Malware Analysis Report

2024-11-30 06:42

Sample ID 240604-br1n8sha77
Target 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
SHA256 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
Tags
agenttesla execution keylogger spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b

Threat Level: Known bad

The file 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe was found to be: Known bad.

Malicious Activity Summary

agenttesla execution keylogger spyware stealer trojan

AgentTesla

Detect packed .NET executables. Mostly AgentTeslaV4.

Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

Detects executables referencing many email and collaboration clients. Observed in information stealers

Detects executables packed with SmartAssembly

Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

Detects executables referencing many file transfer clients. Observed in information stealers

Detects executables referencing Windows vault credential objects. Observed in infostealers

Command and Scripting Interpreter: PowerShell

Checks computer location settings

Reads user/profile data of web browsers

Reads data files stored by FTP clients

Reads user/profile data of local email clients

Reads WinSCP keys stored on the system

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 01:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 01:23

Reported

2024-06-04 01:25

Platform

win7-20240221-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Detect packed .NET executables. Mostly AgentTeslaV4.

Description Indicator Process Target
N/A N/A N/A N/A

Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables packed with SmartAssembly

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects executables referencing Windows vault credential objects. Observed in infostealers

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables referencing many email and collaboration clients. Observed in information stealers

Description Indicator Process Target
N/A N/A N/A N/A

Detects executables referencing many file transfer clients. Observed in information stealers

Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2992 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2992 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2992 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2992 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2992 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2992 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 840 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2640 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2640 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2640 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2640 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2640 wrote to memory of 292 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 292 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 292 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 292 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 292 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 292 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 292 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 292 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 292 wrote to memory of 1208 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1208 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1040 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1040 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1040 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1040 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

Processes

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tUwYoIHWfleeN.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tUwYoIHWfleeN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp53BB.tmp"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pJlDdUQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8037.tmp"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PwrtvLGqv.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PwrtvLGqv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpABAA.tmp"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

Network

N/A

Files

memory/2992-0-0x000000007452E000-0x000000007452F000-memory.dmp

memory/2992-1-0x00000000008F0000-0x0000000000C76000-memory.dmp

memory/2992-2-0x0000000074520000-0x0000000074C0E000-memory.dmp

memory/2992-3-0x0000000000430000-0x000000000044E000-memory.dmp

memory/2992-4-0x0000000000470000-0x0000000000480000-memory.dmp

memory/2992-5-0x00000000007A0000-0x00000000007B6000-memory.dmp

memory/2992-6-0x000000000C3B0000-0x000000000C6E0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp53BB.tmp

MD5 87d4def44340412344986afb3ec000dc
SHA1 de1e02c70eef6b22e068a256534e554eeef50711
SHA256 b6f1d05655e29b574c42f43a13bc2e7832f283f92ed3051637aa8f56f91cfd33
SHA512 74eaee0c830fab225073a9fedaf68b29f4ffdeb82398afb363c3815ca71cd2dd078d8494dea3a58dc0ebb085f4aa3b5fffd6dbd802d4428352dcc9416af97613

memory/2640-25-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-24-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2640-20-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-23-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-27-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-28-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-33-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-60-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-57-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-54-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-51-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-50-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-47-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-45-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-44-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-38-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-34-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-32-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-31-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-30-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2992-29-0x0000000074520000-0x0000000074C0E000-memory.dmp

memory/2640-58-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-53-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-48-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-43-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-39-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-37-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-18-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-14-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-16-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2640-61-0x0000000008430000-0x00000000086D2000-memory.dmp

C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe

MD5 d6f6d056221be8a9545efc7dff08e56a
SHA1 5b245398672670653a2afdd33f0e0b02b0a5fc41
SHA256 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
SHA512 452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b

C:\Users\Admin\AppData\Local\Temp\tmp8037.tmp

MD5 7dd22736bb22773173457202534098a8
SHA1 1363fcd4c31ce3de23b21325569be668499877ed
SHA256 b8e09b57634696baa4259d852b6d15f63f7d41be5edaf7238f770a520b149fdb
SHA512 95bea0d708037df98b61eac9e48804c9b54acd6b56e0501ff558b19b494498825857be2221056f40af32753da07d351e637a49bf65dc7b8512a5bc914d2867c4

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XAJ088HDEGVXKLLRAD0Y.temp

MD5 12ba91a4f7c7a4fec65cf116619dee24
SHA1 0688c86136e9e4c0aa592a7beb7f8b5fc443064a
SHA256 9e52594a6b1b35c1f6088a71299ee0ceffd7a0a7106f2278a615f71b26795667
SHA512 5de4f2b02221e3684576572f2921417ac744b0530c5b5d777faeb90c7f0a370ef6602184ac1f733a7ca4a7c88d8a5031e7d988ee3af3bf8d569f79b659e441b4

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/292-73-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-77-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-83-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-82-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-85-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-79-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-75-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-87-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-88-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-91-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-90-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-89-0x0000000000400000-0x000000000065E000-memory.dmp

memory/292-120-0x0000000000730000-0x000000000074E000-memory.dmp

memory/292-121-0x00000000081D0000-0x000000000834A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpABAA.tmp

MD5 efaeb426724011e397d53b0e48e0967b
SHA1 b7df359cbb4825213ec791c7bf67207cdaecc916
SHA256 361fb8c4b60592254e1edad5fd2dd42c23e8c168d335e34f2d2d589c2b746df6
SHA512 c1676bfc5b6fdac2d745d21364ba5542619d04f5883271de0dcaa66f68180cf3b1eb74146dacabdcc4a4a4798c17e35212444164f3248a0f6f9a1fccf5654c29

memory/1208-144-0x0000000000400000-0x0000000000536000-memory.dmp

memory/1208-145-0x0000000000F10000-0x0000000000F2E000-memory.dmp

memory/1208-146-0x0000000005D90000-0x0000000005E92000-memory.dmp

memory/1040-159-0x0000000000400000-0x00000000004BE000-memory.dmp

memory/1040-160-0x00000000004C0000-0x00000000004DC000-memory.dmp

memory/1040-161-0x00000000004F0000-0x00000000004FE000-memory.dmp

memory/1040-162-0x00000000052E0000-0x0000000005362000-memory.dmp

memory/624-175-0x0000000000400000-0x0000000000440000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 01:23

Reported

2024-06-04 01:26

Platform

win10v2004-20240508-en

Max time kernel

133s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

Signatures

Detects executables packed with SmartAssembly

Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2384 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2384 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2384 wrote to memory of 3532 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2384 wrote to memory of 3712 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2384 wrote to memory of 3712 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2384 wrote to memory of 3712 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 2384 wrote to memory of 1728 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 1728 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 1728 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Windows\SysWOW64\schtasks.exe
PID 1728 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 3628 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 3628 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 3628 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
PID 1728 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

Processes

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4372,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:8

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tUwYoIHWfleeN.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tUwYoIHWfleeN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp24D9.tmp"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pJlDdUQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp556E.tmp"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

"C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/2384-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

memory/2384-1-0x0000000000460000-0x00000000007E6000-memory.dmp

memory/2384-2-0x0000000007A40000-0x0000000007FE4000-memory.dmp

memory/2384-3-0x0000000007570000-0x0000000007602000-memory.dmp

memory/2384-4-0x0000000002980000-0x000000000298A000-memory.dmp

memory/2384-5-0x00000000077E0000-0x000000000787C000-memory.dmp

memory/2384-6-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/2384-7-0x00000000079B0000-0x00000000079CE000-memory.dmp

memory/2384-8-0x00000000079E0000-0x00000000079F0000-memory.dmp

memory/2384-9-0x0000000007A10000-0x0000000007A26000-memory.dmp

memory/2384-10-0x0000000005110000-0x0000000005440000-memory.dmp

memory/3532-15-0x0000000005240000-0x0000000005276000-memory.dmp

memory/3532-16-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/3532-17-0x0000000005910000-0x0000000005F38000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp24D9.tmp

MD5 a8eb6a1244e7b41145a4c46ea6c671eb
SHA1 423304202a79670ea22a2be0fadb8a848aeace7f
SHA256 c8f9ca157ca99025585b399110ecd74eed081657e455ec9e76829cced41b8b22
SHA512 cfa4f9146388cc33db152bfd1e07e82ed44c586ab57292e3372066aceb5115462cd9382d8989c060428d184987ab9f20e8f21288c87b5d52db5a64d2d28c91b7

memory/3532-23-0x00000000060D0000-0x0000000006424000-memory.dmp

memory/3532-22-0x0000000006020000-0x0000000006086000-memory.dmp

memory/3532-25-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/1728-24-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/3532-21-0x0000000005FB0000-0x0000000006016000-memory.dmp

memory/3532-20-0x0000000005840000-0x0000000005862000-memory.dmp

memory/3532-19-0x0000000074AD0000-0x0000000075280000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5fud21vt.5yl.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2384-28-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

memory/1728-27-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/1728-46-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-69-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-70-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-72-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-67-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-63-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-62-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-60-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-57-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-51-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/3532-73-0x0000000006880000-0x000000000689E000-memory.dmp

memory/1728-50-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-48-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-65-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-59-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-56-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-54-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-45-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-44-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-43-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-42-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-41-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/1728-40-0x0000000000400000-0x00000000006EE000-memory.dmp

memory/2384-38-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/3532-74-0x0000000006A70000-0x0000000006ABC000-memory.dmp

memory/3532-75-0x0000000007A30000-0x0000000007A62000-memory.dmp

memory/3532-76-0x0000000075360000-0x00000000753AC000-memory.dmp

memory/3532-86-0x00000000079F0000-0x0000000007A0E000-memory.dmp

memory/3532-87-0x0000000007A70000-0x0000000007B13000-memory.dmp

memory/3532-88-0x00000000081F0000-0x000000000886A000-memory.dmp

memory/3532-89-0x0000000007BB0000-0x0000000007BCA000-memory.dmp

memory/3532-90-0x0000000007C20000-0x0000000007C2A000-memory.dmp

memory/3532-91-0x0000000007E30000-0x0000000007EC6000-memory.dmp

memory/3532-92-0x0000000007DB0000-0x0000000007DC1000-memory.dmp

memory/3532-93-0x0000000007DE0000-0x0000000007DEE000-memory.dmp

memory/3532-94-0x0000000007DF0000-0x0000000007E04000-memory.dmp

memory/3532-95-0x0000000007EF0000-0x0000000007F0A000-memory.dmp

memory/3532-96-0x0000000007ED0000-0x0000000007ED8000-memory.dmp

memory/3532-99-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/1728-100-0x0000000008B10000-0x0000000008B26000-memory.dmp

memory/1728-101-0x0000000009BE0000-0x0000000009E82000-memory.dmp

C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe

MD5 d6f6d056221be8a9545efc7dff08e56a
SHA1 5b245398672670653a2afdd33f0e0b02b0a5fc41
SHA256 561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b
SHA512 452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Users\Admin\AppData\Local\Temp\tmp556E.tmp

MD5 c8ea315ef2adaabcd4e251aa5737401c
SHA1 a835dd79fdeb1ab98016654642a8a7b435da17e2
SHA256 6ecbb96b680754d5d17cb9bd3900e8e6f281b6be2cc5c1f5e3bb76c9620eb5d5
SHA512 3699f17f713df383b04e677e5ce24d89072c677638dfb0c3588a85e05e76c7b1a3eee118c6c91a6f4e519ba85d4dda8fa90c05db51da578c9750dc362adfc72f

memory/2900-117-0x0000000005730000-0x0000000005A84000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a1cf2887fda74209a1bc5d0c4aae6580
SHA1 82b721545d2ebd10a516c597c96726069eb5ebe8
SHA256 bd699b3802bbbc36519054fb615f91dc28d5482f28ac948d292dfe0fbc96c884
SHA512 9a3a2d14173797aa559936ebb101ab1a9299f92b25a199c39bb80c489543ae99e47e459bc3639f318dbf00e6942ed67842bdc97fdcbccb8925952206cdc39dc2

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe.log

MD5 8ec831f3e3a3f77e4a7b9cd32b48384c
SHA1 d83f09fd87c5bd86e045873c231c14836e76a05c
SHA256 7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA512 26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

memory/1728-120-0x0000000074AD0000-0x0000000075280000-memory.dmp

memory/2900-121-0x0000000075360000-0x00000000753AC000-memory.dmp

memory/2900-131-0x0000000006F00000-0x0000000006FA3000-memory.dmp

memory/2900-132-0x0000000007430000-0x0000000007444000-memory.dmp