exe 40 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe 1200 schtasks.exe 2464 schtasks.exe 1884 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 280 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 328 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 askinstall54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 askinstall54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 askinstall54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 services64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 askinstall54.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 askinstall54.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 services64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 services64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 askinstall54.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1624 microsoft 2.exe 1624 microsoft 2.exe 1624 microsoft 2.exe 2676 Chrome3 2.exe 2796 services64.exe 2428 services64.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeCreateTokenPrivilege 2760 askinstall54.exe Token: SeAssignPrimaryTokenPrivilege 2760 askinstall54.exe Token: SeLockMemoryPrivilege 2760 askinstall54.exe Token: SeIncreaseQuotaPrivilege 2760 askinstall54.exe Token: SeMachineAccountPrivilege 2760 askinstall54.exe Token: SeTcbPrivilege 2760 askinstall54.exe Token: SeSecurityPrivilege 2760 askinstall54.exe Token: SeTakeOwnershipPrivilege 2760 askinstall54.exe Token: SeLoadDriverPrivilege 2760 askinstall54.exe Token: SeSystemProfilePrivilege 2760 askinstall54.exe Token: SeSystemtimePrivilege 2760 askinstall54.exe Token: SeProfSingleProcessPrivilege 2760 askinstall54.exe Token: SeIncBasePriorityPrivilege 2760 askinstall54.exe Token: SeCreatePagefilePrivilege 2760 askinstall54.exe Token: SeCreatePermanentPrivilege 2760 askinstall54.exe Token: SeBackupPrivilege 2760 askinstall54.exe Token: SeRestorePrivilege 2760 askinstall54.exe Token: SeShutdownPrivilege 2760 askinstall54.exe Token: SeDebugPrivilege 2760 askinstall54.exe Token: SeAuditPrivilege 2760 askinstall54.exe Token: SeSystemEnvironmentPrivilege 2760 askinstall54.exe Token: SeChangeNotifyPrivilege 2760 askinstall54.exe Token: SeRemoteShutdownPrivilege 2760 askinstall54.exe Token: SeUndockPrivilege 2760 askinstall54.exe Token: SeSyncAgentPrivilege 2760 askinstall54.exe Token: SeEnableDelegationPrivilege 2760 askinstall54.exe Token: SeManageVolumePrivilege 2760 askinstall54.exe Token: SeImpersonatePrivilege 2760 askinstall54.exe Token: SeCreateGlobalPrivilege 2760 askinstall54.exe Token: 31 2760 askinstall54.exe Token: 32 2760 askinstall54.exe Token: 33 2760 askinstall54.exe Token: 34 2760 askinstall54.exe Token: 35 2760 askinstall54.exe Token: SeDebugPrivilege 2116 BearVpn 3.exe Token: SeDebugPrivilege 2324 NGlorySetp.exe Token: SeDebugPrivilege 1204 GLKbrow.exe Token: SeDebugPrivilege 1624 microsoft 2.exe Token: SeDebugPrivilege 328 taskkill.exe Token: SeDebugPrivilege 1360 updatenew.exe Token: SeDebugPrivilege 1208 microsoft 2.exe Token: SeDebugPrivilege 2676 Chrome3 2.exe Token: SeDebugPrivilege 2796 services64.exe Token: SeDebugPrivilege 2428 services64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2520 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 28 PID 1888 wrote to memory of 2520 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 28 PID 1888 wrote to memory of 2520 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 28 PID 1888 wrote to memory of 2520 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 28 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 1888 wrote to memory of 2760 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2572 2520 3002.exe 31 PID 2520 wrote to memory of 2572 2520 3002.exe 31 PID 2520 wrote to memory of 2572 2520 3002.exe 31 PID 2520 wrote to memory of 2572 2520 3002.exe 31 PID 1888 wrote to memory of 2116 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 32 PID 1888 wrote to memory of 2116 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 32 PID 1888 wrote to memory of 2116 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 32 PID 1888 wrote to memory of 2116 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 32 PID 1888 wrote to memory of 2676 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 34 PID 1888 wrote to memory of 2676 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 34 PID 1888 wrote to memory of 2676 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 34 PID 1888 wrote to memory of 2676 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 34 PID 1888 wrote to memory of 2444 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 35 PID 1888 wrote to memory of 2444 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 35 PID 1888 wrote to memory of 2444 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 35 PID 1888 wrote to memory of 2444 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 35 PID 1888 wrote to memory of 1668 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 37 PID 1888 wrote to memory of 1668 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 37 PID 1888 wrote to memory of 1668 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 37 PID 1888 wrote to memory of 1668 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 37 PID 1888 wrote to memory of 1624 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 38 PID 1888 wrote to memory of 1624 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 38 PID 1888 wrote to memory of 1624 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 38 PID 1888 wrote to memory of 1624 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 38 PID 1888 wrote to memory of 2324 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 39 PID 1888 wrote to memory of 2324 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 39 PID 1888 wrote to memory of 2324 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 39 PID 1888 wrote to memory of 2324 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 39 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 2688 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 40 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 1888 wrote to memory of 1360 1888 f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe 41 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2444 wrote to memory of 1204 2444 GLKbrow.exe 42 PID 2760 wrote to memory of 1520 2760 askinstall54.exe 44 PID 2760 wrote to memory of 1520 2760 askinstall54.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a3⤵
- Executes dropped EXE
PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall54.exe"C:\Users\Admin\AppData\Local\Temp\askinstall54.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:1520
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe"C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit3⤵PID:1720
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'4⤵
- Creates scheduled task(s)
PID:1200
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵PID:1764
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Creates scheduled task(s)
PID:2464
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit6⤵PID:2012
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'7⤵
- Creates scheduled task(s)
PID:1884
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe"C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\GLKbrow.exeC:\Users\Admin\AppData\Local\Temp\GLKbrow.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"2⤵
- Executes dropped EXE
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe"C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"' & exit3⤵PID:2604
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"'4⤵
- Creates scheduled task(s)
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2452.tmp.bat""3⤵
- Loads dropped DLL
PID:2448 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:280
-
-
C:\Users\Admin\AppData\Roaming\microsoft 2.exe"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe"C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8683⤵
- Loads dropped DLL
- Program crash
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\updatenew.exe"C:\Users\Admin\AppData\Local\Temp\updatenew.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344c3f7c7c13e87f2a2bca9163286834
SHA1681c41a82ce89745ba8a0fa00e21b79eab0940c5
SHA25632b8aa2d4341b583eb91ad4f928322d9dea7c0bb8879dfa54930b2c9cc52a7f6
SHA51257fbca18cf39e2f26ade66e4f43b202daca5e4637cb675d1eac1fafb4425257210561d79156ae594654cb2da887f4d600fad8eff585aa9821a33a4423e17d54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef59315be0d33d64dae84ca94cbb13f
SHA1db0f62b58b0a69d57c14528817c67524d1a6f9ae
SHA256177290d55f72c4ec00cc59b865270627998c60656a1db5cc4d1d64c31771aee9
SHA5121dacb8bb9ee005c80849dba9750c400d7a55aca9c31246a1dd199f76e0cf80b85f419637baed4e61ba97bafbaecd00d9912d1860bb95fd38701d2f64aabca8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c02ba13d4c6d891ac3725a6d5538a8
SHA19f73b9f2747361cb7ebf1563e7200109f8b12251
SHA2568a275653b8cdc973ac0f1da2afd2267fcd7e29d25d78114deb551d896aeede3a
SHA51207e719849b23fb26c967cacd4e2552717a779ca4d96948243d2808f2382c766b2cbe4df6326bd2707664c968cb18962417c2db1b2836ebe4404ade74f9775e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c25e24e9125ee7756ccdbdd359b8680
SHA1c304bb72e04015d56ab2416998c9ca291bea6fc4
SHA256332e938e5c09c6054b44858b0337f62faa8244d7f2aff22894898627f7f9b9ae
SHA512bd604f1cb620ffb1f164746f3c7288a0ae87a3f6cc996ad0a8b5758e9b65c2ea1d0c76cf0b0a50869168a9c8b5ad952e18add2de1d861263cbcf567c6a650ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1eb054358b4f837e9f7be7f98cd1915
SHA1afae8a0d6698c246bdd614bf1a4d3b6dfa8b232a
SHA256b2c22c2cff6020ad41585925dd23bb6ac0983fd6fb0fe86aec038283d6a734c6
SHA5125ebef17ae92abfa7ae4545a2b90df2827ac3eab42150b23276fbe43870d6cdb4699f476fc46ce7366adbe2d9369bbb07d602c1029890d799c4002655a36b775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50887ec2fcdd5182f92719f0353cdba07
SHA1ac184a1e952fde7ab86cb22f8cba9c8f6435c683
SHA256f139d729e23e6c0c37296e4930a8db410cb04392a19f5ca257604432b8d52eb9
SHA512e14ee9bb605d1a531eece25fe4ad1f2a74f0e7d337401961ef26a90cf9d388d0bfc75ac1d88937a5c9e6394e8500083da3650887e7fc12aec582ff4de75ea546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize252B
MD54764c52f2e313a264dac2990102bb643
SHA1af639d40780b131000a9f43134fbf1ca931ad81b
SHA256ba23881e3d7acf17ae29dce412ea45d17fdf52102e88c1b990cdfd6d39a62439
SHA512163ce0e03a9a3105e095d1ec7bcf9c8f04d8f187632ef056d579e87097c8eb140ffd6e05f352fa330912a82ae5201417056ed9f9a27c1822475d35bf29429261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54e062e7190b2c67030d488aabfeb6a3e
SHA18e299de3532c1c043acf9223648ca1bf801c6ef9
SHA256d339f07ba46a31e7815cbebe7629705f6fe0b46e78ffe8c1e2922273a06dca97
SHA512d431eb3941bd12c798c4c7893bae84d560e670cb3cb2389c73b0ddf64d509344dc9919cb7666a7bfc465922cb5a9da662a4464f06d724a6c9eb41cb1bb6109ff
-
Filesize
6KB
MD5e4ff121d36dff8e94df4e718ecd84aff
SHA1b84af5dae944bbf34d289d7616d2fef09dab26b7
SHA2562a019bc6bace686b08286ee7d8e2e66c18283b162d27774c486037c940dc60cc
SHA512141f12468cfe737b3694a4ece8f17c5d35bbade05ee0538fe4ef4fccf61584374f79a474fd4bf82685a4840afd94e9a9bbd9c9f357cb342dda9f89109c4da5f4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
43KB
MD558eea186f52da3256cc01e3856bca5c0
SHA135e8b3f570d572ea56fdf0dfb480e9cc4a36d986
SHA25626021efed039139a1c40ad7125a380e166321c65bc7354ea45d74ece6b0c692f
SHA5120d69916dde2e6a24a7addb9f1b21b51ff4b9d0b2052a719af431c6a382647bb01fdd96aedf89dc9c531faf3d2849fd2dc505385b929df23d8e7b1c3c5a9d740a
-
Filesize
390KB
MD5a186a0ef26742808b75c2ef534ece63c
SHA1d79062c6c9c039831e54c88fb67cd64e8146048c
SHA25618bc677465a6195706664788be8d88acd5cfd4abdad074aa1e1f0b2fbfed2b76
SHA512f5d2304750011a920bf1c219185bf9963fb47ab52e1fec96ce98cd15853fe6b592356b638f2f3628d3f5a1a45c47e85db1fb2d5a00a85840ad3e296ff130c21b
-
Filesize
120KB
MD5bf08a1385317518360e2fd24e25a67e2
SHA100b5d4aa063217b31755c4a698135915671f231f
SHA256d06d7d96e973671151438fe57a33c2834f7427c6c39501c22e0fbf1bd38de227
SHA512802750549a8302a69255e48ffe9b293babf26693e533484050449993e5c9365bf4b137013cbb7ae75359abe3a557bd4cc67b143be7dccad41b02a3ff5c0af5dc
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
239KB
MD51fa531c00decf91ca71f207cac84eaf7
SHA18131ac8c897ba6f76175cfed34cbd7b1c96d1e19
SHA25681613cf7f25302f85a8f6e80cea1fee589e6b05828ed6b0946b3855f7c70233f
SHA5125b2c27bc949f618dbb8bd94339f35ca5f55c0fd7f347463c79d3d1ec0b033322be65542429397fdbcccf9e92163b82505f5113c48ff111ec08ca050fb9812be7
-
Filesize
155B
MD5cfbd79782efa10d148aee27035298282
SHA1677a078a7fccad991172b1d0640d26fd43d0bcdd
SHA256268e3462c9baca85a2f786e7553ee5aa2262af5eda2de96f6ed656405b3cf09a
SHA512b54a1d3b2411989ea9123bdff1f3e58b08750e4dfd69b82d0ba55e8929a2e31d138c6ede90e9cc474817ade82a82b5b68aec4d6762797fb182627ab358b73683
-
Filesize
394KB
MD5f0524f49b7826d4a1ec521784e18a159
SHA1a9a60c3e40fe80153091a51c182bb80134eaadaf
SHA25630eaf7331e0e7e4323f35fb5c6b0744aec2dc0f18d1eb9a1f842b006926c1a83
SHA5127cad9f36d3564b7e673738251322ae8888cba17e324c7c34e312b0550e5549b257aaa1b3c9cb947b013f5ac0d21019ef1bf20421a851787a65ab97cac5711472
-
Filesize
56KB
MD5e511bb4cf31a2307b6f3445a869bcf31
SHA176f5c6e8df733ac13d205d426831ed7672a05349
SHA25656002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137
SHA5129c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c
-
Filesize
1.4MB
MD5f15409c47e5eb9ef4b316c3c8d2d3936
SHA132df482df77e5ef84560ff814a725831acb89b42
SHA256ec860b4ca9a08990622bc7fd0606383c965de9dd58bcf2022de601988fb7e3a4
SHA5122e8ba5d6b6d599f4df23365f0f93eee65f51ad369794b0d43d4e56a9060700a038e7af9dc15bca3034c20cfadc2300dff526ec64fb08c9499cb2fa24943949fc
-
Filesize
45KB
MD596e4aa05fbaf3ee4aa018be285821cb0
SHA18152a37db98c8b4cd96e66ae5942a5c0afce2fa1
SHA256b8957cff3e10c9e25e2fb62a044646e153a22d5b1943613270568dccef3a4fcd
SHA51251e8e0e041d8ceb6e889ede1ac2b3a0d4979cc8eff1a1216f5d5caa67cacba7563c3bb8f4c98d5c9b9ef3d95dbd9a839ff532d79109a208ba70e9f61d9d026d8
-
Filesize
370KB
MD59e71e05b637b04dd7ea315b4ac6feb4a
SHA178dbe6d8fe1af0009fdc803cdf40a7101422fa94
SHA256733693a304149939abc2dba1857e2f37111eba29b3c5d47dc3cf5243dd3dbb1a
SHA512dd31ac2fdfde46b5ade917bf102732bcf5c193de4060a9813b750f907051e822731273a8ab2ea999903354bf434132f6a7176da2ea1988a08c06714ff4a1445b
-
Filesize
7KB
MD5eb723528b6a8d2fb095868a1eeb5f83f
SHA1936e74ece3d80e9d48998d888bb124ad3136140d
SHA256c14011ba46b4c67c818da5b011ab0b82fdb481f24cbb217caa0825b59116e094
SHA512a9665ea57fe31b093a030c7c9a3b5253e636ff1c09c3e914a32e8747964e1de5fba301052a1e396e3bd5270ff4991b88379920636d29e7e70cfa9e2da6a982af