Malware Analysis Report

2024-08-06 15:11

Sample ID 240521-lrbefsgh37
Target IMG1024785000.exe
SHA256 68d48d53b40a2c1c905dcfbb4062066dfdf38f24440da5ac3a679e466a96bf1e
Tags
agenttesla nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

68d48d53b40a2c1c905dcfbb4062066dfdf38f24440da5ac3a679e466a96bf1e

Threat Level: Known bad

The file IMG1024785000.exe was found to be: Known bad.

Malicious Activity Summary

agenttesla nanocore evasion keylogger persistence spyware stealer trojan

AgentTesla

NanoCore

Reads user/profile data of local email clients

Checks computer location settings

Loads dropped DLL

Reads WinSCP keys stored on the system

Executes dropped EXE

Reads data files stored by FTP clients

Reads user/profile data of web browsers

Adds Run key to start application

Looks up external IP address via web service

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-21 09:45

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 09:45

Reported

2024-05-21 09:47

Platform

win7-20240508-en

Max time kernel

102s

Max time network

103s

Command Line

"C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepads = "C:\\Users\\Admin\\AppData\\Roaming\\notepads.exe" C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepads = "C:\\Users\\Admin\\AppData\\Roaming\\notepads.exe" C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A
N/A ip-api.com N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1444 set thread context of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 2952 set thread context of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1444 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 1444 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 1444 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 1444 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 1444 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 2952 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe

"C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe"

C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe

"C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe"

C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe

"C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\system32\LogonUI.exe

"LogonUI.exe" /flags:0x0

C:\Windows\system32\LogonUI.exe

"LogonUI.exe" /flags:0x1

Network

Country Destination Domain Proto
UA 193.238.153.34:80 193.238.153.34 tcp
UA 193.238.153.34:80 193.238.153.34 tcp
US 8.8.8.8:53 api.ipify.org udp
US 104.26.12.205:443 api.ipify.org tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
NL 94.156.68.219:2323 tcp
NL 94.156.68.219:2323 tcp

Files

memory/1444-0-0x00000000747AE000-0x00000000747AF000-memory.dmp

memory/1444-1-0x0000000000C70000-0x0000000000CE6000-memory.dmp

memory/1444-2-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/1444-3-0x0000000008640000-0x00000000088A0000-memory.dmp

memory/1444-10-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-4-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-5-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-7-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-11-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-13-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-15-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-17-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-21-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-25-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-23-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-19-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-27-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-29-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-35-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-47-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-63-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-31-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-67-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-65-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-61-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-59-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-4890-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/1444-57-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-55-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-53-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-51-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-4891-0x0000000000580000-0x0000000000586000-memory.dmp

memory/1444-4893-0x0000000000C20000-0x0000000000C6C000-memory.dmp

memory/1444-4892-0x0000000004520000-0x00000000045BC000-memory.dmp

memory/1444-49-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-45-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-43-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-41-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-39-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-37-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-33-0x0000000008640000-0x000000000889A000-memory.dmp

memory/1444-4894-0x00000000747AE000-0x00000000747AF000-memory.dmp

memory/1444-4895-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/1444-4896-0x00000000747A0000-0x0000000074E8E000-memory.dmp

\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe

MD5 3096b4b10cadb369dfe4bf9baeb90fb9
SHA1 9c4901dd318cb7aa215b5b9729c368d0567cc42c
SHA256 7369e401e7fc860dca295f09625f4ef16235db5cad392e1c6ab4607c22b729dd
SHA512 49297c01ade6fcf408e2defc6f143ca7db2822acd2d2a9d9614e2272f7df02d64d815f262d158441c695769ae917a5a9216b86185377e817ce2f980f688c84f8

memory/2952-4904-0x0000000000BF0000-0x0000000000C66000-memory.dmp

memory/2952-4908-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/2952-4907-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/1444-4905-0x0000000004DC0000-0x0000000004E14000-memory.dmp

memory/1444-4930-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/756-4929-0x0000000000080000-0x00000000000C2000-memory.dmp

memory/2952-4931-0x0000000008660000-0x00000000088A2000-memory.dmp

memory/2952-9819-0x0000000005470000-0x00000000054EE000-memory.dmp

memory/2952-9818-0x0000000000A40000-0x0000000000A46000-memory.dmp

memory/2952-9820-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/2952-9821-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/2952-9822-0x0000000005420000-0x0000000005474000-memory.dmp

\??\c:\users\admin\appdata\roaming\notepads.exe

MD5 e4d993636d1f74d98a75cb395abedad7
SHA1 4a9975e85ab462ec42bc0f26359d038179b1279c
SHA256 eac80a5ed4b081d8a1dfe4758a5c0ab17a824fa871ea9b9753e1ef469ce965b1
SHA512 73912d0c499fc322da1b267454a5a2f6957adbea03864354dff5fc8315731ecf37500cead88785ce45b881976d7cd44b1b24f66427538b6bb648d3833bdc8052

memory/1672-9837-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2952-9838-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/1672-9840-0x00000000006F0000-0x00000000006FA000-memory.dmp

memory/1672-9841-0x0000000000720000-0x000000000073E000-memory.dmp

memory/1672-9842-0x0000000000710000-0x000000000071A000-memory.dmp

memory/1672-9845-0x0000000000880000-0x0000000000892000-memory.dmp

memory/1672-9846-0x0000000000A60000-0x0000000000A7A000-memory.dmp

memory/1672-9847-0x0000000000A90000-0x0000000000A9E000-memory.dmp

memory/1672-9850-0x00000000025D0000-0x00000000025DE000-memory.dmp

memory/1672-9851-0x00000000025E0000-0x00000000025F4000-memory.dmp

memory/1672-9849-0x00000000025C0000-0x00000000025CC000-memory.dmp

memory/1672-9848-0x00000000025A0000-0x00000000025B2000-memory.dmp

memory/1672-9852-0x0000000004B70000-0x0000000004B80000-memory.dmp

memory/1672-9853-0x0000000004B80000-0x0000000004B94000-memory.dmp

memory/1672-9854-0x0000000004B90000-0x0000000004B9E000-memory.dmp

memory/1672-9855-0x0000000005190000-0x00000000051BE000-memory.dmp

memory/1672-9856-0x0000000004F90000-0x0000000004FA4000-memory.dmp

memory/1672-9858-0x0000000005210000-0x0000000005220000-memory.dmp

C:\Users\Admin\AppData\Roaming\A42634AA-F501-41CF-BED1-B8158857DA02\settings.bin

MD5 4e5e92e2369688041cc82ef9650eded2
SHA1 15e44f2f3194ee232b44e9684163b6f66472c862
SHA256 f8098a6290118f2944b9e7c842bd014377d45844379f863b00d54515a8a64b48
SHA512 1b368018907a3bc30421fda2c935b39dc9073b9b1248881e70ad48edb6caa256070c1a90b97b0f64bbe61e316dbb8d5b2ec8dbabcd0b0b2999ab50b933671ecb

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 09:45

Reported

2024-05-21 09:48

Platform

win10v2004-20240226-en

Max time kernel

132s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\notepads = "C:\\Users\\Admin\\AppData\\Roaming\\notepads.exe" C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3104 set thread context of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3104 wrote to memory of 5068 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 3104 wrote to memory of 5068 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 3104 wrote to memory of 5068 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe
PID 3104 wrote to memory of 3468 N/A C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe

Processes

C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe

"C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3928 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8

C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe

"C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe"

C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe

"C:\Users\Admin\AppData\Local\Temp\IMG1024785000.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
UA 193.238.153.34:80 193.238.153.34 tcp
US 8.8.8.8:53 34.153.238.193.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 56.94.73.104.in-addr.arpa udp
GB 172.217.169.74:443 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
UA 193.238.153.34:80 193.238.153.34 tcp
US 8.8.8.8:53 api.ipify.org udp
US 104.26.12.205:443 api.ipify.org tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 205.12.26.104.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 66.29.151.236:587 tcp
US 8.8.8.8:53 236.151.29.66.in-addr.arpa udp
US 8.8.8.8:53 137.71.105.51.in-addr.arpa udp

Files

memory/3104-0-0x000000007512E000-0x000000007512F000-memory.dmp

memory/3104-1-0x0000000000040000-0x00000000000B6000-memory.dmp

memory/3104-2-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3104-3-0x0000000006E00000-0x0000000007060000-memory.dmp

memory/3104-5-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-23-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-21-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-29-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-41-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-53-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-65-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-57-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-55-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-51-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-49-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-47-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-45-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-43-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-39-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-37-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-35-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-33-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-31-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-27-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-19-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-17-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-15-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-13-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-11-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-9-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-26-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-7-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-4-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-67-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-63-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-61-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-59-0x0000000006E00000-0x000000000705A000-memory.dmp

memory/3104-4890-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3104-4891-0x0000000000520000-0x0000000000526000-memory.dmp

memory/3104-4892-0x00000000009C0000-0x0000000000A5C000-memory.dmp

memory/3104-4893-0x0000000000A60000-0x0000000000AAC000-memory.dmp

memory/3104-4894-0x000000007512E000-0x000000007512F000-memory.dmp

memory/3104-4895-0x0000000075120000-0x00000000758D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Pgfmnlkveb.exe

MD5 3096b4b10cadb369dfe4bf9baeb90fb9
SHA1 9c4901dd318cb7aa215b5b9729c368d0567cc42c
SHA256 7369e401e7fc860dca295f09625f4ef16235db5cad392e1c6ab4607c22b729dd
SHA512 49297c01ade6fcf408e2defc6f143ca7db2822acd2d2a9d9614e2272f7df02d64d815f262d158441c695769ae917a5a9216b86185377e817ce2f980f688c84f8

memory/5068-4907-0x0000000000310000-0x0000000000386000-memory.dmp

memory/5068-4908-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3104-4909-0x00000000089A0000-0x0000000008F44000-memory.dmp

memory/3104-4910-0x0000000005460000-0x00000000054B4000-memory.dmp

memory/5068-4911-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3468-4915-0x0000000000400000-0x0000000000442000-memory.dmp

memory/3468-4916-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3468-4919-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3104-4918-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3468-4917-0x0000000005B90000-0x0000000005BF6000-memory.dmp

memory/5068-4920-0x00000000080D0000-0x0000000008312000-memory.dmp

memory/3468-6556-0x0000000006FC0000-0x0000000007010000-memory.dmp

memory/3468-6557-0x00000000070B0000-0x000000000714C000-memory.dmp

memory/3468-7722-0x0000000007150000-0x00000000071E2000-memory.dmp

memory/3468-7775-0x0000000007060000-0x000000000706A000-memory.dmp