Malware Analysis Report

2024-08-06 14:37

Sample ID 240524-d9geesbg3s
Target d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1
SHA256 d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1
Tags
upx modiloader persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1

Threat Level: Known bad

The file d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1 was found to be: Known bad.

Malicious Activity Summary

upx modiloader persistence trojan

ModiLoader, DBatLoader

UPX dump on OEP (original entry point)

Detects Windows executables referencing non-Windows User-Agents

UPX dump on OEP (original entry point)

ModiLoader Second Stage

UPX packed file

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-24 03:42

Signatures

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-24 03:42

Reported

2024-05-24 03:44

Platform

win7-20240508-en

Max time kernel

149s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 2980 wrote to memory of 916 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 916 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 916 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 916 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 916 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 3044 wrote to memory of 1640 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3044 wrote to memory of 1640 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3044 wrote to memory of 1640 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3044 wrote to memory of 1640 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 916 wrote to memory of 1048 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 916 wrote to memory of 1048 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 916 wrote to memory of 1048 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 916 wrote to memory of 1048 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 320 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1048 wrote to memory of 580 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe

"C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe"

C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe

"C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\CGVVI.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/2980-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2980-5-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2980-3-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2980-15-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2980-26-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2980-25-0x0000000000404000-0x0000000000405000-memory.dmp

memory/2980-29-0x0000000000300000-0x0000000000301000-memory.dmp

memory/2980-41-0x0000000000320000-0x0000000000321000-memory.dmp

memory/2980-89-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2980-79-0x00000000003E0000-0x00000000003E2000-memory.dmp

memory/2980-71-0x00000000003C0000-0x00000000003C1000-memory.dmp

memory/2980-61-0x00000000003A0000-0x00000000003A1000-memory.dmp

memory/916-103-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2980-104-0x0000000000400000-0x0000000000453000-memory.dmp

memory/916-101-0x0000000000400000-0x000000000040B000-memory.dmp

memory/916-100-0x0000000000400000-0x000000000040B000-memory.dmp

memory/916-98-0x0000000000400000-0x000000000040B000-memory.dmp

memory/916-96-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/916-94-0x0000000000400000-0x000000000040B000-memory.dmp

memory/916-92-0x0000000000400000-0x000000000040B000-memory.dmp

memory/916-90-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CGVVI.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 ebb74437f5de075014fc0444f64b5bdd
SHA1 27a565161f563c3a26a329e81e49dacd849fd4c5
SHA256 36824e7f170cd204aac148ba4d8671a7d7efa9b7c5060faf5a14c5b90ba6815f
SHA512 171b9b68a38a68411ccd37ee0731189efa8de7ef694481d2443445c7d2d3c0e425c9bc465e6fe0507b50d09584f2be59eb37862e3108242c43eaf23a36dc49b8

memory/1048-147-0x0000000000400000-0x0000000000453000-memory.dmp

memory/916-146-0x0000000002930000-0x0000000002983000-memory.dmp

memory/916-145-0x0000000002930000-0x0000000002983000-memory.dmp

memory/916-144-0x0000000002930000-0x0000000002983000-memory.dmp

memory/1048-152-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1048-162-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1048-173-0x0000000000270000-0x0000000000271000-memory.dmp

memory/1048-207-0x0000000000400000-0x0000000000453000-memory.dmp

memory/916-248-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1048-246-0x0000000000400000-0x0000000000453000-memory.dmp

memory/580-244-0x0000000000400000-0x0000000000414000-memory.dmp

memory/580-256-0x0000000000400000-0x0000000000414000-memory.dmp

memory/320-255-0x0000000000400000-0x000000000040B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-24 03:42

Reported

2024-05-24 03:44

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Detects Windows executables referencing non-Windows User-Agents

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 1300 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe
PID 3212 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 3212 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 3212 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Windows\SysWOW64\cmd.exe
PID 860 wrote to memory of 4424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 860 wrote to memory of 4424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 860 wrote to memory of 4424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3212 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 3212 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 3212 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4496 wrote to memory of 4676 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe

"C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4400,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=3668 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe

"C:\Users\Admin\AppData\Local\Temp\d264961e6bf029b4a3885e30254bc242f219694f5f426962fce57e16e8b83ab1.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SPOSF.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/1300-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1300-5-0x00000000021D0000-0x00000000021D2000-memory.dmp

memory/1300-6-0x00000000021E0000-0x00000000021E2000-memory.dmp

memory/1300-7-0x00000000021F0000-0x00000000021F2000-memory.dmp

memory/1300-4-0x00000000021C0000-0x00000000021C2000-memory.dmp

memory/3212-3-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3212-9-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1300-11-0x0000000000400000-0x0000000000453000-memory.dmp

memory/3212-12-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\SPOSF.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 609779d528c8195e3b21e62e5ee14f0c
SHA1 e36b58b85c46662ad8688db2eb88e860185e2320
SHA256 08c1928fc9b48275aa7ffe0bf046bf24e663c3df2efadb64ccfe09393d810c32
SHA512 36ff1090969d08dcc6e92181dbd9a47d9d6a3e5d5567035105b30c1426eba570db3e70635e8bdc51f3211db1d8568e5e097e7688bf86741cea6742f500ef7690

memory/4496-36-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4496-39-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4496-40-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4676-43-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4496-49-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4676-50-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4676-52-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4676-54-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4676-56-0x0000000000400000-0x0000000000414000-memory.dmp

memory/3212-57-0x0000000000410000-0x00000000004D9000-memory.dmp

memory/3212-59-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5060-60-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4676-61-0x0000000000400000-0x0000000000414000-memory.dmp