Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe
Resource
win10v2004-20240226-en
General
-
Target
dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe
-
Size
219KB
-
MD5
f823004b55e04279e716827eb7d7a78f
-
SHA1
a20a550aded331ba73ecc5e05449005fb1646216
-
SHA256
dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a
-
SHA512
d73febcf23b35aa9af446fe16e4b2c48cabe0c3fe481cbd9f380c38704f4b88e75c5d966eda9e57a58f79645b79f6776869e3841606effc34a88ead68039c10d
-
SSDEEP
3072:Z2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhCK0KF:Z0KgGwHqwOOELha+sm2D2+UhngNUK4xe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2628 avg_internet_security_setup_x64.exe 1064 Process not Found 2484 instup.exe 2108 instup.exe 1576 aswOfferTool.exe 2400 aswOfferTool.exe 2424 aswOfferTool.exe 2492 aswOfferTool.exe -
Loads dropped DLL 31 IoCs
pid Process 3056 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe 3056 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe 1064 Process not Found 2628 avg_internet_security_setup_x64.exe 2628 avg_internet_security_setup_x64.exe 2628 avg_internet_security_setup_x64.exe 2628 avg_internet_security_setup_x64.exe 2628 avg_internet_security_setup_x64.exe 2628 avg_internet_security_setup_x64.exe 2628 avg_internet_security_setup_x64.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2484 instup.exe 2108 instup.exe 2400 aswOfferTool.exe 2492 aswOfferTool.exe -
Checks for any installed AV software in registry 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast avg_internet_security_setup_x64.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus instup.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast instup.exe Key opened \REGISTRY\MACHINE\Software\AVAST Software\Avast instup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 instup.exe File opened for modification \??\PhysicalDrive0 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe File opened for modification \??\PhysicalDrive0 avg_internet_security_setup_x64.exe File opened for modification \??\PhysicalDrive0 instup.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 avg_internet_security_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel avg_internet_security_setup_x64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision instup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature avg_internet_security_setup_x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision avg_internet_security_setup_x64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel instup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz instup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "77" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Main = "100" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: instup.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "81" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: prod-pgm.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "40" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "46" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "60" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "1" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "30" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: avbugreport_x64_ais-c62.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "83" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "25" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "100" avg_internet_security_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "37" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "75" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "89" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Updating package: avbugreport_x64_ais" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: setgui_x64_ais-c62.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "24" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "78" avg_internet_security_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "49" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "53" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "69" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "65" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "10" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: servers.def.vpx" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "31" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "55" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\SfxInstProgress = "64" avg_internet_security_setup_x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "28" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "76" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "98" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "56" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "11" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "58" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "4" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: AvBugReport.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "50" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "63" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "19" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "21" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "49" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "57" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "87" instup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "14" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "18" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: instup.dll" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "66" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "72" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "84" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "78" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "81" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "File downloaded: instcont_x64_ais-c62.vpx" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Extracting file: AvDump.exe" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Main = "0" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "17" instup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Description = "Checking install conditions" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "63" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "55" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "64" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_UpdateSetup_Syncer = "94" instup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AvgPersistentStorage\InstupProgress_Installation_Syncer = "15" instup.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2628 avg_internet_security_setup_x64.exe 2108 instup.exe 2108 instup.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 32 2628 avg_internet_security_setup_x64.exe Token: SeDebugPrivilege 2484 instup.exe Token: 32 2484 instup.exe Token: SeDebugPrivilege 2108 instup.exe Token: 32 2108 instup.exe Token: SeDebugPrivilege 2424 aswOfferTool.exe Token: SeImpersonatePrivilege 2424 aswOfferTool.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2484 instup.exe 2108 instup.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2628 3056 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe 28 PID 3056 wrote to memory of 2628 3056 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe 28 PID 3056 wrote to memory of 2628 3056 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe 28 PID 3056 wrote to memory of 2628 3056 dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe 28 PID 2628 wrote to memory of 2484 2628 avg_internet_security_setup_x64.exe 29 PID 2628 wrote to memory of 2484 2628 avg_internet_security_setup_x64.exe 29 PID 2628 wrote to memory of 2484 2628 avg_internet_security_setup_x64.exe 29 PID 2484 wrote to memory of 2108 2484 instup.exe 30 PID 2484 wrote to memory of 2108 2484 instup.exe 30 PID 2484 wrote to memory of 2108 2484 instup.exe 30 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 1576 2108 instup.exe 31 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2400 2108 instup.exe 32 PID 2108 wrote to memory of 2424 2108 instup.exe 33 PID 2108 wrote to memory of 2424 2108 instup.exe 33 PID 2108 wrote to memory of 2424 2108 instup.exe 33 PID 2108 wrote to memory of 2424 2108 instup.exe 33 PID 2108 wrote to memory of 2424 2108 instup.exe 33 PID 2108 wrote to memory of 2424 2108 instup.exe 33 PID 2108 wrote to memory of 2424 2108 instup.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe"C:\Users\Admin\AppData\Local\Temp\dffbc3ef6aa1c5741a6d42a32f1d8ee26b3ac5f57def88f9ca23a1e074bfb09a.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\Temp\asw.1626fdb0efa11a1e\avg_internet_security_setup_x64.exe"C:\Windows\Temp\asw.1626fdb0efa11a1e\avg_internet_security_setup_x64.exe" /ga_clientid:7099f6ba-9eb2-490a-9ff9-cfa68835ed44 /edat_dir:C:\Windows\Temp\asw.1626fdb0efa11a1e2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\Temp\asw.3c53bfd8e0ceab2a\instup.exe"C:\Windows\Temp\asw.3c53bfd8e0ceab2a\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.3c53bfd8e0ceab2a /edition:16 /prod:ais /stub_context:120f338b-f17f-4f30-9f18-f7b8bb907404:9994560 /guid:5e909c89-066b-423f-bfb1-2987662622af /ga_clientid:7099f6ba-9eb2-490a-9ff9-cfa68835ed44 /ga_clientid:7099f6ba-9eb2-490a-9ff9-cfa68835ed44 /edat_dir:C:\Windows\Temp\asw.1626fdb0efa11a1e3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\instup.exe"C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.3c53bfd8e0ceab2a /edition:16 /prod:ais /stub_context:120f338b-f17f-4f30-9f18-f7b8bb907404:9994560 /guid:5e909c89-066b-423f-bfb1-2987662622af /ga_clientid:7099f6ba-9eb2-490a-9ff9-cfa68835ed44 /edat_dir:C:\Windows\Temp\asw.1626fdb0efa11a1e /online_installer4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\aswOfferTool.exe" -checkGToolbar -elevated5⤵
- Executes dropped EXE
PID:1576
-
-
C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\aswOfferTool.exe" -checkChrome -elevated5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400
-
-
C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\aswOfferTool.exe"C:\Windows\Temp\asw.3c53bfd8e0ceab2a\New_15020c62\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFA5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Users\Public\Documents\aswOfferTool.exe"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFA6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD55d37d572ca559443920ff0cca2e4cb10
SHA11ffc30f25a7394af8eae64416411aa52d6183b42
SHA2563f44ac05c6fa049ff017b3bacd7f351f300d5b192f2d0b7f6672675858447cb8
SHA512c28faf387b3a9429094ddc34ccf4d9bc95f2bcc747eb58bf76c727bdc9f14bba146bafd520ad595c40d4f2a5c0aa7d9991799522ef564e940d55ed3664e64400
-
Filesize
4KB
MD57dcc4717685a1c088b5641e3e4d9cef7
SHA170eb045951cadb929c9020f9a2830b9dd9301377
SHA256876864ce44adb5444bd9c63fb1a5eaaf8c545e662b2b23b9f82f6c339e354140
SHA51298a446b5e2aeef92fafac47080f703beecf47ee7c36c183acb3770b11a36d44f3dbb61a5d933c65e556a41dec3a90ea0e5f299ef1b21aaa83355011c6b2f7a20
-
Filesize
142B
MD5c835956b2cdd3e0a9ae6b5fa39c04564
SHA1a35a3d83b9f565a5c63aabdfa5555a1f49bde80b
SHA25627118c53eb75846c5a86b4950790e83ffc5ccd8275f511f5d529b6278822a394
SHA512ed84a6047aa85f7c30a6440c3c31c9a229cfaacfdf7b8b828316d4c516be280f938f5a0b724c59eda792ad9cb7dacf911aa7a9dcd978dbcf3b89f0ad24b3e327
-
Filesize
51B
MD5fd4581e8538fdf8af793993c3eae5768
SHA1c5bc7ef5082f20e484286412216490ac775489cc
SHA2563490399765b07f17cc4b15d8bc5a1c28f1f4faec84c3294cf050b7c5ebdfd698
SHA51298946cb1bace1d2c53084a3e2d64a7f421d8d95b8286f18d2e676fe76c37ed279a393d712cee1aed84d612d493f70464303f8af94884bc10924c47da6358a1e7
-
Filesize
20B
MD573f05e5467b5657422a3e35b81d4c1cb
SHA1e5970f5ad3f7c388fa8d9202c8452c74083a3135
SHA256abf2c18a036fa23f9cace0d16a8484cf542dea8a61bab87a3b99250451eb4753
SHA5127879543a3bda5e43d515af0d47992cfb8ced4faa3bb71f1b31c61da98c216d6b7079ffe24d77388b7aa94b02f314a792e4cf5c73f8fb7b9b66b3b34f54b3b2e4
-
Filesize
4.0MB
MD54cc6efda014cc654142c97cd09175e37
SHA19ff80f73eb8aa9563ee04f3857fedbb4167a9a2a
SHA2560ffd67c501dd1778c35830465f07f2390e318a485e0b22e437404b0a9d4b5ad2
SHA512064ceb07ef2a8a5db7d07a3ee58df07008efd642f12960c7dce837f533876199c0773a4b9861cf7907487b7fb2a96d6a1efdcc854855fd9246198ca438cab751
-
Filesize
18.1MB
MD5e9134948a4db2642f9bfaaf157a18bd0
SHA198249d941c196e9ee01f5d77713f13a12fff87f4
SHA25667721cd04b1866888a97c1027e6d6ca5805b08124b724a31ff9931f9f3e28b2a
SHA512629b39736755e9a9987a74aa9dab6aec94be061a3c70c140ce98d4eb9ca3575ccc02380990a023f3fbc1f49d56518f1dc9345fd8c7fe3b9cfbf7eb9c80187995
-
Filesize
3.1MB
MD5c545527e69a46359a4a45f58794a0fe5
SHA1e233e5837bfe5d1429300fb33f12f5b54689781b
SHA2568d86976b5ecd432772d4ac5965ff86bff6da04318f231b3e7ea64818de6211f9
SHA512754c891b4f582948ba5dd776a87edba35f96453a540c20c5dd78f2d816bc83161e0d3f8a0f6052b5d0835f5a0b4eeb6d7a871aa611bd74e61ca25ea7046837e0
-
Filesize
907KB
MD543dc9e69f1e9db4059cf49a5e825cfda
SHA1519298f8a681b41d2d70db2670cc7543f1ee6da4
SHA25698efeee831a7984d94cf13800aeb1de68e79bea0bb5d95ff7adcbb43b648ed4d
SHA512d0c07cb1e251f2135fdb21893e6ca70efc019a8b759274c87266fb5a2c48ebc0126aecee0020bd48cfd65ef2f794b81b1e417000c91db18e2ac128c86eac4079
-
Filesize
4.5MB
MD5bbb61ad0f20d3fe17a5227c13f09e82d
SHA101700413fc5470aa0ba29aa1a962d7a719a92a82
SHA25639154701a5a844eacf6aa1ccc70297c66bda6e27450fd1043778cead49da859e
SHA512c614246263664268970562908c63e933ddda0a7f1c2f06b63eab9a06a2d8253356636cac948f709c37e66929d5d8b57663bf5f0d34fcf591ac7461c2af5b63e4
-
Filesize
831KB
MD5ce4d45d0b684f591d5a83fdbd99bd306
SHA1e89637b905c37033950afadaca2161bd5b09fb5e
SHA256907e054fef8297e3cd31d083299ff0ac495775eaa928e3e10e7000fdf6baaed7
SHA512af0aefc20b9c9c91f63f34fcd70c27e9e304073d51cc9ec45113ab360dd5ba4ad104b5c752e022b8b153f435527b56f6bfbb6022dd4bca98f8d1778e2bfc97d1
-
Filesize
19.1MB
MD5917a284494cbe4a4ec85e1ec768339c9
SHA147ccc0a04ecc7c3c1ff79bf42d424cfda356137c
SHA25657cb03fbc4750eefba0079c3fcdfc1b077e4347e0438f41e13b8614e7f11b772
SHA51290849e580c9da697689c664b126ed97b085bd2fd6016ac9193afd7a7ac625c76db84c9bf55a4bd0308da889a16b27832383738de5ecbec7e97bbd5b7962999d8
-
Filesize
3.8MB
MD50b830444a6ef848fb85bfbb173bb6076
SHA127964cc1673ddb68ca3da8018f0e13e9a141605e
SHA25663f361195a989491b2c10499d626ab3306edc36fbcb21a9cd832c4c4c059bb8f
SHA51231655204bfb16d1902bb70a603a47f6bf111c0f36962fea01e15193d72cc1fffcead1f1a7884d2929ceb77ac47c640ca8039a93b4648747496d462ffe6a05e65
-
Filesize
15KB
MD5e38cc92cd980a55d811316ac62883e14
SHA1fa83737abe11ee825c3da6843cc4d8e3b459729a
SHA256be4d8a5dc335ca8446c0dbba4ee4ef07553a5c242bed560f11aaef4793855e87
SHA5121422c8f94556ff0409a3cd1ff581f6c4ea56b01be36ba5b2c0e72465f4dad38391eb85bae28b079aa2f1204615d32a17b7e73e92ffcc9964f39c79626b7afe16
-
Filesize
642B
MD5930fc693d104c569f72ab6ed45f03652
SHA1502c4145fe3126bb789d8243b198189c146f8bc3
SHA25646b23756f7ccd684fa183bdac1ffd530dbdead934cde074c0271a4bf9377d25f
SHA5124aa227bfad93f9086e84b255801112d8e49b7f6759e3860b572c663afd3d7a86db0e469f6d9403bb2109f61c75db9db7e1c58274b1f31040658f6f5cbee49bf1
-
Filesize
739B
MD5170425c78e3055aaf7a005196fb2af9c
SHA1409bbbdbf33064cafde1e72062ff20b2549097cb
SHA256683819191f4cbde628675e5437eb154f092339312591e14e022a40d2a9306579
SHA5120a1694d28e0e8ead7d47c73d8e3331174cf0fba00905c8784ce902b86d67d731a7e8c63c133af6263b46671132daae0170c3b3a901b7859d360a0449e49490a7
-
Filesize
18KB
MD5b86dd14aadb9e34d004ad39a4693ced0
SHA11cb7775cee3e4106b2ddba89a0ccdc9dd547c521
SHA256b64d1d23aef5cdeeb2279216a00c931b201bce90407c9cbff3a7ef2742873878
SHA51203cb9215521da45e1df7b926fad7b0afd5ee001944c475a90c8646d7621d0d062267a682e102d81da0b5204ed215ec6ba4c7646d9340d71b0cb77ca12ddef0c1
-
Filesize
22KB
MD52252834ca67111b75c03af4f7a35458e
SHA141b9c769073ad00fb2f03e3b77cb3042fe270057
SHA256ad436ccabd94bafac29f91ad33cf9c36d5bc07bca14ca7bdccd6a3c8edc84724
SHA5122bb2c2488e3afba1a918180ae0244180da11aa47f5ed69f984fb3ea5d113774d6d4981a840daaaffaef49ba9360d43e1c8b9f2ffceec728af7a61d2fa3cf6dce
-
Filesize
23KB
MD5b22f41b8492924d4f0bf1b31ee25c470
SHA1800b02593380aedc360187abc5738152b6ee64a3
SHA2568a197d9c12aeb085637a866081e2ef6d9db3450a97765f85e3e62d38914bb352
SHA51253207f280e48c8ab7f857138d683f9e0e9b60fcb9e703d7eaa6e9f81c09c1feafa484f372c44669020e29b8a0b7533150a50312212f83a6f268e6864670032af
-
Filesize
211B
MD5029594e2a837803f50b842a87bce0413
SHA1e2850fbbb8c066e6acc771b586b670e109f41709
SHA2565cc54f13a2c160b8010ed382be9dc03b156ec070410a4074d4de22c1523492d1
SHA51200f7fd4b0ab8bab188cd529a358e47f3b9b85754e0bf96850651d006f8dbd30f03c970f40ca8f62382257412f4ba87a14e35e9ad663164371105cf9c62e73129
-
Filesize
175KB
MD529b9bfd25fabf42939e3a6877f9b3ece
SHA1c30d865bc2d680311c68eb0bed0e356845f700f9
SHA256ed586b6ceb3e9dcc7dd21dd7dc7addd89e71a2b90039fe15b751b367e402d475
SHA512a22827a2f9bc3de3c6c0ed5a4e36c383b5f8d4989fc543aa1a4852034c84055925df7456c1f9466ff3923de81f9d58a6f12d8f24e782bb2e805b908ef814a90e
-
Filesize
5KB
MD5d5b798d8816b252e7d718195dfeb8a8c
SHA1860c5807fd491aeeb12d661d8cf2ecca4ca1639b
SHA25675176962c8691f84eb299a555d4c82796b53a12161f1e6616ec50cf97393b499
SHA51216cd2e8f57c05ba2bae79de39867cc35178a6d99cd035d7d20efd8788076360a408affa9b6caf3ea09daf5c32834b995e47b1ab4ec29fcc1fdfddcf0ba96cce5
-
Filesize
7KB
MD54fe64f4a6a83da82fefde63d3873ce43
SHA1ab35bfe47a520fa7e09a97145fc7746261ef4906
SHA256196983eb82410a7c045c828e3f5d796ac23b31bd39ff83077ccb0d5800302558
SHA5129c4badae12ca9ae74a985a6058890f9fa463fc95a5df42432912ccfa7f0f633e00a59abfd7e79e4632b8b9ec16013313344fd6849ef157700d0c7d51379f8fcf
-
Filesize
572B
MD56d08ac0131cac7a2f9f2ea5d9d0b0cc6
SHA125983c1419089c6a7570963dda2d06e022b3b36d
SHA256846f9f2f624c8a1f001a4bd7c7ca3158c8c79cb11fa6d474cfdf8e48d0238a3f
SHA512753890f34fc1a925177a594c8bc5e19dc509fb8b32c1eef429496c5d19421200bdd75879c529981823340718bee82dafdf3f262a9ecf65de9ef03d12a1684b2c
-
Filesize
343B
MD5b516373c4f4f0bd98bbbcd71b4022e4d
SHA1fb2ccdcbec8ddcd91f35fd762dd86a5b2cb8e062
SHA25652e06087d9c0968150bc5d3b06895e3ab9b69aebea20e0328434b703aa242099
SHA512b1ef7ffd12b104a3caf8676c95285693c2af057537df0e87a292cea51bddf34be3ff00adae1337ecede93a8de9bb9ee71c464920f9f54c7bf3236d74aae98469
-
Filesize
341B
MD50f0b7bf12895cd6de6ad861763aeb094
SHA16e6f4fa3fac91de6a81bfc72fc90352f7a82d612
SHA25657f649a2b539b6b9f345e883fd5a541208ab88825daebb6fedef627c6f6290d0
SHA512bdb482b556c391d40f1e2228e32e7b11399bbe0379d25e219bf8f7745f8e7d1c0d104cb4f090d3814d4d7987008f49f750542c747bc0d761bae66d123fa5918f
-
Filesize
27KB
MD52b62fb1ecd174c7e951f2b8af502c1c0
SHA190744a9355dd5b74d2ecc7ee34fccbeca1c18f1b
SHA2561fc616dd97e72451eda1324979f65df6af823aaaee1c83e5c2c3f3308cd26a67
SHA5120f14fbab88469ed19cde8d54ad74276ae4b03a783bf99def2d0f4d655a6ff86a35aa7ce4e8a7dcb936c70789efc4714b9bf1b317e485a6a44f150be6792cd7a0
-
Filesize
1KB
MD5ca027a5ef5f6d21d7e42855fa4db4120
SHA1eee669fe1c3cabd5f96c65ac992e4851f8eca9da
SHA256e1b5e5122457b19ad5175b0b372d6d0b55813503827ad1d84c26f23b8506a66d
SHA5128dcd63d2406f6f7e67053342553345bb372401a8dda64e1b41e937df7359a8e4c0afa9705d8fbb953aeed403d54bcd6a5d5bddf7ca1d6c43f1da37020bdda491
-
Filesize
37KB
MD53fc9d055795a4c01893e5661f300c513
SHA129c64165afecea436a2dcb57dd5b54163a002df4
SHA256425eb69377f5ab3508bca26402d48377ab0362840ef0c77852236f45efc597e0
SHA512e1622c0390a66dba328f5c699b10b32c66aec8a20474a6b5d49c2e0faf3a9997620db0f2162d6763976d70159e53363e9217d372cb19f982241f66ec8761c902
-
Filesize
16KB
MD5bd33707a5e0b6cc434fbaa32e69cb30a
SHA134ddc8fbda6acef9e07de571d4c00e65e3c09958
SHA256bf60d1aa67abc73f927e1544ba8b66a79ec9143caedb15e1d94d023be6aba036
SHA51202b78b7796e55e245d00ae5b94ae767c6c7da480ec609e84b1a4deafb5f6dbb8f15ad5947b3db421048e17d46419b2149ef23aa369ce42288d3bb5817a0863de
-
Filesize
9.5MB
MD5eca3bcc6780653fc53282e3a6cce79b2
SHA124512b8e824890b34441442f429f1890614a2c8a
SHA25672ec7275fee205958ec5b86a6e7d24fbd0dc2d9c081e1808df2a9fb024f3e959
SHA51274588f99e1c6038640c5b699701a9635c76a8da7059438a25741a74d13ce2fa3cddf5b0fa6af26b9beb1d4fe022d5bb38ec13868c04b7f68ce5f079a63c07a78
-
Filesize
3.6MB
MD5cb33ee6145c1dfad640103e1bc8b00e9
SHA1e68405536c9501a5f7617636db734a7e7bfdb61c
SHA256068bd9cd5dc944ff9030bdf3e31638408314e54861b93cdaf8c3c905a8005cac
SHA51231608dc1d295c91d012fd4634494b182c6d4b70c255036cbd0f71ace56fbc1a69f8358b8799d2db21e0bea1010ad79dee774b6049bf31dd513042b460722508b
-
Filesize
348KB
MD52973af8515effd0a3bfc7a43b03b3fcc
SHA14209cded0caac7c5cb07bcb29f1ee0dc5ac211ee
SHA256d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0
SHA512b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e
-
Filesize
29KB
MD5c53dc6d8050e08d12939b95e2f5c53dc
SHA101f3fd1a4c730cad939d243e6bb8f9fe8f1e0138
SHA2565a690ef46a5c889adbad580b773a6025040426ee11d3817927dd1e77698e8ece
SHA51275ec453cfa12a071322877db4244746de6ecec779c4f267cb3b9729437f3e0a90ffa2fe1d42e5baf05c159c8c6ef6c71bc7e258044162e5fcbaad10a9e93d84a