Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe
Resource
win7-20240221-en
General
-
Target
f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe
-
Size
4.7MB
-
MD5
ce5a02dbbbecfdf9897726db6ba09a0b
-
SHA1
05a203727a334153388184a030d3eff8534d611a
-
SHA256
f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586
-
SHA512
d7e5a09cd93d4ccb1acac82eecd4b6c055b02792b8846644be028b0b9c11bb24771e2a94c4238267af108329cf86ec937751a876bd3299e4993e5abf7e840454
-
SSDEEP
98304:fFBWQlG4wlD4GfkehReReO2pAiNoXfsQi2GxhDxjM1gh9noS9oMPQq9EsZXQo:e3uD/exAWoP3Imgbo8oMJEsBQo
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2812-115-0x0000000000400000-0x0000000000595000-memory.dmp family_blackmoon behavioral1/memory/616-118-0x0000000000400000-0x0000000000595000-memory.dmp family_blackmoon -
Drops file in Drivers directory 1 IoCs
Processes:
Ahyteq.batdescription ioc process File created C:\Windows\system32\drivers\QAssist.sys Ahyteq.bat -
Executes dropped EXE 4 IoCs
Processes:
1025.exeÒ¬×ÓµçÄÔÒ»Ìå¶Ë.exeAhyteq.batAhyteq.batpid process 2812 1025.exe 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe 2040 Ahyteq.bat 616 Ahyteq.bat -
Loads dropped DLL 5 IoCs
Processes:
f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exeÒ¬×ÓµçÄÔÒ»Ìå¶Ë.exepid process 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1025.exe upx behavioral1/memory/2100-46-0x0000000005350000-0x00000000054E5000-memory.dmp upx behavioral1/memory/2812-50-0x0000000000400000-0x0000000000595000-memory.dmp upx \Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe upx behavioral1/memory/2508-58-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2812-64-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral1/memory/2812-63-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral1/memory/2812-61-0x0000000010000000-0x00000000100BE000-memory.dmp upx behavioral1/memory/2812-115-0x0000000000400000-0x0000000000595000-memory.dmp upx behavioral1/memory/616-118-0x0000000000400000-0x0000000000595000-memory.dmp upx behavioral1/memory/2508-141-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
Processes:
Ahyteq.batAhyteq.bat1025.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\821063af[1].htm Ahyteq.bat File opened for modification C:\Windows\SysWOW64\ini.ini Ahyteq.bat File opened for modification C:\Windows\SysWOW64\ini.ini 1025.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Ahyteq.bat File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA Ahyteq.bat File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA Ahyteq.bat File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464 Ahyteq.bat File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464 Ahyteq.bat -
Drops file in Windows directory 2 IoCs
Processes:
1025.exedescription ioc process File created C:\windows\Ahyteq.bat 1025.exe File opened for modification C:\windows\Ahyteq.bat 1025.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 788 ipconfig.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Ahyteq.batAhyteq.batdescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Ahyteq.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B0A350E-8A80-4CD5-B11A-E6AFC8AEC92C}\WpadDecisionTime = 60fac47b54acda01 Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B0A350E-8A80-4CD5-B11A-E6AFC8AEC92C}\WpadDecisionReason = "1" Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs Ahyteq.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-16-ee-13-b7-b8\WpadDecisionTime = 60fac47b54acda01 Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-16-ee-13-b7-b8\WpadDecision = "0" Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B0A350E-8A80-4CD5-B11A-E6AFC8AEC92C}\WpadDecision = "0" Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Ahyteq.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 Ahyteq.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-16-ee-13-b7-b8\WpadDecisionReason = "1" Ahyteq.bat Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs Ahyteq.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B0A350E-8A80-4CD5-B11A-E6AFC8AEC92C}\WpadNetworkName = "Network 3" Ahyteq.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Ahyteq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Ahyteq.bat -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Ahyteq.batdescription pid process Token: 33 616 Ahyteq.bat Token: SeIncBasePriorityPrivilege 616 Ahyteq.bat Token: 33 616 Ahyteq.bat Token: SeIncBasePriorityPrivilege 616 Ahyteq.bat -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exeÒ¬×ÓµçÄÔÒ»Ìå¶Ë.exepid process 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exeAhyteq.batÒ¬×ÓµçÄÔÒ»Ìå¶Ë.execmd.execmd.exedescription pid process target process PID 2100 wrote to memory of 2812 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 1025.exe PID 2100 wrote to memory of 2812 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 1025.exe PID 2100 wrote to memory of 2812 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 1025.exe PID 2100 wrote to memory of 2812 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe 1025.exe PID 2100 wrote to memory of 2508 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe PID 2100 wrote to memory of 2508 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe PID 2100 wrote to memory of 2508 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe PID 2100 wrote to memory of 2508 2100 f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe PID 2040 wrote to memory of 616 2040 Ahyteq.bat Ahyteq.bat PID 2040 wrote to memory of 616 2040 Ahyteq.bat Ahyteq.bat PID 2040 wrote to memory of 616 2040 Ahyteq.bat Ahyteq.bat PID 2040 wrote to memory of 616 2040 Ahyteq.bat Ahyteq.bat PID 2508 wrote to memory of 1416 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe cmd.exe PID 2508 wrote to memory of 1416 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe cmd.exe PID 2508 wrote to memory of 1416 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe cmd.exe PID 2508 wrote to memory of 1416 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe cmd.exe PID 1416 wrote to memory of 1400 1416 cmd.exe cmd.exe PID 1416 wrote to memory of 1400 1416 cmd.exe cmd.exe PID 1416 wrote to memory of 1400 1416 cmd.exe cmd.exe PID 1416 wrote to memory of 1400 1416 cmd.exe cmd.exe PID 1400 wrote to memory of 1788 1400 cmd.exe netsh.exe PID 1400 wrote to memory of 1788 1400 cmd.exe netsh.exe PID 1400 wrote to memory of 1788 1400 cmd.exe netsh.exe PID 1400 wrote to memory of 1788 1400 cmd.exe netsh.exe PID 2508 wrote to memory of 788 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe ipconfig.exe PID 2508 wrote to memory of 788 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe ipconfig.exe PID 2508 wrote to memory of 788 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe ipconfig.exe PID 2508 wrote to memory of 788 2508 Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe"C:\Users\Admin\AppData\Local\Temp\f5ed77a77ea3fdf415e3379b8c3aa9480dd07a401da54dc4a2fcf2fcce807586.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\1025.exe"C:\Users\Admin\AppData\Local\Temp\1025.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe"C:\Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd.exe /c cmd /c netsh interface ip set dns Local Area Connection static 114.114.114.1143⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.execmd /c netsh interface ip set dns Local Area Connection static 114.114.114.1144⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\netsh.exenetsh interface ip set dns Local Area Connection static 114.114.114.1145⤵PID:1788
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:788
-
C:\windows\Ahyteq.batC:\windows\Ahyteq.bat -auto1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\windows\Ahyteq.batC:\windows\Ahyteq.bat -acsi2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\lib\clientFilesize
2.1MB
MD500527359b17835fe4fc01a4f1879afa2
SHA1445f327fa1a67efe30e4d4b5f3eda6c154f0764b
SHA2562a96314fe40b19791df90e6dd95ff91f7de53414d4ba1ecfb18c329ae6f18723
SHA512bdab38fbac29a95008da4ad850adbf4594b00dfa8d8518c49db55868932bcaf8e4b0ade907de743092211499570397b12103a8ad4d6013f72fdfd462ed467bfc
-
C:\Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\lib\krnln.fnrFilesize
1.2MB
MD51eece63319e7c5f6718562129b1572f1
SHA1089ea3a605639eb1292f6a2a9720f0b2801b0b6e
SHA2564bed8a6e4e1548fddee40927b438132b47ef2aca6e9beb06b89fcf7714726310
SHA51213537d1dd80fa87b6b908361957e8c434ca547a575c8c8aab43423063e60cb5523fb1843a467ae73db4a64d278c06b831551e78ae6d895201f7ef0c5b162c1ab
-
C:\Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\lib\libcurl.dllFilesize
1.3MB
MD54f46e64aa3daa556ecca1da1f6c8e8e5
SHA1b949c14ef228d5253f243fee44312681b340e2db
SHA2567376d07ec6b98cbff685d6e97cbdfed97f0f55701245fafd5d2a71fc686822e5
SHA51266cb5582a0fd05b70d9d2dc3daac93f87677488373b0f07f729d9f579e56f4beb014eea88fabdab6a0887bb77fb0b6ec3316069568fa4a799dabbd3c438dcc47
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD56728aea2631b86a76c237508d8ba9b55
SHA17a670f95cac088313f7558869162fe01c6dc0ec9
SHA256e1dd7380c6df33cd5702b032e0e359029d3ef7630f06ceb42cfdc154fd0baf7b
SHA512533080cd1ec40b8530cad5c9914e0a5156d225f7392283ed2607eda4f1db4a6930002274060ed9130a6f634222c2e15818e16a50579cfe7f5274d028d31212f5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5452b7f82815ca608f0b7c3107ae30301
SHA18b3491b3a239fc4757e3a9e95a46fad8646e9822
SHA25669d288878c233a01724af9c280aee515842f0c3e207366d3356e8d4af72eb7da
SHA512e6bf86b2b479f995392b7fe9c13e355bbb3fe1abec38750c0f37fbddea700b5d3e6a7a7244d6583372871fa5db20850b4d46a269c4e62a3a91de971fa8c65a40
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD55c9ce292a7c9a3e80ce2d556fc29504d
SHA1acba956101cc0d1576b576304a268b8a71467dad
SHA2560d423024cf4979fc57f52745632cff590cb6243edc3670931dfa01c6b3dcc96b
SHA51263060741348ee0b41d13eee9241abf9af4eb2614ab541d185389825cc1d29979926dcf0959fb5b2fcbdf2bc912fd592bda727d54a0862f3cd4af275cba7f251c
-
C:\Windows\SysWOW64\ini.iniFilesize
19B
MD5fe9af7587d65300338177538aa72f924
SHA1c8ae231d3ae13f9db8b9f16e188e951e7cb76377
SHA256556243e27a369fbdff1ecfb413b7540f1eb4e6becba03b76d221443b0d022351
SHA5123bffe70c5daea4d6be501278be067bbc02e7ac211fef33629b5447ef498d49af7cbe25f994e33c2835bd9963749c07edc789fddd918e1c7739b77422ff57cf3e
-
C:\input.txtFilesize
4B
MD5b91b1facf3b3a7890177f02ac188f14c
SHA1e1e0b4868c21dad9a79bc0b107ce283815815bbd
SHA2563765c3e23aeefaf31c3e27e95895ef627fa688f9652d7efc6746af9fc45dbfb0
SHA512b0bbeab2d6a2efddac5fe522dc006014e646e6e53ae9706954819a69b1f889c14d9313ac98ea3b88e7b52e087649c3f6545b1d6faa699097b3f51441fc93df0a
-
\Users\Admin\AppData\Local\Temp\1025.exeFilesize
508KB
MD52baad2e607969a62f8ccde3bdf866223
SHA14d3c245aaa1b6844752f07ed08bd8bfb533250d9
SHA2569e86dffa2a0b7ad89db81c1ba844cfd0e492d8bdcb8b11cbe023316fe547ab18
SHA5129dff1df480a8e4460f4c7aea905b8064f749982bfc30e01acb7f2fefa37f8f422e40eb6ac95663d9aea5f5061b0196cfda6f6a5f587ef0a3af09a4379af41a8e
-
\Users\Admin\AppData\Local\Temp\µçÄÔÒ»Ìå¶Ë\Ò¬×ÓµçÄÔÒ»Ìå¶Ë.exeFilesize
49KB
MD583df8134d9c077739379ac0e00182af7
SHA15053b87b1f8047fffc1578de0dd4e6b1a0c9678b
SHA256ba7d88038d1475db4253ed6537475df8529c5de373efb3f837d96fe499577a38
SHA51226873f86eade6f15d56f895b92f40f948fbd5382d14f65a49fe7ff6f89cf31b6d0e229eab102ca8c966bc0c087304c601f81ac7d6c5990b0f8e00e3afc80fde0
-
memory/616-118-0x0000000000400000-0x0000000000595000-memory.dmpFilesize
1.6MB
-
memory/616-132-0x0000000001EA0000-0x0000000001EC0000-memory.dmpFilesize
128KB
-
memory/2040-109-0x0000000000B80000-0x0000000000BA0000-memory.dmpFilesize
128KB
-
memory/2100-59-0x0000000003D10000-0x0000000003D3A000-memory.dmpFilesize
168KB
-
memory/2100-56-0x0000000003D10000-0x0000000003D3A000-memory.dmpFilesize
168KB
-
memory/2100-46-0x0000000005350000-0x00000000054E5000-memory.dmpFilesize
1.6MB
-
memory/2508-58-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2508-141-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2812-64-0x0000000010000000-0x00000000100BE000-memory.dmpFilesize
760KB
-
memory/2812-115-0x0000000000400000-0x0000000000595000-memory.dmpFilesize
1.6MB
-
memory/2812-85-0x00000000027A0000-0x00000000027C0000-memory.dmpFilesize
128KB
-
memory/2812-61-0x0000000010000000-0x00000000100BE000-memory.dmpFilesize
760KB
-
memory/2812-63-0x0000000010000000-0x00000000100BE000-memory.dmpFilesize
760KB
-
memory/2812-50-0x0000000000400000-0x0000000000595000-memory.dmpFilesize
1.6MB