Resubmissions

13-12-2024 18:12

241213-wtcqeawrft 10

06-05-2024 14:46

240506-r5graaab73 10

06-05-2024 14:29

240506-rtzgysed6x 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-05-2024 14:29

General

  • Target

    105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9.exe

  • Size

    1.5MB

  • MD5

    3b6864d7fd3baca4f3bcca0736c26617

  • SHA1

    dbbbfa7e960b6d7e5b58494970f1acffc3b0cca6

  • SHA256

    105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9

  • SHA512

    69e0444f34c7cb13bed561bbd0d86e1896d31bce3c99308f01eda43d2caff99741bca9609f0a028b9135653999c98f86e19b91414ec5953ac327a695f2275b74

  • SSDEEP

    24576:+EONo4rUDDLp8NrZTsB3+lTXEkiNu3Z7el9i7Sm6JO0EQuEtA7wMkW:+EOec6Pp4eBulTFiNuJSeSmyHEQuRLkW

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.93:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 54 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9.exe
    "C:\Users\Admin\AppData\Local\Temp\105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
      "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
        "C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"
        3⤵
          PID:2184
        • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
            "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:3736
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
              5⤵
              • Loads dropped DLL
              PID:1872
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                6⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                PID:2400
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  7⤵
                    PID:3116
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\551177587377_Desktop.zip' -CompressionLevel Optimal
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3516
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                PID:2292
          • C:\Users\Admin\AppData\Local\Temp\1000020001\355d94a1f8.exe
            "C:\Users\Admin\AppData\Local\Temp\1000020001\355d94a1f8.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            PID:4980
          • C:\Users\Admin\1000021002\1966ba4e51.exe
            "C:\Users\Admin\1000021002\1966ba4e51.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3716
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
              4⤵
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2556
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe6874ab58,0x7ffe6874ab68,0x7ffe6874ab78
                5⤵
                  PID:1848
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:2
                  5⤵
                    PID:4708
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1584 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:8
                    5⤵
                      PID:4460
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:8
                      5⤵
                        PID:1304
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:1
                        5⤵
                          PID:4000
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:1
                          5⤵
                            PID:1404
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4188 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:1
                            5⤵
                              PID:912
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:8
                              5⤵
                                PID:3508
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:8
                                5⤵
                                  PID:5072
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4412 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:8
                                  5⤵
                                    PID:4340
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2388 --field-trial-handle=1848,i,15803422831484434003,1770275437428736969,131072 /prefetch:2
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4940
                          • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            PID:3552
                          • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                            1⤵
                              PID:4860
                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2112
                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              PID:3524
                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              PID:1168
                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:484

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\1000021002\1966ba4e51.exe

                              Filesize

                              1.1MB

                              MD5

                              9c8cd66ca976be3f4c9ee6aacd17fc6a

                              SHA1

                              ba9fe161459e77ba5d6c0c6067f735c6849f68e6

                              SHA256

                              9dc9dacfeb72ba5195c184987dd73a2e0947881d7a938b946147b97ce4145fcf

                              SHA512

                              37b03daf3556001debdc35f8ad771e8599ec176aef9036d5960ce6b6d4a018e7abbef8413db339b6fd97d146466cf66d284242e85abf2a5f38525e312941e968

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              216B

                              MD5

                              4debdc57a0e5b9c69e37547284ce4fc0

                              SHA1

                              cbbbb227756ad3939237707dbafb6fd2242ff3b1

                              SHA256

                              2a0a3f12ead0e9e7b706a50b71495b2ea2742e8f4d0785177a24bdfed2ad9c12

                              SHA512

                              05770579d7e7cceb534850ca282edaeb4d6481f4c8572eee7f6a1500de2d42a0789b2d4913e06701a4adb9ea6dddf7eb542a5eed1f64c908443730bb6b2af9db

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              762de2d62665613b4aff83f54d6873e2

                              SHA1

                              c452e35e675b29dd2bef16b960ba5b4711c3a1bc

                              SHA256

                              d1d4ccdf0bbf6b9e6d183a1814eed340568277ce8a58abeadee797efe858ed81

                              SHA512

                              e10ba9f43614d0c5dd2367e9d6e7b160dc14e24d12c89b03afc0612aa932c5fdf96f44e0494efe5d5b2a5573f7c55d42008fa847be4898828262487e02f4867f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              5bebff90c71ac94531aab913474c99be

                              SHA1

                              112907527d587777067f916ed53fea3c721a0dd3

                              SHA256

                              7fdf33b4ba9b999d604c3742090d50ab3dc62dbccb6ce5b83945dae6d1306f53

                              SHA512

                              71375274f674c316783d944634ce8b0b276da21046e5d72aba73c1da324744a7c23eda4c4f67472681a899ddb57847513e868dc604dc0b762988248f8a70db74

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              692B

                              MD5

                              5561b2e8446b9bd61134ef65ccb8213f

                              SHA1

                              00e3da8c01e94231b020583cef3dcf0cc76e4bb2

                              SHA256

                              1c5bf6cf7a170ea78b843de0e16c3ce1d74530bc6637329e11b864025399683c

                              SHA512

                              f270df3d334bde88b5c005e12a2bf0f478bd31c9739ae5323dc02d4f64d06fa9e0e9a3bdf6735b755561aff33e62b146f0981df7c8891978882488014e46d829

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              7KB

                              MD5

                              3651b1874d6704fa77bcafa933d91a27

                              SHA1

                              6b80cddae0c03f1179f86eeea880c2ce9e378cbe

                              SHA256

                              167312822aee30b01eb545cb681438c05f2932982c7ad74d10a5b43c5b3e0baa

                              SHA512

                              3e6290ff2960683863b08c6dcb714f3e1e170dcfde3fad7964da32ab22ba0ea921123a13a068f669ea27d7f6b2d0dce7e6c87c8ae0099b1ecb3d94f8bb2f0b09

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              16KB

                              MD5

                              cb3d4f98750d96fa295632773cd0c7c2

                              SHA1

                              c84019e83f5da6f5cdb4dd8ac75f540f5b411994

                              SHA256

                              5c0968a56aadba0a679c85446dd58f2694d54cc290eaa1b16818798e94c0a490

                              SHA512

                              f6a55672913ceac01404acbada4902f978f55260f80d6286ca48f9237da7c95ba7201d5120dffe84c43a8308b2f905f8fe2130d9f5f5f28005ddeea2bb389b9c

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              255KB

                              MD5

                              b4de847a9aae21d081d4e11295716f92

                              SHA1

                              d1b1364d4f196548e0616d403ed386b31c7f1030

                              SHA256

                              56e339b9e51e046c2df3fae115839b3e7189b51aa31724a5ce2c4949d6c9c718

                              SHA512

                              2a27a5ccadf85cd0ec6c8f1123878524682962966bcd5c7e151d18682cd994de0173195e40d76909790727a8cb11a90c64fbec05553c185ea4d0c058694200ed

                            • C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe

                              Filesize

                              1.8MB

                              MD5

                              c66c819d56140112be09ad8176c3a7dd

                              SHA1

                              3f06e3d5e0dc91eae408a08e09953b3954860306

                              SHA256

                              22fa54e9515ca7503032a3a374582f8e7152cb411150094ed622e1b47aafcbcd

                              SHA512

                              cde6bd25d67f71d86adfaa62f86fa439d648547a509c56fa01b9ed360a842261b72076e5cf1dd0b4c0966d33501e065a6ab1e80cf7e4213478cbe0db8b9eb4b5

                            • C:\Users\Admin\AppData\Local\Temp\1000020001\355d94a1f8.exe

                              Filesize

                              2.1MB

                              MD5

                              3acb99dd2f73992b4daabfd559575d20

                              SHA1

                              8389f11a53e90e9589862ffa4376a8bb5162add0

                              SHA256

                              d21e2ad9a32dbd8469b77f1d331a526b80e3c4f6b073e2e4846c5d8016a2a9c9

                              SHA512

                              f0061737961807a09782198830f843a50a33a307f929c849b68eaf2d7339474d5265b19a1514e536d4d7d4143febcf2aeec2bd5812769f5adda766b4b1203794

                            • C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

                              Filesize

                              1.5MB

                              MD5

                              3b6864d7fd3baca4f3bcca0736c26617

                              SHA1

                              dbbbfa7e960b6d7e5b58494970f1acffc3b0cca6

                              SHA256

                              105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9

                              SHA512

                              69e0444f34c7cb13bed561bbd0d86e1896d31bce3c99308f01eda43d2caff99741bca9609f0a028b9135653999c98f86e19b91414ec5953ac327a695f2275b74

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lqvu0uau.dhj.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                              Filesize

                              109KB

                              MD5

                              726cd06231883a159ec1ce28dd538699

                              SHA1

                              404897e6a133d255ad5a9c26ac6414d7134285a2

                              SHA256

                              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                              SHA512

                              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                              Filesize

                              1.2MB

                              MD5

                              15a42d3e4579da615a384c717ab2109b

                              SHA1

                              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                              SHA256

                              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                              SHA512

                              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                            • memory/484-321-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/484-317-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/576-8-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-4-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-3-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-2-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-21-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-6-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-7-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-5-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-0-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/576-1-0x0000000000730000-0x0000000000C17000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/1168-319-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/1168-308-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2112-272-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2112-261-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2960-25-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-29-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-73-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-24-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-28-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-30-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-22-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-23-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-26-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-27-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/2960-170-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3516-189-0x000001DF1B7B0000-0x000001DF1B7D2000-memory.dmp

                              Filesize

                              136KB

                            • memory/3516-209-0x000001DF1B7E0000-0x000001DF1B7EA000-memory.dmp

                              Filesize

                              40KB

                            • memory/3516-208-0x000001DF1B9A0000-0x000001DF1B9B2000-memory.dmp

                              Filesize

                              72KB

                            • memory/3524-267-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-269-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-263-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-268-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-270-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-273-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-264-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-266-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3524-265-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-35-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-39-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-41-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-42-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-38-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-37-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-40-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-43-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-36-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3552-34-0x0000000000030000-0x0000000000517000-memory.dmp

                              Filesize

                              4.9MB

                            • memory/3604-59-0x0000000000310000-0x00000000007B6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3604-72-0x0000000000310000-0x00000000007B6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-243-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-258-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-246-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-225-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-74-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-171-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3736-275-0x0000000000130000-0x00000000005D6000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/4980-99-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-98-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-100-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-101-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-97-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-96-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-95-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-94-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-93-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4980-172-0x0000000000900000-0x0000000000F7E000-memory.dmp

                              Filesize

                              6.5MB