Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe
Resource
win10v2004-20240709-en
General
-
Target
SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe
-
Size
1.5MB
-
MD5
50a5e891da27e63d54e68511e48aa026
-
SHA1
87073d85a7ba420b15c8bb9a9e4adc64db2bcfef
-
SHA256
0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6
-
SHA512
6df8811e3e1f6a4110ca3b7c498af13898b46962a30888879180b2f11dda24344a1de4807663d46dd86f7ea11855d08137980cc85fe71e688d082f2f79994909
-
SSDEEP
24576:AfHFw5b9DOnFYrv+kjqipUompMEoNMDYSkbDknoI6JK+ZYtEi8ETtAM5B:sjFYrv+kjV45oeYSRnyJhOtEVcf5B
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\monitor.inf_amd64_8a98af5011ee4dc6\monitor.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\hdaudio.inf_amd64_fe5b23ea7991a359\hdaudio.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\machine.inf_amd64_b748590104fe1c15\machine.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudio.inf_amd64_fe5b23ea7991a359\hdaudio.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudio.inf_amd64_fe5b23ea7991a359\hdaudio.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF detect_x64.exe File created \??\c:\windows\system32\driverstore\filerepository\input.inf_amd64_adeb6424513f60a2\input.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\monitor.inf_amd64_8a98af5011ee4dc6\monitor.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\monitor.inf_amd64_8a98af5011ee4dc6\monitor.PNF detect_x64.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF detect_x64.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\INF\ks.PNF detect_x64.exe -
Executes dropped EXE 9 IoCs
pid Process 1596 detection.exe 1548 curl_x64.exe 1980 detect_x64.exe 1524 detect_x64.exe 1248 detect_x64.exe 3872 detect_x64.exe 3912 detect_x64.exe 3532 aes_x64.exe 3448 curl_x64.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2252 SC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 30 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID detect_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID detect_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 detect_x64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2320 msedge.exe 2320 msedge.exe 3092 identity_helper.exe 3092 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 5004 2256 SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe 84 PID 2256 wrote to memory of 5004 2256 SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe 84 PID 2256 wrote to memory of 5004 2256 SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe 84 PID 2256 wrote to memory of 1596 2256 SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe 86 PID 2256 wrote to memory of 1596 2256 SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe 86 PID 2256 wrote to memory of 1596 2256 SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe 86 PID 5004 wrote to memory of 3208 5004 cmd.exe 88 PID 5004 wrote to memory of 3208 5004 cmd.exe 88 PID 5004 wrote to memory of 3208 5004 cmd.exe 88 PID 3208 wrote to memory of 3224 3208 cmd.exe 92 PID 3208 wrote to memory of 3224 3208 cmd.exe 92 PID 3208 wrote to memory of 3224 3208 cmd.exe 92 PID 3208 wrote to memory of 1508 3208 cmd.exe 93 PID 3208 wrote to memory of 1508 3208 cmd.exe 93 PID 3208 wrote to memory of 1508 3208 cmd.exe 93 PID 3208 wrote to memory of 2276 3208 cmd.exe 94 PID 3208 wrote to memory of 2276 3208 cmd.exe 94 PID 3208 wrote to memory of 2276 3208 cmd.exe 94 PID 3208 wrote to memory of 2576 3208 cmd.exe 95 PID 3208 wrote to memory of 2576 3208 cmd.exe 95 PID 3208 wrote to memory of 2576 3208 cmd.exe 95 PID 1596 wrote to memory of 1548 1596 detection.exe 96 PID 1596 wrote to memory of 1548 1596 detection.exe 96 PID 1596 wrote to memory of 4600 1596 detection.exe 97 PID 1596 wrote to memory of 4600 1596 detection.exe 97 PID 1596 wrote to memory of 4600 1596 detection.exe 97 PID 3208 wrote to memory of 4508 3208 cmd.exe 98 PID 3208 wrote to memory of 4508 3208 cmd.exe 98 PID 3208 wrote to memory of 4508 3208 cmd.exe 98 PID 1596 wrote to memory of 2252 1596 detection.exe 99 PID 1596 wrote to memory of 2252 1596 detection.exe 99 PID 1596 wrote to memory of 2252 1596 detection.exe 99 PID 1596 wrote to memory of 3444 1596 detection.exe 101 PID 1596 wrote to memory of 3444 1596 detection.exe 101 PID 1596 wrote to memory of 3444 1596 detection.exe 101 PID 3208 wrote to memory of 4536 3208 cmd.exe 102 PID 3208 wrote to memory of 4536 3208 cmd.exe 102 PID 3208 wrote to memory of 4536 3208 cmd.exe 102 PID 1596 wrote to memory of 1248 1596 detection.exe 103 PID 1596 wrote to memory of 1248 1596 detection.exe 103 PID 1596 wrote to memory of 1980 1596 detection.exe 104 PID 1596 wrote to memory of 1980 1596 detection.exe 104 PID 1596 wrote to memory of 3872 1596 detection.exe 105 PID 1596 wrote to memory of 3872 1596 detection.exe 105 PID 1596 wrote to memory of 1524 1596 detection.exe 106 PID 1596 wrote to memory of 1524 1596 detection.exe 106 PID 1596 wrote to memory of 3912 1596 detection.exe 107 PID 1596 wrote to memory of 3912 1596 detection.exe 107 PID 1596 wrote to memory of 4312 1596 detection.exe 108 PID 1596 wrote to memory of 4312 1596 detection.exe 108 PID 1596 wrote to memory of 4312 1596 detection.exe 108 PID 3208 wrote to memory of 4972 3208 cmd.exe 109 PID 3208 wrote to memory of 4972 3208 cmd.exe 109 PID 3208 wrote to memory of 4972 3208 cmd.exe 109 PID 1596 wrote to memory of 3532 1596 detection.exe 110 PID 1596 wrote to memory of 3532 1596 detection.exe 110 PID 1596 wrote to memory of 3448 1596 detection.exe 111 PID 1596 wrote to memory of 3448 1596 detection.exe 111 PID 1596 wrote to memory of 932 1596 detection.exe 112 PID 1596 wrote to memory of 932 1596 detection.exe 112 PID 1596 wrote to memory of 932 1596 detection.exe 112 PID 1596 wrote to memory of 1488 1596 detection.exe 113 PID 1596 wrote to memory of 1488 1596 detection.exe 113 PID 1596 wrote to memory of 1488 1596 detection.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Jacard.A.tr.1039.8430.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C START "" "C:\Users\Admin\AppData\Local\Temp\interface.lnk"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\interface.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\mode.comMODE CON: COLS=76 LINES=154⤵PID:3224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "4⤵PID:1508
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /I /R /C:"version 5\.[0-1]\."4⤵PID:2276
-
-
C:\Windows\SysWOW64\waitfor.exeWAITFOR unlock4⤵PID:2576
-
-
C:\Windows\SysWOW64\waitfor.exeWAITFOR unlock4⤵PID:4508
-
-
C:\Windows\SysWOW64\waitfor.exeWAITFOR unlock4⤵PID:4536
-
-
C:\Windows\SysWOW64\waitfor.exeWAITFOR unlock4⤵PID:4972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\detection.exe"C:\Users\Admin\AppData\Local\Temp\detection.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\curl_x64.exe"C:\Users\Admin\AppData\Local\Temp\curl_x64.exe" --connect-timeout 5 --max-time 20 --fail --silent --request GET "https://www.touslesdrivers.com/php/mes_drivers/version.php?v_version=3.0.4"3⤵
- Executes dropped EXE
PID:1548
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S ONNGJIJU /SI unlock3⤵PID:4600
-
-
C:\Windows\SysWOW64\SC.exeSC query Winmgmt3⤵
- Launches sc.exe
PID:2252
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S ONNGJIJU /SI unlock3⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" driverfiles 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" drivernodes 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Drops file in System32 directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" hwids 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" stack 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\detect_x64.exe"C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" status 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3912
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S ONNGJIJU /SI unlock3⤵PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\aes_x64.exe"C:\Users\Admin\AppData\Local\Temp\aes_x64.exe" -e -p anT^UpFuzpuC@lOvsoPVe2kiNTidaBo<zI]BeaRnU0ResFwAy@dEnuCkUd)hAzOh -o "C:\Users\Admin\AppData\Local\Temp\mJZD7fk9g1ARScoH\mJZD7fk9g1ARScoH" -3⤵
- Executes dropped EXE
PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\curl_x64.exe"C:\Users\Admin\AppData\Local\Temp\curl_x64.exe" --connect-timeout 5 --max-time 20 --fail --silent --request POST --form "v_configuration=<C:\Users\Admin\AppData\Local\Temp\mJZD7fk9g1ARScoH\mJZD7fk9g1ARScoH" "https://www.touslesdrivers.com/php/mes_drivers/envoi.php?v_id=mJZD7fk9g1ARScoH&v_version=3.0.4"3⤵
- Executes dropped EXE
PID:3448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C START "" "http://www.touslesdrivers.com/index.php?v_page=31&v_id=mJZD7fk9g1ARScoH"3⤵PID:932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.touslesdrivers.com/index.php?v_page=31&v_id=mJZD7fk9g1ARScoH4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd3d8f46f8,0x7ffd3d8f4708,0x7ffd3d8f47185⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:25⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:85⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:15⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:15⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:85⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:15⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:15⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:15⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:15⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,14844045515664186849,4718612736473692499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
-
-
C:\Windows\SysWOW64\WAITFOR.exeWAITFOR /S ONNGJIJU /SI unlock3⤵PID:1488
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD56f1b9acc4e1e6fb5cd9f503882a8218c
SHA11778c645cd79da5b068262e8e5545cb3c45c3729
SHA25615f185fd002aaaff650cc9e91177286264c6f1812867ffdab1fcc98f1caf3d99
SHA512cd6b007d0b202d8b3407ad49298307393fa9de25eba1d8861862ac80c5f27df0e1ff94b8e25c4252e47aec46be8441386a0b2e356aa1ab16dd89dd92e98147ad
-
Filesize
3KB
MD51c2811a2ae818b619fe9faaa0fc8f268
SHA1d158d2216ec20f4d3f2143022c7916ae6f40da80
SHA2566a6ec07a0b4afd525efdcda663b5c1fc31876c457c28422d818f4a1c75575428
SHA5129e4f15c8d1abe8387a96e74a63d34e8ba4537616b5574a43144092d4129b44fb7d9beb75bacacfd017bacf7b4661297fdeeb79e9264b34cffe16320fd00dfdbf
-
Filesize
7KB
MD55e15c68dd32fbee87a0c67326920912f
SHA1b281b45ee763e616dceb74e6c934c8fd8359a0f5
SHA256f495e13690c2d8e66a13ce33f5e5588ae75ecedbd3e45edbf604d60c04d70835
SHA512ddf9ecde1d20093c3f1448e9a25e4dc23fddca6c124e84f0af15ee8c9a36b6ff435b36e17db1996ce82c712c523e34cb2bcbde87093f7fc2e953feb987aeb831
-
Filesize
6KB
MD5bd11f260bdeb6b0e0e4990766fc68964
SHA139dee06900e84b1d5de1f73bdc4e3528144ab141
SHA25640f76ef5956442c41963b35da5cca732b24775a3313c14d9925f6d547804b741
SHA5122204e1771f3fdb6c1fa7f2a090a2c78c09f6f2f6a8ba07e9ad2433f707abef4d46084e3675170cc5a29f650c047f9e6ec1c4033a1d0a68212313e3c1b7000c8e
-
Filesize
1KB
MD5dd7a2112010f5cb625f048a4ec03dd34
SHA1b1b02411ee3d6dc90478eaff895f8ae372934aa0
SHA25642d7ad73f3bb7654f762c4b421543c16fe569642895ab6d098f302780d76d9b3
SHA5128666da0cfc507b2473d47c33078ad2c1d36cdbe5eb4612b4469368eab8c784bef658cdb6cb6f585ee13f73d6fffca59e8159a2f6aa1eabf5bec3c91abb315d44
-
Filesize
868B
MD5db8ba33e75aa5244c8794fc659cdcb90
SHA1728d37ec41adafab8aa15825398cbdd6e359e4b5
SHA25636d0b9916af4b361ec8db710d5830f696a35edaa2e5082799828768f61a67bb0
SHA5127cd7e4375eb1dcae97754762009eb9e82a6ecd97ec39a5852f123adec5b36b75a5544ea3b1ce338b9bca5f33c0f91c3bd2075059b75925802c1874f23a0d8e3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d413f1bde537fe395f16c144244357fc
SHA12e7b8dbcf4db166823ac54d1fd53a5be2c64de9e
SHA256a7201ac932ace95c361300d204f3b7f120c67a6d087fa8b4f2dd27f941d30b3f
SHA51218eb8f25d9763d48032b327436986264a7aea4874d56297639c2cf707f5234f8af80004ceaef530afb43254526bf24fb28ed4a0a0d05c209fc317efb6ede9642
-
Filesize
151KB
MD5e5125d4651c008eba61d9fd3abd5ab31
SHA14a85e5d6ab73891832c9adaa4a70c1896773c279
SHA256874cb7a8513b781b25e176828fe8fe5ac73fa2fe29ea2aac5fe0eaad50e63f39
SHA51226ba2cecf7324e1c5fe46112c31523e2fabad8de34fe84ce3a9e3a63922b0f85d84982e7c6bae13d2e3cf65193f7a19a67a2fc80af5a78ef8cfe611fce1a9409
-
Filesize
840KB
MD5e80c8cb9887a7c9426d4e843dddb8a44
SHA1a04821e6d51f45b72a10bdbd3bb7e49de069ccd2
SHA2563df4725778c0351e8472a0f8e18caf4fa9b95c98e4f2d160a26c3749f9869568
SHA51241b4bd84336785d4da13b5653183bf2a405b918afad3acd934f253d23b1e00460173e36b2d65a61f77ef2b942dba735655fc5b4ec561c375896f5a010e053d33
-
Filesize
80KB
MD56a7ec375af8ba2e87ff7f23497e9944e
SHA1791fb650e9e27e9857b332f534a0ade1eae28be7
SHA25665c68fd55281a0a4598807ea83531a0cb0e4e79a8c5bf38e9637e776f72c3514
SHA512c6fa4ac94692ddb8d60c8ab40aa33b17e9d0800c802ee5d3c7d6f0db24c507638743287a274d7ec62fe568b6aa1c69932d52e74a50040720a89138cb5c8be7aa
-
Filesize
1.1MB
MD502ba1c44b6392f013a7aa0b91314f45a
SHA1724c1977101ecae88e4f104a8422b64bfec01a98
SHA2567fbe59195f5f6f45c8b38b12488a169fdcb3a272004dbaf44c9d92a60a3690cb
SHA51256bed935b028257e6eb485c555002f3e07e86788452cca0e28786098cc9254a7462b777a7a46ae6594911a73d786a6d15dee248f05a4c33a1bc749be071bcc3d
-
Filesize
2KB
MD5e0eb53551aca2acff814ddd7aca212e2
SHA1ee825c865d5abf244d6165ee838735f1ba05bfcb
SHA25611993a03f68a33500a3ce8fbeb3e3c2042a28299d04f39eed40147709e76ca79
SHA512ddde3d274b2ea8da0d645f88bd6b340902dca83e599ba0c7249953a7c1f2dd512f764802134a6efa1f48ca6cae23b78881569228f908dd0746abe3c46e95a348
-
Filesize
1KB
MD5e6f55f0f2099ea17f514741698afc13e
SHA1c12dc585194cbb4aec2224b6d76df02e57b51bd2
SHA2560bbcfd30915314c1b20d2c514ca2bbe9690fb330ffb8e388f80598290cd6c208
SHA512ba93a54555cd3de176a639aeaa1579505881e90d0571f36e89f520966de0f167c1872461606a3817720fa6dc9bcd0990a6a6ab8f86db355a64901bfd5d040d96
-
Filesize
24KB
MD5da169342a697dedaed032c20b061a4e2
SHA1d282cba914b9daa30a2f6d104120b7cfa53552d7
SHA25674ff15521a9002f79224b55eff369affcd9e73b12d827f49a9b10be126a9592c
SHA51216392bbd3920114a49037f269e4a6623e9ab5380972bd7169f16397f39b42a356e3b8475c1fbea4cd2472d8589fd503845dada5b9d8b5c6f6d78ab58d9577bed