Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe
Resource
win10v2004-20240704-en
General
-
Target
a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe
-
Size
1.8MB
-
MD5
19a38385f077241168986482aca1745e
-
SHA1
72eebe027f024674814b165393af33b917a77e7e
-
SHA256
a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f
-
SHA512
0df2c4752effe858bae2edf474116ba517e7f03dcbc861b0f6da36b0e15f80e968012146d223bc03e1f269e830da381ad99153158c655992b0f49f3806ac33aa
-
SSDEEP
24576:x6/rcC6mfBhc/wRRcxFeUTLYf6/eJj95FUHMBzp0ey08kkaIwHh7VZwZD1ltmEOC:xMFMIqxF/WrRhzKS8kk6Hwr3uQYP
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
stealc
ZOV
http://40.86.87.10
-
url_path
/108e010e8f91c38c.php
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/files/0x000600000001a321-274.dat family_vidar_v7 -
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a0b8-217.dat family_monster behavioral1/memory/2640-223-0x000000013F410000-0x000000014064E000-memory.dmp family_monster -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe -
Executes dropped EXE 19 IoCs
pid Process 2244 axplong.exe 2612 stealc_zov.exe 1956 leg222.exe 2784 UGcLEmRAhjNb.exe 1792 gold543.exe 2376 wev233v22.exe 604 Freshbuild.exe 2640 stub.exe 2324 Hkbsse.exe 1932 build.exe 684 trc.exe 1656 runerdata.exe 444 1.exe 1912 1.exe 3716 build1111.exe 2080 runerdata.exe 1184 vvshdq.exe 1384 vvshdq.exe 936 vvshdq.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Wine a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe -
Loads dropped DLL 33 IoCs
pid Process 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 2244 axplong.exe 2244 axplong.exe 2244 axplong.exe 2304 WerFault.exe 2304 WerFault.exe 2304 WerFault.exe 2244 axplong.exe 2244 axplong.exe 2244 axplong.exe 668 WerFault.exe 668 WerFault.exe 668 WerFault.exe 2612 stealc_zov.exe 2612 stealc_zov.exe 2244 axplong.exe 2244 axplong.exe 2376 wev233v22.exe 2640 stub.exe 604 Freshbuild.exe 2324 Hkbsse.exe 2324 Hkbsse.exe 2244 axplong.exe 2244 axplong.exe 2244 axplong.exe 2244 axplong.exe 2324 Hkbsse.exe 2324 Hkbsse.exe 2244 axplong.exe 2244 axplong.exe 2380 BitLockerToGo.exe 2380 BitLockerToGo.exe 1656 runerdata.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lsfjqpwrs = "C:\\Users\\Admin\\AppData\\Roaming\\Lsfjqpwrs.exe" runerdata.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 2244 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 684 set thread context of 2380 684 trc.exe 52 PID 1656 set thread context of 2080 1656 runerdata.exe 59 PID 1184 set thread context of 1384 1184 vvshdq.exe 62 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe File created C:\Windows\Tasks\Hkbsse.job Freshbuild.exe File created C:\Windows\Tasks\Test Task17.job runerdata.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2304 1956 WerFault.exe 33 668 1792 WerFault.exe 37 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_zov.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_zov.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4024 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a build.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Hkbsse.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Hkbsse.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 2244 axplong.exe 2612 stealc_zov.exe 2612 stealc_zov.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 1932 build.exe 2380 BitLockerToGo.exe 1932 build.exe 2380 BitLockerToGo.exe 1932 build.exe 2368 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1656 runerdata.exe Token: SeDebugPrivilege 1656 runerdata.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 1184 vvshdq.exe Token: SeDebugPrivilege 1184 vvshdq.exe Token: SeDebugPrivilege 936 vvshdq.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 604 Freshbuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2244 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 30 PID 2312 wrote to memory of 2244 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 30 PID 2312 wrote to memory of 2244 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 30 PID 2312 wrote to memory of 2244 2312 a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe 30 PID 2244 wrote to memory of 2612 2244 axplong.exe 32 PID 2244 wrote to memory of 2612 2244 axplong.exe 32 PID 2244 wrote to memory of 2612 2244 axplong.exe 32 PID 2244 wrote to memory of 2612 2244 axplong.exe 32 PID 2244 wrote to memory of 1956 2244 axplong.exe 33 PID 2244 wrote to memory of 1956 2244 axplong.exe 33 PID 2244 wrote to memory of 1956 2244 axplong.exe 33 PID 2244 wrote to memory of 1956 2244 axplong.exe 33 PID 1956 wrote to memory of 2304 1956 leg222.exe 34 PID 1956 wrote to memory of 2304 1956 leg222.exe 34 PID 1956 wrote to memory of 2304 1956 leg222.exe 34 PID 1956 wrote to memory of 2304 1956 leg222.exe 34 PID 2244 wrote to memory of 2784 2244 axplong.exe 36 PID 2244 wrote to memory of 2784 2244 axplong.exe 36 PID 2244 wrote to memory of 2784 2244 axplong.exe 36 PID 2244 wrote to memory of 2784 2244 axplong.exe 36 PID 2244 wrote to memory of 1792 2244 axplong.exe 37 PID 2244 wrote to memory of 1792 2244 axplong.exe 37 PID 2244 wrote to memory of 1792 2244 axplong.exe 37 PID 2244 wrote to memory of 1792 2244 axplong.exe 37 PID 1792 wrote to memory of 668 1792 gold543.exe 39 PID 1792 wrote to memory of 668 1792 gold543.exe 39 PID 1792 wrote to memory of 668 1792 gold543.exe 39 PID 1792 wrote to memory of 668 1792 gold543.exe 39 PID 2244 wrote to memory of 2376 2244 axplong.exe 40 PID 2244 wrote to memory of 2376 2244 axplong.exe 40 PID 2244 wrote to memory of 2376 2244 axplong.exe 40 PID 2244 wrote to memory of 2376 2244 axplong.exe 40 PID 2244 wrote to memory of 604 2244 axplong.exe 41 PID 2244 wrote to memory of 604 2244 axplong.exe 41 PID 2244 wrote to memory of 604 2244 axplong.exe 41 PID 2244 wrote to memory of 604 2244 axplong.exe 41 PID 2376 wrote to memory of 2640 2376 wev233v22.exe 42 PID 2376 wrote to memory of 2640 2376 wev233v22.exe 42 PID 2376 wrote to memory of 2640 2376 wev233v22.exe 42 PID 604 wrote to memory of 2324 604 Freshbuild.exe 43 PID 604 wrote to memory of 2324 604 Freshbuild.exe 43 PID 604 wrote to memory of 2324 604 Freshbuild.exe 43 PID 604 wrote to memory of 2324 604 Freshbuild.exe 43 PID 2324 wrote to memory of 1932 2324 Hkbsse.exe 44 PID 2324 wrote to memory of 1932 2324 Hkbsse.exe 44 PID 2324 wrote to memory of 1932 2324 Hkbsse.exe 44 PID 2324 wrote to memory of 1932 2324 Hkbsse.exe 44 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 684 2244 axplong.exe 45 PID 2244 wrote to memory of 1656 2244 axplong.exe 47 PID 2244 wrote to memory of 1656 2244 axplong.exe 47 PID 2244 wrote to memory of 1656 2244 axplong.exe 47 PID 2244 wrote to memory of 1656 2244 axplong.exe 47 PID 2244 wrote to memory of 444 2244 axplong.exe 48 PID 2244 wrote to memory of 444 2244 axplong.exe 48 PID 2244 wrote to memory of 444 2244 axplong.exe 48 PID 2244 wrote to memory of 444 2244 axplong.exe 48 PID 2324 wrote to memory of 1912 2324 Hkbsse.exe 49 PID 2324 wrote to memory of 1912 2324 Hkbsse.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe"C:\Users\Admin\AppData\Local\Temp\a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\1000160001\leg222.exe"C:\Users\Admin\AppData\Local\Temp\1000160001\leg222.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 964⤵
- Loads dropped DLL
- Program crash
PID:2304
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000171001\UGcLEmRAhjNb.exe"C:\Users\Admin\AppData\Local\Temp\1000171001\UGcLEmRAhjNb.exe"3⤵
- Executes dropped EXE
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\1000192001\gold543.exe"C:\Users\Admin\AppData\Local\Temp\1000192001\gold543.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 1124⤵
- Loads dropped DLL
- Program crash
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000193001\wev233v22.exe"C:\Users\Admin\AppData\Local\Temp\1000193001\wev233v22.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\onefile_2376_133649608871122000\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000193001\wev233v22.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000198001\Freshbuild.exe"C:\Users\Admin\AppData\Local\Temp\1000198001\Freshbuild.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\1000046001\build.exe"C:\Users\Admin\AppData\Local\Temp\1000046001\build.exe"5⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KKECBFCGIEGC" & exit6⤵PID:1572
-
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- Delays execution with timeout.exe
PID:4024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000047001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000047001\1.exe"5⤵
- Executes dropped EXE
PID:1912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000202001\trc.exe"C:\Users\Admin\AppData\Local\Temp\1000202001\trc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:684 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe4⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000204001\runerdata.exe"C:\Users\Admin\AppData\Local\Temp\1000204001\runerdata.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\1000204001\runerdata.exe"C:\Users\Admin\AppData\Local\Temp\1000204001\runerdata.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000205001\1.exe"C:\Users\Admin\AppData\Local\Temp\1000205001\1.exe"3⤵
- Executes dropped EXE
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\1000208001\build1111.exe"C:\Users\Admin\AppData\Local\Temp\1000208001\build1111.exe"3⤵
- Executes dropped EXE
PID:3716
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E0A066D1-0ABF-4CB7-A4B6-B9495611C3DF} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]1⤵PID:1860
-
C:\ProgramData\ttawx\vvshdq.exeC:\ProgramData\ttawx\vvshdq.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\ProgramData\ttawx\vvshdq.exe"C:\ProgramData\ttawx\vvshdq.exe"3⤵
- Executes dropped EXE
PID:1384
-
-
-
C:\ProgramData\ttawx\vvshdq.exeC:\ProgramData\ttawx\vvshdq.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
6KB
MD5a0400e5713c79c8fa9b1445f198c01ec
SHA1efb9ce1369dbb652fc439fa84bf3e9e082fa8fc5
SHA256f8d8b9edb745bf6c5b8e0e26ef77cc360887f16a311b95b59888807f982560a6
SHA512659ba1e1621b39bc7a421f495b9f3a507b36322457a563f4b7abf062c1742daa4f643badadbd9fd2d754811aad294f138f35af8dd322bfd3d6b75ac4db7da1ad
-
Filesize
92KB
MD5cf00cf5b059b43e29cbde1a36c6209f3
SHA19df2f8ef60997e3934fef0d88f9770fb9d19769f
SHA2569f861e6046979ac19a569747cd17b7e77a8e1301c870691595a68d9a8244a30a
SHA51216e433a67de26cbf052f2639df05c5d3d2c5ef5d4ef065b45af913174e08415bd6672f6637e8727e88b2e68c74c2ffeabc6673e1506e8ad397edb198e0276399
-
Filesize
206KB
MD52dece3353cda5321fff7c92a697c37ee
SHA193b6be2ea8097c6c09785bb71b9e7286083034b7
SHA25647e7322c2ff85274fed0726ef42f3b7be3f7a62466e76ad05126767151024306
SHA512dc24f46640765c775271d0432028890973826159d0543c3ad6cd97dfeb62dd84c650887a62aa966106f38dcaaeca6dc64d2a4083b21ff62390d77a04022d9730
-
Filesize
165KB
MD525f0bb92042d9e148ca6d076d0e401d1
SHA143b668e2b22f216cd6184ee2fb329ba6de4fd687
SHA2561b5fbf0fffc028708def7f8b1510dd668da7abbd0d0f63b597669339005e33e0
SHA512762a2854149b8d8cf5ddcfc933f2b95e04e725d2aedccf6d690c69b2f658965e66cffc458d105dcfe6dc973ff0d5f00c4930ab00949bce9798b0a3e25946085f
-
Filesize
158KB
MD5253ccac8a47b80287f651987c0c779ea
SHA111db405849dbaa9b3759de921835df20fab35bc3
SHA256262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f
SHA512af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d
-
Filesize
1.1MB
MD55486fd5b8200f34b23f23a21f8912ade
SHA1379f7b095751116c9a6c56d0945ca12ae122d253
SHA2561ecf603a32b23fdf06e0260f314f5390e9c062d74fa2fe65b05754e83c41df46
SHA512e9ad33509efc7303b09a9633f9f6136bba807deca3b9032a91475a66c038b4a1df44e036d9f7acae63f1854df65d47c00c59e6e3d79e7c44a5a6ae631c512f3f
-
Filesize
5.2MB
MD5f2a5c7e8313862aca9b7a6314ca73f3a
SHA1dd9f9c6d3dfc2805e8851676679cd9734a877eea
SHA256ca66a07c7d3fc179579bc8ffe620503fe7f86abdd1abb0c17fbe5bfef42d7b9f
SHA512a459adc6ce2cc9d19672894de1df41228da0b072bbbd67493b7a1d3b57cd491c0c62b7e842e1d7306719e889fe777b915b3de274f4dad52ba5ba601783e79a13
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
537KB
MD5e72e3e0f37eddc11e9003053604c7ab6
SHA12c8fe866e63d022f0da0f67132d14260fc220e24
SHA2566ccec07e798b1400fdb5c6d059b4a7421333c12ec60c566d599e556cd74e53b2
SHA51210ff29c4310676f4f198baf12d087b4283bcafa846f626493e9716611b4e815df58073f37018a337654de1d382b31bc7e8ae948dbe1c77e156b89f2c5d8479ac
-
Filesize
10.7MB
MD5f7f9d3c98351d9be736e7aafb3563561
SHA11f60f25b4b8f3f38a9f40680289554216c2f9924
SHA2567bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a
SHA512fed3e1bb950d746f1ed4dffeb88259b2a6e8ad40afe161469e8b0cff7c70e40617d3ca1dffc2899d3ac35790d1817f1d54724ead5d5941d485c6c67070070a87
-
Filesize
415KB
MD507101cac5b9477ba636cd8ca7b9932cb
SHA159ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
SHA256488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
SHA51202240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
Filesize
8.4MB
MD574758f61067ea9fa0e2a4593920ed0f2
SHA1bc2787dd0758f109c4ba06bf1c65d50180de928d
SHA256f0c3e45b96e2fa1bcd7f39a9a80337314cc27ea3df30a90c594b43fa8487adc6
SHA51270f906346d110b3db97f3210dcf9ec6f534fa9b39fc7bf0ae16c27f3c8e6064acfdff03f14366ce7a40eb5d28e8038a42b836bc338a7fbd4a6188b6198e8a7c7
-
Filesize
1.5MB
MD599c919281e619f24edc578e427433f7b
SHA1db8888fe075b24ca4d55788e46933edd52cc17e8
SHA25695ff9b2516243fd104555cb9b3fa51b27adeba8f27a80c0f69f7918599938e27
SHA512d103c14641cd0a849a3702df0ba111252106a32f005e155afa4bafd055ed88c590bdf6e0dc8fcd423689df1978c5931c57bd9878ada015f84a821bd6d1c04093
-
Filesize
272KB
MD521cccf69e6aac10cae5b938d7b6c5fd4
SHA17bc1f21cb79f96c65775ef16044637fe03892b60
SHA256695068e6b6d7fe332fb683ea0c72932e43ddcbd320fd6cab05ce7531ba1a5373
SHA5123294eb5438118164426085d366655c1c42e1dde12e7073e530419948347b632815e33f156e860bf78a78cc903669eb46307e677d0b79794c4c61361ecbea746d
-
Filesize
1.7MB
MD5dea351e95b2d5b0a6b3911d531315550
SHA16720ee0a19bc634b1b9f20632b354903788d3a5c
SHA256b116c1e0f92dca485565d5f7f3b572d7f01724062320597733b9dbf6dd84dee1
SHA5120a4043b6266a36923b0e570936aa97707a5180810d8a6bb105dbdfd53872a1b0375dca24b0599ef8f378df860babb0ba19104c9755cc5f99992ca08a8dc27797
-
Filesize
1.8MB
MD519a38385f077241168986482aca1745e
SHA172eebe027f024674814b165393af33b917a77e7e
SHA256a2e2d2eda2840763380435b4e1ec84476d1de5fd4e69efc32aa385910c172a8f
SHA5120df2c4752effe858bae2edf474116ba517e7f03dcbc861b0f6da36b0e15f80e968012146d223bc03e1f269e830da381ad99153158c655992b0f49f3806ac33aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
18.0MB
MD529c69826ec2d163248c5c197bca46bf9
SHA109bbc60b1cb75a889cf1f3e69b559614756ce5b2
SHA25697fac7dcecc7df1aa7e772929db5f13b6397097b729be7c809f4313906f7c844
SHA512f1ed496499adcbff74a1f01d7beb0823533292d436054519d1a1c18ce6ba1b3d63073f36ccc886a60347dc06e1d7a4a715811b95f084d16513051658133c8dbf