Analysis
-
max time kernel
91s -
max time network
102s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/04/2024, 20:22
Behavioral task
behavioral1
Sample
paysafecard generator/paysafecardgenerator.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
installer.vbs
Resource
win11-20240412-en
General
-
Target
paysafecard generator/paysafecardgenerator.exe
-
Size
10.2MB
-
MD5
d45b543e0729ffc7d3a56ac85eb486af
-
SHA1
20f92c63b9ecbb1da6b77baad7bd9be128865dd7
-
SHA256
3414fca594f8f5ac7514c1b51be2f6c4a3fc9f606e6c70709b206ea48ce28959
-
SHA512
deb24f88c8eede36fb83825164a55379336b64af08968e3462a2facc456189e587faa937fd77b1ca637fcd628227fa144868a16173f3767ef03ba29768397882
-
SSDEEP
196608:xLatAusbeILr7PnILLZWdoCOiV9onJ5hrZERryiU8AdZYJERfSEIrTswf5Y7xq50:dxlLr7M5liV9c5hlERjAdZYyAHrQ+5oq
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network System App Runtime Process.lnk WScript.exe -
Loads dropped DLL 20 IoCs
pid Process 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe 2424 paysafecardgenerator.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000200000002a9c2-170.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3263309122-2820180308-3568046652-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2888 powershell.exe 2888 powershell.exe 2000 powershell.exe 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4456 wrote to memory of 2424 4456 paysafecardgenerator.exe 79 PID 4456 wrote to memory of 2424 4456 paysafecardgenerator.exe 79 PID 2424 wrote to memory of 4812 2424 paysafecardgenerator.exe 81 PID 2424 wrote to memory of 4812 2424 paysafecardgenerator.exe 81 PID 4812 wrote to memory of 2888 4812 cmd.exe 83 PID 4812 wrote to memory of 2888 4812 cmd.exe 83 PID 2424 wrote to memory of 3168 2424 paysafecardgenerator.exe 84 PID 2424 wrote to memory of 3168 2424 paysafecardgenerator.exe 84 PID 3168 wrote to memory of 2000 3168 cmd.exe 86 PID 3168 wrote to memory of 2000 3168 cmd.exe 86 PID 2424 wrote to memory of 3688 2424 paysafecardgenerator.exe 87 PID 2424 wrote to memory of 3688 2424 paysafecardgenerator.exe 87 PID 2424 wrote to memory of 4924 2424 paysafecardgenerator.exe 89 PID 2424 wrote to memory of 4924 2424 paysafecardgenerator.exe 89 PID 2424 wrote to memory of 4864 2424 paysafecardgenerator.exe 91 PID 2424 wrote to memory of 4864 2424 paysafecardgenerator.exe 91 PID 2424 wrote to memory of 3188 2424 paysafecardgenerator.exe 93 PID 2424 wrote to memory of 3188 2424 paysafecardgenerator.exe 93 PID 2424 wrote to memory of 3204 2424 paysafecardgenerator.exe 95 PID 2424 wrote to memory of 3204 2424 paysafecardgenerator.exe 95 PID 2424 wrote to memory of 1100 2424 paysafecardgenerator.exe 97 PID 2424 wrote to memory of 1100 2424 paysafecardgenerator.exe 97 PID 1100 wrote to memory of 4612 1100 cmd.exe 99 PID 1100 wrote to memory of 4612 1100 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe"C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe"C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe\"""3⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe\""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\"""3⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo Set oWS = WScript.CreateObject("WScript.Shell") > create_shortcut.vbs3⤵PID:3688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo sLinkFile = "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network System App Runtime Process.lnk" >> create_shortcut.vbs3⤵PID:4924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo Set oLink = oWS.CreateShortcut(sLinkFile) >> create_shortcut.vbs3⤵PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo oLink.TargetPath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Pages\\Network System App Runtime Process.exe" >> create_shortcut.vbs3⤵PID:3188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo oLink.Save >> create_shortcut.vbs3⤵PID:3204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c create_shortcut.vbs3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\create_shortcut.vbs"4⤵
- Drops startup file
PID:4612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5437395ef86850fbff98c12dff89eb621
SHA19cec41e230fa9839de1e5c42b7dbc8b31df0d69c
SHA2569c39f3e1ee674a289926fddddfc5549740c488686ec6513f53848a225c192ba6
SHA512bc669893f5c97e80a62fc3d15383ed7c62ffc86bc986401735903019bb96a5f13e4d0f6356baa2021267503a4eb62681e58e28fcff435350e83aa425fa76cd64
-
Filesize
944B
MD5e9688ab6235d42a37b41f2c9bccede30
SHA1731fc10fc2a48424516d9219aeb98eb40ec3b112
SHA2565522b52191a06d7b2314ceef9a3fb7963ae0c334e83912acced419f2fd786da0
SHA512c4c4b256a6251c0b5ecfe9afc4de52475280867273107aa7ff51eed101115de020545be8d643628f409cf8858d90e3256f108fb8b56ac491eb93249ce45cf49b
-
Filesize
559KB
MD5c3d497b0afef4bd7e09c7559e1c75b05
SHA1295998a6455cc230da9517408f59569ea4ed7b02
SHA2561e57a6df9e3742e31a1c6d9bff81ebeeae8a7de3b45a26e5079d5e1cce54cd98
SHA512d5c62fdac7c5ee6b2f84b9bc446d5b10ad1a019e29c653cfdea4d13d01072fdf8da6005ad4817044a86bc664d1644b98a86f31c151a3418be53eb47c1cfae386
-
Filesize
99KB
MD58697c106593e93c11adc34faa483c4a0
SHA1cd080c51a97aa288ce6394d6c029c06ccb783790
SHA256ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833
SHA512724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987
-
Filesize
43KB
MD521ae0d0cfe9ab13f266ad7cd683296be
SHA1f13878738f2932c56e07aa3c6325e4e19d64ae9f
SHA2567b8f70dd3bdae110e61823d1ca6fd8955a5617119f5405cdd6b14cad3656dfc7
SHA5126b2c7ce0fe32faffb68510bf8ae1b61af79b2d8a2d1b633ceba3a8e6a668a4f5179bb836c550ecac495b0fc413df5fe706cd6f42e93eb082a6c68e770339a77c
-
Filesize
861KB
MD52c7528407abfd7c6ef08f7bcf2e88e21
SHA1ee855c0cde407f9a26a9720419bf91d7f1f283a7
SHA256093ab305d9780373c3c7d04d19244f5e48c48e71958963ceca6211d5017a4441
SHA51293e7c12a6038778fcda30734d933b869f93e3b041bb6940852404641a599fe9c8ee1168a2e99dcfb624f84c306aff99757d17570febabc259908c8f6cda4dbea
-
Filesize
83KB
MD56c7565c1efffe44cb0616f5b34faa628
SHA188dd24807da6b6918945201c74467ca75e155b99
SHA256fe63361f6c439c6aa26fd795af3fd805ff5b60b3b14f9b8c60c50a8f3449060a
SHA512822445c52bb71c884461230bb163ec5dee0ad2c46d42d01cf012447f2c158865653f86a933b52afdf583043b3bf8ba7011cc782f14197220d0325e409aa16e22
-
Filesize
122KB
MD529da9b022c16da461392795951ce32d9
SHA10e514a8f88395b50e797d481cbbed2b4ae490c19
SHA2563b4012343ef7a266db0b077bbb239833779192840d1e2c43dfcbc48ffd4c5372
SHA5125c7d83823f1922734625cf69a481928a5c47b6a3bceb7f24c9197175665b2e06bd1cfd745c55d1c5fe1572f2d8da2a1dcc1c1f5de0903477bb927aca22ecb26a
-
Filesize
63KB
MD5f377a418addeeb02f223f45f6f168fe6
SHA15d8d42dec5d08111e020614600bbf45091c06c0b
SHA2569551431425e9680660c6baf7b67a262040fd2efceb241e4c9430560c3c1fafac
SHA5126f60bfac34ed55ff5d6ae10c6ec5511906c983e0650e5d47dac7b8a97a2e0739266cae009449cced8dff59037e2dbfc92065fbbdfde2636d13679e1629650280
-
Filesize
157KB
MD5b5355dd319fb3c122bb7bf4598ad7570
SHA1d7688576eceadc584388a179eed3155716c26ef5
SHA256b9bc7f1d8aa8498cb8b5dc75bb0dbb6e721b48953a3f295870938b27267fb5f5
SHA5120e228aa84b37b4ba587f6d498cef85aa1ffec470a5c683101a23d13955a8110e1c0c614d3e74fb0aa2a181b852bceeec0461546d0de8bcbd3c58cf9dc0fb26f5
-
Filesize
27KB
MD54ab2ceb88276eba7e41628387eacb41e
SHA158f7963ba11e1d3942414ef6dab3300a33c8a2bd
SHA256d82ab111224c54bab3eefdcfeb3ba406d74d2884518c5a2e9174e5c6101bd839
SHA512b0d131e356ce35e603acf0168e540c89f600ba2ab2099ccf212e0b295c609702ac4a7b0a7dbc79f46eda50e7ea2cf09917832345dd8562d916d118aba2fa3888
-
Filesize
77KB
MD5f5dd9c5922a362321978c197d3713046
SHA14fbc2d3e15f8bb21ecc1bf492f451475204426cd
SHA2564494992665305fc9401ed327398ee40064fe26342fe44df11d89d2ac1cc6f626
SHA512ce818113bb87c6e38fa85156548c6f207aaab01db311a6d8c63c6d900d607d7beff73e64d717f08388ece4b88bf8b95b71911109082cf4b0c0a9b0663b9a8e99
-
Filesize
149KB
MD5ef4755195cc9b2ff134ea61acde20637
SHA1d5ba42c97488da1910cf3f83a52f7971385642c2
SHA2568a86957b3496c8b679fcf22c287006108bfe0bb0aaffea17121c761a0744b470
SHA51263ad2601fb629e74cf60d980cec292b6e8349615996651b7c7f68991cdae5f89b28c11adb77720d7dbbd7700e55fdd5330a84b4a146386cf0c0418a8d61a8a71
-
Filesize
1006KB
MD5486164529c839339cd0ff0388a6c577c
SHA148fc3473a5aa704d56315039fe725f87fdea457b
SHA25638ceb5c89d72f0aeed6db30d35b027c5a5185dfeb1bb0e2dbe66e9a287e9815d
SHA512a880c63e640222da2c1513de9631d1517cacad83bcec2667ff18f445c9e7287d47769df6bb8346d6f8ea978f3bc99ae24c5ce4ef7e19513c4ea2ee3a17041e80
-
Filesize
279KB
MD57adbcc03e8c4f261c08db67930ec6fdd
SHA1edc6158964acc5999ed5413575dd9a650a6bcdb2
SHA256de5f02716b7fa8be36d37d2b1a2783dd22ee7c80855f46d8b4684397f11754f2
SHA51258299ed51d66a801e2927d13c4304b7020eac80982559c7b898c46909d0bc902eb13fea501bd600c8c19739736289342bae227510c85702b7f04bd80d5a9c723
-
Filesize
3.2MB
MD5cc4cbf715966cdcad95a1e6c95592b3d
SHA1d5873fea9c084bcc753d1c93b2d0716257bea7c3
SHA256594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1
SHA5123b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
673KB
MD5bc778f33480148efa5d62b2ec85aaa7d
SHA1b1ec87cbd8bc4398c6ebb26549961c8aab53d855
SHA2569d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843
SHA51280c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173
-
Filesize
57KB
MD53c88de1ebd52e9fcb46dc44d8a123579
SHA17d48519d2a19cac871277d9b63a3ea094fbbb3d9
SHA2562b22b6d576118c5ae98f13b75b4ace47ab0c1f4cd3ff098c6aee23a8a99b9a8c
SHA5121e55c9f7ac5acf3f7262fa2f3c509ee0875520bb05d65cd68b90671ac70e8c99bce99433b02055c07825285004d4c5915744f17eccfac9b25e0f7cd1bee9e6d3
-
Filesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6
-
Filesize
26KB
MD57a442bbcc4b7aa02c762321f39487ba9
SHA10fcb5bbdd0c3d3c5943e557cc2a5b43e20655b83
SHA2561dd7bba480e65802657c31e6d20b1346d11bca2192575b45eb9760a4feb468ad
SHA5123433c46c7603ae0a73aa9a863b2aecd810f8c0cc6c2cd96c71ef6bde64c275e0fceb4ea138e46a5c9bf72f66dcdea3e9551cf2103188a1e98a92d8140879b34c
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
1.1MB
MD58320c54418d77eba5d4553a5d6ec27f9
SHA1e5123cf166229aebb076b469459856a56fb16d7f
SHA2567e719ba47919b668acc62008079c586133966ed8b39fec18e312a773cb89edae
SHA512b9e6cdcb37d26ff9c573381bda30fa4cf1730361025cd502b67288c55744962bdd0a99790cedd4a48feef3139e3903265ab112ec545cb1154eaa2a91201f6b34
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6.7MB
MD5984704ebd3a9b37173510c21ca9a9aea
SHA12aa0d577c6e6c4ffa298db35115a2c0a9ab5b4bf
SHA256b6617e188fd0a5f78280b0c972bf92d44b12fffacf6b02c86abab266565b8207
SHA51262fa47ed18dcedac1205e356742b81172c9b207326c157269c698d202f23da8f4c0737803e3fa256da1286c5a477229bc597cc8a8d5d36ff16521bc7758d2dea
-
Filesize
182B
MD58e08cd9ff419b6425f25e8786175e374
SHA1ad9bf757f97662ad4584eb5cc6b984ffede294ea
SHA2560ece1a539ed5bf596d72f68a8ae59b0e1c21400f3c4534505a3bfb7c2eed245d
SHA512d847677e05de14ab662ecf4ba7873b9ed6c567e282963d8d908b1efc470cb865733b2edc5979ea3b894441157f04713bf8b848b6945a3a85ad46aa7c0b1d5df9
-
Filesize
226B
MD512a7a2a148bbcc75d09d686281e4d2c8
SHA129854f107a9adbf4fd50d961664442c2ce46634f
SHA2562370fc9ec0b9a95bfed7bfd7749cb60e6cabbdeb311b6be9ed809b2f7a2b5eb8
SHA512253b2f41eb21ae1e381043261a81d733f2aa9e7b19f9953ca57df489f8d7a25841c40cf9ad263c693a09ff19cdf57c12d86e0a1f1b727afae884503832b164b5
-
Filesize
351B
MD53720fb8cfa60183e6673e652722628ee
SHA1c4760b44d1c8d8bdbcbe9a82133b7a4e73d99773
SHA256e1e55cfda0de8141d98ebf9a46c00a5f502583e704dbee92228eae1625f6a2a8
SHA512a0d714e2c6edcbd616d8ac91bc974995f40cf32d2fd51a797e281435612e3155a9f2c9c83bbd5b13e4220bdc5db5f4e8649161855377a5791ae6dd8d5d6f1e69
-
Filesize
364B
MD5f5989b37ae11b13b4702a29df259a1a3
SHA1f937ba426066e6f6db28e1c833ae1b1e65757a96
SHA25666f8d8241c9797b3e21feed1f110f1741684768d01be998d1590c50ee4946b01
SHA512db488e1e63b8c6036e918e3bd0970bf00607a0105ce57487756416d7c1346884d880b38389383762e14cae49118794d9b715c6d5ef795bf4bf85d5dfd266580b