Analysis
-
max time kernel
189s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
SignalSetup.msi
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
SignalSetup.msi
Resource
win10v2004-20240709-en
General
-
Target
SignalSetup.msi
-
Size
150.8MB
-
MD5
75b8008f805e2464792de8e9ad824207
-
SHA1
3426ce901e21b195e4609153c509b595b71edeb2
-
SHA256
852b7be78f53bb6052f4b1cb2908c62caaa09524b442356430c0166f4bbe47d5
-
SHA512
96a5374bef016c3ddcc6cf4223d358fcd2fe777254dc381b623f6253e450d7fef2426db57141f208bfd01909ba152251da89137cccd54c4136ea24b4ae8b8c7f
-
SSDEEP
3145728:NMrQiDKQ5KqsKcnBzeAjmtYeV0QCSEiEze7ZXzLkYMPlSNRRDu:IjKQ5sK6BzTiYe2QvE9yDoE/RD
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/700-297-0x0000000001FE0000-0x000000000205B000-memory.dmp family_gh0strat -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exevtreamsetup.exedescription ioc process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: vtreamsetup.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: vtreamsetup.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: vtreamsetup.exe File opened (read-only) \??\K: vtreamsetup.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: vtreamsetup.exe File opened (read-only) \??\L: vtreamsetup.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: vtreamsetup.exe File opened (read-only) \??\I: vtreamsetup.exe File opened (read-only) \??\O: vtreamsetup.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: vtreamsetup.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: vtreamsetup.exe File opened (read-only) \??\V: vtreamsetup.exe File opened (read-only) \??\Z: vtreamsetup.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: vtreamsetup.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\N: vtreamsetup.exe File opened (read-only) \??\S: vtreamsetup.exe File opened (read-only) \??\X: vtreamsetup.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: vtreamsetup.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: vtreamsetup.exe File opened (read-only) \??\W: vtreamsetup.exe File opened (read-only) \??\Y: vtreamsetup.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Drops file in Windows directory 12 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f772175.msi msiexec.exe File opened for modification C:\Windows\Installer\f772175.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI23A9.tmp msiexec.exe File opened for modification C:\Windows\Installer\f772178.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSI2202.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI232B.tmp msiexec.exe File created C:\Windows\Installer\f772178.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI253F.tmp msiexec.exe -
Executes dropped EXE 2 IoCs
Processes:
vtreamsetup.exeSignalSetup.exepid process 700 vtreamsetup.exe 1428 SignalSetup.exe -
Loads dropped DLL 45 IoCs
Processes:
MsiExec.exevtreamsetup.exeSignalSetup.exepid process 1932 MsiExec.exe 1932 MsiExec.exe 1932 MsiExec.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 1428 SignalSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
vtreamsetup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vtreamsetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vtreamsetup.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
msiexec.exevtreamsetup.exepid process 2712 msiexec.exe 2712 msiexec.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe 700 vtreamsetup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 2632 msiexec.exe Token: SeIncreaseQuotaPrivilege 2632 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeSecurityPrivilege 2712 msiexec.exe Token: SeCreateTokenPrivilege 2632 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2632 msiexec.exe Token: SeLockMemoryPrivilege 2632 msiexec.exe Token: SeIncreaseQuotaPrivilege 2632 msiexec.exe Token: SeMachineAccountPrivilege 2632 msiexec.exe Token: SeTcbPrivilege 2632 msiexec.exe Token: SeSecurityPrivilege 2632 msiexec.exe Token: SeTakeOwnershipPrivilege 2632 msiexec.exe Token: SeLoadDriverPrivilege 2632 msiexec.exe Token: SeSystemProfilePrivilege 2632 msiexec.exe Token: SeSystemtimePrivilege 2632 msiexec.exe Token: SeProfSingleProcessPrivilege 2632 msiexec.exe Token: SeIncBasePriorityPrivilege 2632 msiexec.exe Token: SeCreatePagefilePrivilege 2632 msiexec.exe Token: SeCreatePermanentPrivilege 2632 msiexec.exe Token: SeBackupPrivilege 2632 msiexec.exe Token: SeRestorePrivilege 2632 msiexec.exe Token: SeShutdownPrivilege 2632 msiexec.exe Token: SeDebugPrivilege 2632 msiexec.exe Token: SeAuditPrivilege 2632 msiexec.exe Token: SeSystemEnvironmentPrivilege 2632 msiexec.exe Token: SeChangeNotifyPrivilege 2632 msiexec.exe Token: SeRemoteShutdownPrivilege 2632 msiexec.exe Token: SeUndockPrivilege 2632 msiexec.exe Token: SeSyncAgentPrivilege 2632 msiexec.exe Token: SeEnableDelegationPrivilege 2632 msiexec.exe Token: SeManageVolumePrivilege 2632 msiexec.exe Token: SeImpersonatePrivilege 2632 msiexec.exe Token: SeCreateGlobalPrivilege 2632 msiexec.exe Token: SeBackupPrivilege 2820 vssvc.exe Token: SeRestorePrivilege 2820 vssvc.exe Token: SeAuditPrivilege 2820 vssvc.exe Token: SeBackupPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2540 DrvInst.exe Token: SeLoadDriverPrivilege 2540 DrvInst.exe Token: SeLoadDriverPrivilege 2540 DrvInst.exe Token: SeLoadDriverPrivilege 2540 DrvInst.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeRestorePrivilege 2712 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 2632 msiexec.exe 2632 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vtreamsetup.exepid process 700 vtreamsetup.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
msiexec.exedescription pid process target process PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 1932 2712 msiexec.exe MsiExec.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 700 2712 msiexec.exe vtreamsetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe PID 2712 wrote to memory of 1428 2712 msiexec.exe SignalSetup.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SignalSetup.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2632
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A585E133DE0027C129465CEB56A7D4B12⤵
- Loads dropped DLL
PID:1932 -
C:\Users\Public\stdio\vtreamsetup.exe"C:\Users\Public\stdio\vtreamsetup.exe"2⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Public\SignalSetup.exe"C:\Users\Public\SignalSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000002C8" "00000000000003B0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD56aa1b1e50eefde21ca289ba2b3d8c753
SHA17378cf95377a7f464871a3fa4f2dc0df0bee502f
SHA256e6f5c226cff7f235b9fb0eeb3d3ec1b67366d81355f3ccbe3e8264c3c066e354
SHA512552ed4cf865437259bf2613b5efb1ead50f9337085c12c285c87c3d7f8c5302c964c7952983e508ca434f500cc42297abe2f12c75105dad53a64c430486113e8
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
1.5MB
MD5a3b393d6604c40c51f9f28533161ab81
SHA119480433f1a094f135eff78e4b63c5b47411f333
SHA256a830e40e43aef4d9d7b7eeb6d94c17cd2cb11be7f3ee8adce2399ec5c0a6049c
SHA51212c460443ae98c0a57abe98e8d70802367d9fe2a14faf66164a094ffdb10ee6d8a6b41e4c96e58a423218f3653ea56d804ed15614ff6957948025f78389c3313
-
Filesize
438KB
MD51fb93933fd087215a3c7b0800e6bb703
SHA1a78232c352ed06cedd7ca5cd5cb60e61ef8d86fb
SHA2562db7fd3c9c3c4b67f2d50a5a50e8c69154dc859780dd487c28a4e6ed1af90d01
SHA51279cd448e44b5607863b3cd0f9c8e1310f7e340559495589c428a24a4ac49beb06502d787824097bb959a1c9cb80672630dac19a405468a0b64db5ebd6493590e
-
Filesize
893KB
MD5057d333133ba16ad86fa644e8b28adf7
SHA17542ae74dbcaef4fd60e82937080efa1c2ac954f
SHA25651d34fdf50a1542a86f2befa3e0f7615832558d29e41cf92c9206b44b67e1350
SHA51283a61c8da999bdcc3bb47b47d8aeea3fb8605404cda949acb91bb0b7aaba7d1c854f7cf44d8d5ba81d5be5d2c3dfc5babf66f72bf1137c2786b34bd32b853e78
-
Filesize
24KB
MD532f12897dbfad3149821d503013c6a28
SHA152fc6755add14e6f6eb2b2f5a20d8022a32c8225
SHA25693fcab146f4061b93e6566b1846cfefd05dae52afd763fdd261e6a0543436671
SHA512c0547fb67c4d80e2d2744179c4b21d1e9b8694f53a6c843adc7e28df48b0e56c95c25b6cfc956f440d856add2bfc339b8178c820c28a09250854b5a57587db59
-
Filesize
78KB
MD51b171f9a428c44acf85f89989007c328
SHA16f25a874d6cbf8158cb7c491dcedaa81ceaebbae
SHA2569d02e952396bdff3abfe5654e07b7a713c84268a225e11ed9a3bf338ed1e424c
SHA51299a06770eea07f36abc4ae0cecb2ae13c3acb362b38b731c3baed045bf76ea6b61efe4089cd2efac27701e9443388322365bdb039cd388987b24d4a43c973bd1
-
Filesize
17KB
MD579ee4a2fcbe24e9a65106de834ccda4a
SHA1fd1ba674371af7116ea06ad42886185f98ba137b
SHA2569f7bda59faafc8a455f98397a63a7f7d114efc4e8a41808c791256ebf33c7613
SHA5126ef7857d856a1d23333669184a231ad402dc62c8f457a6305fe53ed5e792176ca6f9e561375a707da0d7dd27e6ea95f8c4355c5dc217e847e807000b310aa05c
-
Filesize
17KB
MD53f224766fe9b090333fdb43d5a22f9ea
SHA1548d1bb707ae7a3dfccc0c2d99908561a305f57b
SHA256ae5e73416eb64bc18249ace99f6847024eceea7ce9c343696c84196460f3a357
SHA512c12ea6758071b332368d7ef0857479d2b43a4b27ceeab86cbb542bd6f1515f605ea526dfa3480717f8f452989c25d0ee92bf3335550b15ecec79e9b25e66a2ca
-
Filesize
20KB
MD523bd405a6cfd1e38c74c5150eec28d0a
SHA11d3be98e7dfe565e297e837a7085731ecd368c7b
SHA256a7fa48de6c06666b80184afee7e544c258e0fb11399ab3fe47d4e74667779f41
SHA512c52d487727a34fbb601b01031300a80eca7c4a08af87567da32cb5b60f7a41eb2cae06697cd11095322f2fc8307219111ee02b60045904b5c9b1f37e48a06a21
-
Filesize
18KB
MD595c5b49af7f2c7d3cd0bc14b1e9efacb
SHA1c400205c81140e60dffa8811c1906ce87c58971e
SHA256ff9b51aff7fbec8d7fe5cc478b12492a59b38b068dc2b518324173bb3179a0e1
SHA512f320937b90068877c46d30a15440dc9ace652c3319f5d75e0c8bb83f37e78be0efb7767b2bd713be6d38943c8db3d3d4c3da44849271605324e599e1242309c3
-
Filesize
18KB
MD56e704280d632c2f8f2cadefcae25ad85
SHA1699c5a1c553d64d7ff3cf4fe57da72bb151caede
SHA256758a2f9ef6908b51745db50d89610fe1de921d93b2dbea919bfdba813d5d8893
SHA512ade85a6cd05128536996705fd60c73f04bab808dafb5d8a93c45b2ee6237b6b4ddb087f1a009a9d289c868c98e61be49259157f5161feccf9f572fd306b460e6
-
Filesize
21KB
MD59ddea3cc96e0fdd3443cc60d649931b3
SHA1af3cb7036318a8427f20b8561079e279119dca0e
SHA256b7c3ebc36c84630a52d23d1c0e79d61012dfa44cdebdf039af31ec9e322845a5
SHA5121427193b31b64715f5712db9c431593bdc56ef512fe353147ddb7544c1c39ded4371cd72055d82818e965aff0441b7cbe0b811d828efb0ece28471716659e162
-
Filesize
18KB
MD51776a2b85378b27825cf5e5a3a132d9a
SHA1626f0e7f2f18f31ec304fe7a7af1a87cbbebb1df
SHA256675b1b82dd485cc8c8a099272db9241d0d2a7f45424901f35231b79186ec47ee
SHA512541a5dd997fc5fec31c17b4f95f03c3a52e106d6fb590cb46bdf5adad23ed4a895853768229f3fbb9049f614d9bae031e6c43cec43fb38c89f13163721bb8348
-
Filesize
18KB
MD5034379bcea45eb99db8cdfeacbc5e281
SHA1bbf93d82e7e306e827efeb9612e8eab2b760e2b7
SHA2568b543b1bb241f5b773eb76f652dad7b12e3e4a09230f2e804cd6b0622e8baf65
SHA5127ea6efb75b0c59d3120d5b13da139042726a06d105c924095ed252f39ac19e11e8a5c6bb1c45fa7519c0163716745d03fb9daaaca50139a115235ab2815cc256
-
Filesize
28KB
MD58da414c3524a869e5679c0678d1640c1
SHA160cf28792c68e9894878c31b323e68feb4676865
SHA25639723e61c98703034b264b97ee0fe12e696c6560483d799020f9847d8a952672
SHA5126ef3f81206e7d4dca5b3c1fafc9aa2328b717e61ee0acce30dfb15ad0fe3cb59b2bd61f92bf6046c0aae01445896dcb1485ad8be86629d22c3301a1b5f4f2cfa
-
Filesize
25KB
MD519d7f2d6424c98c45702489a375d9e17
SHA1310bc4ed49492383e7c669ac9145bda2956c7564
SHA256a6b83b764555d517216e0e34c4945f7a7501c1b7a25308d8f85551fe353f9c15
SHA51201c09edef90c60c9e6cdabff918f15afc9b728d6671947898ce8848e3d102f300f3fb4246af0ac9c6f57b3b85b24832d7b40452358636125b61eb89567d3b17e
-
Filesize
22KB
MD5fb0ca6cbfff46be87ad729a1c4fde138
SHA12c302d1c535d5c40f31c3a75393118b40e1b2af9
SHA2561ee8e99190cc31b104fb75e66928b8c73138902fefedbcfb54c409df50a364df
SHA51299144c67c33e89b8283c5b39b8bf68d55638daa6acc2715a2ac8c5dba4170dd12299d3a2dffb39ae38ef0872c2c68a64d7cdc6ceba5e660a53942761cb9eca83
-
Filesize
23KB
MD5d5166ab3034f0e1aa679bfa1907e5844
SHA1851dd640cb34177c43b5f47b218a686c09fa6b4c
SHA2567bcab4ca00fb1f85fea29dd3375f709317b984a6f3b9ba12b8cf1952f97beee5
SHA5128f2d7442191de22457c1b8402faad594af2fe0c38280aaafc876c797ca79f7f4b6860e557e37c3dbe084fe7262a85c358e3eeaf91e16855a91b7535cb0ac832e
-
Filesize
20KB
MD59b79fda359a269c63dcac69b2c81caa4
SHA1a38c81b7a2ec158dfcfeb72cb7c04b3eb3ccc0fb
SHA2564d0f0ea6e8478132892f9e674e27e2bc346622fc8989c704e5b2299a18c1d138
SHA512e69d275c5ec5eae5c95b0596f0cc681b7d287b3e2f9c78a9b5e658949e6244f754f96ad7d40214d22ed28d64e4e8bd507363cdf99999fea93cfe319078c1f541
-
Filesize
4.8MB
MD506f307b7ddb0994b448b9786cf5811b8
SHA14d70c5206e84b23916e4c686f430e5dcdc70dfc3
SHA256dde3c8e9e7d414913a29979798311d095c1b8869ee405a1c3fcbba14da90446d
SHA512b26bcfca4569ce9fb4b7196c952ce38b0e3a30aeff2e7ac4b2ea1c695c658c1d92029fb7e31ad231e62de8dff2a86ab3821aa1f9d5c944d88b263d88efeca16a
-
Filesize
61B
MD506215e8fa1aaa6519a6f5269ed2da980
SHA18cf5f5fef45f41c3c5faf9c4dd91ce3ee9c7b26a
SHA2560f10fd4bb6bde22ae277a55fb622542d026a0f0e40c4d0c3c7fc270536ae9680
SHA51287b36e5202c4f20450e1b0f5e180b4e84ecd746da2f25bf95ce8a2a2425e2caaad54a351b57c6435c0e450e7587e04deceac14c1c24c306751bf1decf0688728
-
Filesize
346KB
MD5b575cfefd5c7b14f4743ef2ad74b2736
SHA1f433813501a7b5b96186bb02fe69ca01580627ed
SHA256a38708da0db2003a1d14ed1e9d45a9ecb30a6294d472692f804ffb0cea70334b
SHA512ea912b2589142f1a89ef84e503bf65999beb7aa76d2aa50e1e7edc178bf841debed906fc11da555a004fc715f52fa09baf3a3fe4b42c33e5c9cf811eba676e5e
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
271KB
MD527378e77fed60b91b9eacef55b10d3a2
SHA1603050de753ae268e09aca9e37b30ac4e647b6b7
SHA256553920c1b7dbcabcd18e8a17a3f0b3bd91f3fd2a3375a6163c8e85d441cb8a18
SHA51295be8277a4ceaf29a2c7bbba6f8e06fb894bb883ff457e08851352dd751375f94c551a78204fc30838aa2c4a6741f49e30bfa6f0b6a6f0287c5d77b0e9ed6c6d
-
Filesize
1.0MB
MD50aaeb781e651be69f6d643a72b15c6cb
SHA18be4066c628629ffe77254c2cc452aecc1fee8dc
SHA256e9359d5c42b6767d63525ae73eb194a88c3e68111cee4ec1a2bdbb8ecf530bb9
SHA512c6f1af6bb30005f8b89951612961ef8db706d39ace2e674cf54a14445fdfcfe8cf8c5762fe04406b9d87154a919cc47e251eaefd9cbd15e00b2ecf471854e6f5
-
Filesize
18KB
MD5c9a55de62e53d747c5a7fddedef874f9
SHA1c5c5a7a873a4d686bfe8e3da6dc70f724ce41bad
SHA256b5c725bbb475b5c06cc6cb2a2c3c70008f229659f88fba25ccd5d5c698d06a4b
SHA512adca0360a1297e80a8d3c2e07f5fbc06d2848f572f551342ad4c9884e4ab4bd1d3b3d9919b4f2b929e2848c1a88a4e844dd38c86067cace9685f9640db100efb
-
Filesize
18KB
MD539325e5f023eb564c87d30f7e06dff23
SHA103dd79a7fbe3de1a29359b94ba2d554776bdd3fe
SHA25656d8b7ee7619579a3c648eb130c9354ba1ba5b33a07a4f350370ee7b3653749a
SHA512087b9dcb744ad7d330bacb9bda9c1a1df28ebb9327de0c5dc618e79929fd33d1b1ff0e1ef4c08f8b3ea8118b968a89f44fe651c66cba4ecbb3216cd4bcce3085
-
Filesize
19KB
MD5228c6bbe1bce84315e4927392a3baee5
SHA1ba274aa567ad1ec663a2f9284af2e3cb232698fb
SHA256ac0cec8644340125507dd0bc9a90b1853a2d194eb60a049237fb5e752d349065
SHA51237a60cce69e81f68ef62c58bba8f2843e99e8ba1b87df9a5b561d358309e672ae5e3434a10a3dde01ae624d1638da226d42c64316f72f3d63b08015b43c56cab
-
Filesize
23KB
MD5ad99c2362f64cde7756b16f9a016a60f
SHA107c9a78ee658bfa81db61dab039cffc9145cc6cb
SHA25673ab2161a7700835b2a15b7487045a695706cc18bcee283b114042570bb9c0aa
SHA5129c72f239adda1de11b4ad7028f3c897c93859ef277658aeaa141f09b7ddfe788d657b9cb1e2648971ecd5d27b99166283110ccba437d461003dbb9f6885451f7
-
Filesize
18KB
MD570e9104e743069b573ca12a3cd87ec33
SHA14290755b6a49212b2e969200e7a088d1713b84a2
SHA2567e6b33a4c0c84f18f2be294ec63212245af4fd8354636804ffe5ee9a0d526d95
SHA512e979f28451d271f405b780fc2025707c8a29dcb4c28980ca42e33d4033666de0e4a4644defec6c1d5d4bdd3c73d405fafcffe3320c60134681f62805c965bfd9
-
Filesize
411KB
MD5ca9a7555db63862a9f0f67373543c5eb
SHA111d432817bb623bb043f135fc553e025b6be9913
SHA2565a2f4ee38f33251312ba41255f33b4039413704bc4d6b4a321ba8c280f3fa520
SHA5127fdf78db9ac9a84c1c6fd4b293bfd82fbcce97a87ba7ac45ca86ab7f338015b6ee38099ab0a4237aa938e25d97e91f10ceec9f2a6bd8c782814a82fa2e77346f
-
Filesize
1.2MB
MD51707bc560de9c69ae7325b6f63c8ec96
SHA1d15e908a921cd17fbcfe0000b264d52e8fd413e7
SHA256648a673ec8504f8255de37996a21895279985e011124e8ff2c7249271d5890cb
SHA512941b3a76d43626d3d8e369437b83e63689eb3f8ecf90737a2d2df8df1c38e19e02146938af12d0fa9850ba3154ad60d74c5e4b80cae4ff6e3bff9d2583538ad5