Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 15:32
Behavioral task
behavioral1
Sample
Miner.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Photo.scr
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
ftpcrack.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
xmrig.exe
Resource
win10v2004-20240426-en
General
-
Target
Photo.scr
-
Size
5.9MB
-
MD5
5616a3471565d34d779b5b3d0520bb70
-
SHA1
42df726156bee4a54ea328bd72a659602ab7d03e
-
SHA256
9194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9
-
SHA512
21f70509a14eaf5dd63b533df612b64b07ff0e991d3a4ba3c17c9618bc952bccb61e189c04ca234fb374d2c75779aff108fd9bc7c44857e4034887b861058c1e
-
SSDEEP
98304:RLbSThOfTCiFBXmfFs+JhEpCVoR8oMEOJ6Ty3RvX+UGD823FUuzmH:tBfTCiUs0VSLOJgyBGUA8Ch8
Malware Config
Extracted
Protocol: ftp- Host:
151.80.139.190 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
151.80.139.190 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
162.241.34.26 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
151.80.139.190 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
162.241.34.26 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
151.80.139.190 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
157.90.0.246 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
162.241.34.26 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www2016
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www2015
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
162.241.34.26 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www!
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
P@ssw0rd!!
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
92.53.122.110 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
qwa123
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
12345678
Extracted
Protocol: ftp- Host:
162.241.34.26 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
test
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123qwe!@#
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123456789
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123321
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
1314520
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
159357
Extracted
Protocol: ftp- Host:
62.212.169.210 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www2017
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
666666
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
woaini
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
fuckyou
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
000000
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
1234567890
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
8888888
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
www2016
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
1qaz2wsx
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
www2016
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
abc123
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
abc123456
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
1q2w3e4r
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
123qwe
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www2019
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
www2018
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
www!
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
p@ssw0rd
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
www2015
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
p@55w0rd
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
password!
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
p@ssw0rd!
Extracted
Protocol: ftp- Host:
195.15.210.175 - Port:
21 - Username:
www - Password:
anonymous
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
password1
Extracted
Protocol: ftp- Host:
195.15.210.175 - Port:
21 - Username:
www - Password:
123456
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
P@ssw0rd!!
Extracted
Protocol: ftp- Host:
195.15.210.175 - Port:
21 - Username:
www - Password:
admin
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
r00t
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
www!
Extracted
Protocol: ftp- Host:
195.15.210.175 - Port:
21 - Username:
www - Password:
password
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
tomcat
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
qwa123
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
5201314
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
195.15.210.175 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
system
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
pass
Extracted
Protocol: ftp- Host:
195.15.210.175 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
12345678
Extracted
Protocol: ftp- Host:
38.174.185.212 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
root
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
1234
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
test
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
12345
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
P@ssw0rd!!
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
123123
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
1234567
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
devry
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
123456789
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
www
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
www2016
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
qwa123
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
123
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
111111
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
123321
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
admin123
Extracted
Protocol: ftp- Host:
157.90.0.246 - Port:
21 - Username:
anonymous
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
derok010101
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
windows
Extracted
Protocol: ftp- Host:
60.43.235.178 - Port:
21 - Username:
www - Password:
12345678
Extracted
Protocol: ftp- Host:
77.37.89.89 - Port:
21 - Username:
www - Password:
www2015
Extracted
Protocol: ftp- Host:
217.21.69.89 - Port:
21 - Username:
www - Password:
www2016
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
pass1234
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
wwwwww
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
1314520
Extracted
Protocol: ftp- Host:
15.235.113.82 - Port:
21 - Username:
www - Password:
www123
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
[email protected]
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
qazxswedc`123
Extracted
Protocol: ftp- Host:
185.51.164.123 - Port:
21 - Username:
www - Password:
159357
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
qwerty123456
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
www - Password:
qazxswedc
Extracted
Protocol: ftp- Host:
204.93.151.135 - Port:
21 - Username:
www - Password:
www1
Extracted
Protocol: ftp- Host:
77.55.160.9 - Port:
21 - Username:
anonymous - Password:
anonymous
Extracted
Protocol: ftp- Host:
37.251.151.203 - Port:
21 - Username:
www - Password:
www
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/3704-405-0x0000000000400000-0x00000000009B6000-memory.dmp xmrig -
Contacts a large (1181) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3480 netsh.exe -
Registers new Print Monitor 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint spoolsv.exe -
ACProtect 1.3x - 1.4x DLL software 13 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000235ea-32.dat acprotect behavioral2/files/0x00080000000235d5-35.dat acprotect behavioral2/files/0x00070000000235dc-37.dat acprotect behavioral2/files/0x00070000000235de-41.dat acprotect behavioral2/files/0x00070000000235df-43.dat acprotect behavioral2/files/0x00070000000235dd-47.dat acprotect behavioral2/files/0x00070000000235e8-50.dat acprotect behavioral2/files/0x00070000000235e6-54.dat acprotect behavioral2/files/0x00070000000235f2-57.dat acprotect behavioral2/files/0x00070000000235eb-59.dat acprotect behavioral2/files/0x00070000000235ef-61.dat acprotect behavioral2/files/0x00070000000235f0-66.dat acprotect behavioral2/files/0x00070000000235ed-70.dat acprotect -
Executes dropped EXE 7 IoCs
pid Process 4100 HelpPane.exe 972 HelpPane.exe 3560 HelpPane.exe 2728 HelpPane.exe 1692 HelpPane.exe 2724 HelpPane.exe 3704 xmrig.exe -
Loads dropped DLL 62 IoCs
pid Process 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 2084 Photo.scr 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 972 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2728 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe -
resource yara_rule behavioral2/files/0x00070000000235ea-32.dat upx behavioral2/memory/2084-34-0x0000000074D20000-0x0000000074FD0000-memory.dmp upx behavioral2/files/0x00080000000235d5-35.dat upx behavioral2/files/0x00070000000235dc-37.dat upx behavioral2/memory/2084-38-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/2084-40-0x0000000074C50000-0x0000000074C6D000-memory.dmp upx behavioral2/files/0x00070000000235de-41.dat upx behavioral2/files/0x00070000000235df-43.dat upx behavioral2/memory/2084-44-0x0000000074C30000-0x0000000074C41000-memory.dmp upx behavioral2/memory/2084-46-0x0000000074AC0000-0x0000000074C29000-memory.dmp upx behavioral2/files/0x00070000000235dd-47.dat upx behavioral2/memory/2084-49-0x00000000749B0000-0x0000000074AB7000-memory.dmp upx behavioral2/files/0x00070000000235e8-50.dat upx behavioral2/memory/2084-53-0x00000000029E0000-0x00000000029F4000-memory.dmp upx behavioral2/files/0x00070000000235e6-54.dat upx behavioral2/files/0x00070000000235f2-57.dat upx behavioral2/files/0x00070000000235eb-59.dat upx behavioral2/memory/2084-64-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/files/0x00070000000235ef-61.dat upx behavioral2/memory/2084-63-0x000000001ECB0000-0x000000001ECC1000-memory.dmp upx behavioral2/memory/2084-62-0x00000000035D0000-0x00000000035DA000-memory.dmp upx behavioral2/files/0x00070000000235f0-66.dat upx behavioral2/files/0x00070000000235ed-70.dat upx behavioral2/memory/2084-69-0x000000001E9B0000-0x000000001E9BD000-memory.dmp upx behavioral2/memory/2084-72-0x000000001E7D0000-0x000000001E7DE000-memory.dmp upx behavioral2/memory/2084-68-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx behavioral2/memory/972-114-0x0000000074510000-0x00000000747C0000-memory.dmp upx behavioral2/memory/2084-113-0x0000000074D20000-0x0000000074FD0000-memory.dmp upx behavioral2/memory/972-122-0x00000000744F0000-0x000000007450D000-memory.dmp upx behavioral2/memory/972-127-0x00000000744D0000-0x00000000744E1000-memory.dmp upx behavioral2/memory/972-128-0x0000000074360000-0x00000000744C9000-memory.dmp upx behavioral2/memory/2084-126-0x0000000074C30000-0x0000000074C41000-memory.dmp upx behavioral2/memory/2084-121-0x0000000074C50000-0x0000000074C6D000-memory.dmp upx behavioral2/memory/972-118-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/972-132-0x0000000074250000-0x0000000074357000-memory.dmp upx behavioral2/memory/2084-131-0x0000000074AC0000-0x0000000074C29000-memory.dmp upx behavioral2/memory/972-137-0x0000000001180000-0x0000000001194000-memory.dmp upx behavioral2/memory/2084-136-0x00000000749B0000-0x0000000074AB7000-memory.dmp upx behavioral2/memory/2084-145-0x00000000029E0000-0x00000000029F4000-memory.dmp upx behavioral2/memory/972-148-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/972-147-0x000000001ECB0000-0x000000001ECC1000-memory.dmp upx behavioral2/memory/972-146-0x00000000011A0000-0x00000000011AA000-memory.dmp upx behavioral2/memory/972-152-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx behavioral2/memory/2084-151-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/972-158-0x000000001E7D0000-0x000000001E7DE000-memory.dmp upx behavioral2/memory/972-157-0x000000001E9B0000-0x000000001E9BD000-memory.dmp upx behavioral2/memory/972-172-0x0000000074510000-0x00000000747C0000-memory.dmp upx behavioral2/memory/972-182-0x000000001E7D0000-0x000000001E7DE000-memory.dmp upx behavioral2/memory/972-181-0x000000001E9B0000-0x000000001E9BD000-memory.dmp upx behavioral2/memory/972-180-0x000000001E8C0000-0x000000001E8E1000-memory.dmp upx behavioral2/memory/972-179-0x000000001E7A0000-0x000000001E7C7000-memory.dmp upx behavioral2/memory/972-178-0x000000001ECB0000-0x000000001ECC1000-memory.dmp upx behavioral2/memory/972-177-0x00000000011A0000-0x00000000011AA000-memory.dmp upx behavioral2/memory/972-176-0x0000000001180000-0x0000000001194000-memory.dmp upx behavioral2/memory/972-175-0x0000000074250000-0x0000000074357000-memory.dmp upx behavioral2/memory/972-174-0x0000000074360000-0x00000000744C9000-memory.dmp upx behavioral2/memory/972-173-0x00000000744D0000-0x00000000744E1000-memory.dmp upx behavioral2/memory/972-161-0x00000000744F0000-0x000000007450D000-memory.dmp upx behavioral2/memory/972-160-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/2728-234-0x0000000074510000-0x00000000747C0000-memory.dmp upx behavioral2/memory/2728-235-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/2728-236-0x00000000744F0000-0x000000007450D000-memory.dmp upx behavioral2/memory/2728-238-0x0000000074360000-0x00000000744C9000-memory.dmp upx behavioral2/memory/2728-237-0x00000000744D0000-0x00000000744E1000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x00070000000235fd-75.dat pyinstaller -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID spoolsv.exe -
Kills process with taskkill 1 IoCs
pid Process 4544 taskkill.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe 2724 HelpPane.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2084 Photo.scr Token: SeDebugPrivilege 972 HelpPane.exe Token: SeDebugPrivilege 2728 HelpPane.exe Token: SeDebugPrivilege 4544 taskkill.exe Token: SeLockMemoryPrivilege 3704 xmrig.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2084 1316 Photo.scr 90 PID 1316 wrote to memory of 2084 1316 Photo.scr 90 PID 1316 wrote to memory of 2084 1316 Photo.scr 90 PID 2084 wrote to memory of 4160 2084 Photo.scr 91 PID 2084 wrote to memory of 4160 2084 Photo.scr 91 PID 2084 wrote to memory of 4160 2084 Photo.scr 91 PID 2084 wrote to memory of 364 2084 Photo.scr 93 PID 2084 wrote to memory of 364 2084 Photo.scr 93 PID 2084 wrote to memory of 364 2084 Photo.scr 93 PID 364 wrote to memory of 4100 364 cmd.exe 96 PID 364 wrote to memory of 4100 364 cmd.exe 96 PID 364 wrote to memory of 4100 364 cmd.exe 96 PID 4100 wrote to memory of 972 4100 HelpPane.exe 98 PID 4100 wrote to memory of 972 4100 HelpPane.exe 98 PID 4100 wrote to memory of 972 4100 HelpPane.exe 98 PID 2084 wrote to memory of 4388 2084 Photo.scr 100 PID 2084 wrote to memory of 4388 2084 Photo.scr 100 PID 2084 wrote to memory of 4388 2084 Photo.scr 100 PID 4388 wrote to memory of 3560 4388 cmd.exe 102 PID 4388 wrote to memory of 3560 4388 cmd.exe 102 PID 4388 wrote to memory of 3560 4388 cmd.exe 102 PID 3560 wrote to memory of 2728 3560 HelpPane.exe 103 PID 3560 wrote to memory of 2728 3560 HelpPane.exe 103 PID 3560 wrote to memory of 2728 3560 HelpPane.exe 103 PID 1692 wrote to memory of 2724 1692 HelpPane.exe 105 PID 1692 wrote to memory of 2724 1692 HelpPane.exe 105 PID 1692 wrote to memory of 2724 1692 HelpPane.exe 105 PID 2724 wrote to memory of 2096 2724 HelpPane.exe 107 PID 2724 wrote to memory of 2096 2724 HelpPane.exe 107 PID 2724 wrote to memory of 2096 2724 HelpPane.exe 107 PID 2096 wrote to memory of 4544 2096 cmd.exe 109 PID 2096 wrote to memory of 4544 2096 cmd.exe 109 PID 2096 wrote to memory of 4544 2096 cmd.exe 109 PID 2724 wrote to memory of 3276 2724 HelpPane.exe 111 PID 2724 wrote to memory of 3276 2724 HelpPane.exe 111 PID 2724 wrote to memory of 3276 2724 HelpPane.exe 111 PID 2724 wrote to memory of 1716 2724 HelpPane.exe 113 PID 2724 wrote to memory of 1716 2724 HelpPane.exe 113 PID 2724 wrote to memory of 1716 2724 HelpPane.exe 113 PID 2724 wrote to memory of 3704 2724 HelpPane.exe 120 PID 2724 wrote to memory of 3704 2724 HelpPane.exe 120 PID 2724 wrote to memory of 3704 2724 HelpPane.exe 120 PID 2724 wrote to memory of 3480 2724 HelpPane.exe 122 PID 2724 wrote to memory of 3480 2724 HelpPane.exe 122 PID 2724 wrote to memory of 3480 2724 HelpPane.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photo.scr"C:\Users\Admin\AppData\Local\Temp\Photo.scr" /S1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Photo.scr"C:\Users\Admin\AppData\Local\Temp\Photo.scr" /S2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /y C:\Users\Admin\AppData\Local\Temp\Photo.scr C:\Users\Admin\HelpPane.exe3⤵PID:4160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\HelpPane.exe --startup auto install3⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe --startup auto install4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe --startup auto install5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\HelpPane.exe start3⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe start4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\HelpPane.exeC:\Users\Admin\HelpPane.exe start5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
-
-
C:\Users\Admin\HelpPane.exe"C:\Users\Admin\HelpPane.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\HelpPane.exe"C:\Users\Admin\HelpPane.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /pid 1912 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 1912 /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI16~1\\xmrig.exe C:\Windows\TEMP\xmrig.exe3⤵PID:3276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI16~1\\config.json C:\Windows\TEMP\config.json3⤵PID:1716
-
-
C:\Windows\TEMP\xmrig.exeC:\Windows\TEMP\xmrig.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\Users\Admin\HelpPane.exe "MyApp" ENABLE3⤵
- Modifies Windows Firewall
PID:3480
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4220,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=3836 /prefetch:81⤵PID:2976
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b5dea49b86c5bb5d9cd8d64a09f70065
SHA1487ef676ebd244ebc3cf197f70da7a5e393fb96e
SHA25678b1160f6adab34d144ad19a0f4b83f83453f1e18460bbdfbe17ad354b62af7d
SHA5121b5914f4c52f47a33c57f5f6428482e6766099bf43d4e8616ce4aabc4a917c24b2e0c98c841f0d7e7b8a202f40ff960885535539bf70cc7c7ed8687c7ece010c
-
Filesize
877KB
MD58c44826a640b3cf0b32b0258c65fee07
SHA1e3f9fe6366d0876bfa8b903b20d2acf06416f1bc
SHA256fbad053d962bac96865ac3372958d697711800fdc46f36c87011bb5e89026614
SHA512884e2c01c088b9ae86d4605fed1cf8e9b17f99cf887efc5644f4a91959ecd89148cca3e9fdaa6ab9e8c4dfd2d61dbdfd442a95b13dab7e5cd027b4782d473355
-
Filesize
16KB
MD5371397e80a55d432da47311b8ef25317
SHA171617777d6a2500d6464d7b394c8be5f1e4e119e
SHA256c1a900615c9500c46b9602c30c53f299290b03632208ef1152af8830ab73ad17
SHA5123139e2848acf02cc8475449f213873d2c2b7196f6a55c70d2d8f8b487020387740364e5ca0aa584624d1b9b01b965146a2f0e15eef34830c7c0ecbb8637dae03
-
Filesize
37KB
MD56cb8b560efbc381651d2045f1571d7c8
SHA115283a7a467adb7b6d7a7182f660dd783f90e483
SHA2566456fea123e04bcec8a8eed26160e1df5482e69d187d3e1a0c428995472ac134
SHA512ca2958095e8e08b5ef05ec9de15b7d1eb180923a40b90356db56a124101c96d8e745001948b89dbe9d6b9ce3c2029f7e9eaf20c73fa1d410a821d6605830bfc0
-
Filesize
343KB
MD5ee134421fbabeb565e4f3ca721331c2e
SHA14b03bdd142c6a7bb6f74abe968c5b76b63e06059
SHA2567863e1bedfe1ffc720b67b2eb7b3491db9d2b8e56b5574e6a40ff90336b8dafa
SHA512d27ff65b6a8bf2e5e70d2865e72eee6930e76c2a3990428c54fc998743d3c540c5c984b5d1429e8ffbe3d160ae1f6782cd6d3ca40822f81d2052ba168595d1fa
-
Filesize
21KB
MD5be47363992c7dd90019276d35fa8da76
SHA1ccf7ebbe829da08efd95a53d4ba0c0d4938f6169
SHA256be10254b111713bef20a13d561de61ca3c74a34c64ddc5b10825c64ab2c46734
SHA512573f9111535a9a136fcaaa5c1a16c347f7327626768d849513d69c9848406b1002dcc5b8c17a291ef2e6519587533ca806018ee471a39d330f032a9e7e635ea7
-
Filesize
487KB
MD568c3ad86e0a8833c29ad1be10d3c025d
SHA104488362814b2f3ae07c4e8df8e45868d48b447f
SHA256c236271b92a0f1d3304337f2e2444107f34d8e26272981f48c47db347133566c
SHA512bb2819d913033cc26dcd1e5cbf015dacdbf747d29c72bfd41bfe0d74bb77e51a61cf9be4b67b6348938837125f1d0f80af0ac33531e00cea1585535952a22785
-
Filesize
11KB
MD5c7807680a69196c3ee66c4cfb3e271ac
SHA1d3ea74c9e3b810c6a1ee4296b97e20f2f45c9461
SHA2561a6c57ac8031582477b1d3463a65b6eb006eea704e27c8c4b812b99ea910428d
SHA512a5d893132ad889e98b434da7fd5ca377afb1800fd8d3230cced5e9fde576fcec943dd22fa48810ba6d93c510ebaa8ac5a94ec1b9d639fd6c533c5bbd4737cf15
-
Filesize
25KB
MD52fc800fcc46a597921c2ed447aeb09ac
SHA172004227e5c60c8460f835a170798aa22861b79e
SHA2562e4ad3d08118da77c928c4614bfecb34397cfaf53f5d46d7c7e5f1da3172c1f1
SHA512a17022b364615b45a1873aea0de922a2988e4d75a8f4e63ecb9ca7dd46263e684b1f28b82bd77b046bbe2ad03ce65c5dacf98eaccae861a30f137e0118a87225
-
Filesize
52KB
MD507b436bfa1c7b4ffc21fb39358158060
SHA17f5a47cdab9a7d93bbbd204cedffca61d3f80c84
SHA25682c2926cb03a04392fa479801d505e2a387446bca978ff930177121db2fdb461
SHA51213ebcb83f478c859ca808003933769b84290e108648b69f33043653263c5b4bd37ed5ca8d521b46a1d9122eb232f7e5d05a25e16f250d5573cf85cd5cdefb2ef
-
Filesize
16KB
MD56a95bcf45e4be23cc2634ef5bad17660
SHA17d13b791588cb800c2add75ff8e74c3c493a8143
SHA25660da4b4e628b7dc1115615128ac554aeb29b50a61629ad5aeeb5cc9d2bd86202
SHA512d3c80b025647444f42d42e82cad50c4383728f7f8c9e16aa9d87450ca864b0b97b5f8f47e80328a4a2b67ce7d06c9a8f1dae8c5b3c798de1b2a50164161e69c8
-
Filesize
34KB
MD542c475231f4835bb1a5f94b0d3da4520
SHA1fcfae296dd10c92d973a57d61bbf5c0f4a15ed6b
SHA25687ceeb1b7586db730f48988a07018f9c8af57934ff7f173a869542207f46b0f1
SHA512d1a699b8497e8843f990f6f719a904a7751fe2a9404cb195be2d94341728a7372cd93d379b576e6031980e1da53f2336805c6bf59e799b63565cd63d4931c02a
-
Filesize
11KB
MD5796306be7a1abcffb8853ee9ceb5beae
SHA193762cf53958a3a99b674986fcf3c53c489133ed
SHA25626e6d883e9e61bf872425526a9b8c7bb229c3b9d2f82bb3c0bf500660dbe1995
SHA5125919a837fa1fcaea91b14d02da306928d5e523e4591dca290422c9eb9be15f2ee626a8379f5c953f2b08e7a6b2cd67618652b9efa9ace8abd47a8bd7cd8c2f64
-
Filesize
18KB
MD5f23a62491bd945c050e3e1d13909e9e7
SHA1b8dac4e00163533157a17e3b56d05e049a2375a2
SHA256e52b5532a6764aaae67db557412b3f77ebdc8a14a72771a1c6414a83bb3fc15c
SHA51252200cf9687752db43bbae703192c841694d5bd976fa56c0f25e0478cfb97681bc77677c1a8907167612ddf9fe6a561945fbeb0180022670af97bf41b5b11766
-
Filesize
5.9MB
MD55616a3471565d34d779b5b3d0520bb70
SHA142df726156bee4a54ea328bd72a659602ab7d03e
SHA2569194b57673209c8534888f61b0cdefa34f463ae50cd78f72ab2b3348220baaf9
SHA51221f70509a14eaf5dd63b533df612b64b07ff0e991d3a4ba3c17c9618bc952bccb61e189c04ca234fb374d2c75779aff108fd9bc7c44857e4034887b861058c1e
-
Filesize
1KB
MD5b112d56c0aeca51b6c6fa3bbc1fb416a
SHA1bcd5d59a41ae832603ad55d749e1172cc0c90ac8
SHA2567bcbdbb5b450bed0a6abb77f49be9668bf223d121e0b644e942d6c45221f487a
SHA5126c3c58c02d8b3ad00d0c5c678ad07072b09717416150ccaeffb0833b74bd283fd005ca831d589ae3d47da8ff1cc77724e2d149491b1add6f863993aaaa75e82b
-
Filesize
1.8MB
MD513bdd9cd9f7e51746172996262b5a873
SHA13834f8179abd7a827e927505f3c226ac8bbcf3ee
SHA2564bf737b29ff521bc263eb1f2c1c5ea04b47470cccd1beae245d98def389929bd
SHA51249879918505d042312f20b2fc8310a8c4a58aa266ed1ab05e0481f7e11385da0920cf9d756f842eb98e4394f14725385b74a99b38fc8a60222fa4cc873cb8040