Resubmissions
16-07-2024 21:58
240716-1vxjessaqm 10Analysis
-
max time kernel
8s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 21:58
Static task
static1
General
-
Target
FATALITY.exe
-
Size
2.5MB
-
MD5
4320dae0d20c88ceb6f28b623a916dd2
-
SHA1
c1218c51804a602115462ea8259578fdbb280468
-
SHA256
441d4439cd72a239077d97895571804711356f1e1ded396c229635adf3c80ea4
-
SHA512
ee32e90d021835d608d43d3ee6d2d107fcfb15fa174c179ed4ae7dd47ec0dd45baadd1c73158c73d5e4fd7b89f5925ae505a6df66bb81e9d5693216316622fcf
-
SSDEEP
49152:U14vPsUk84QgsmsQgt/KOQtLvwnQ/7syEL+mZ1TxrYgHZfr2gsNS1zb9cVg1Z2U/:JPtmLgtTGTwQAyY3TdYCsI1zAgb27wh
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000234f2-5.dat family_umbral behavioral1/memory/4724-24-0x000002A3FD320000-0x000002A3FD360000-memory.dmp family_umbral -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3148 powershell.exe 3180 powershell.exe 4024 powershell.exe 5488 Process not Found 3616 Process not Found 2588 powershell.exe 4432 Process not Found 5944 Process not Found 1976 Process not Found 5348 Process not Found 2564 Process not Found 996 Process not Found 4556 powershell.exe 4872 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral.exe -
Checks computer location settings 2 TTPs 37 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation FATALITY.exe -
Executes dropped EXE 64 IoCs
pid Process 4468 FATALITY.exe 4724 Umbral.exe 4476 Windows Defender.exe 1784 FATALITY.exe 4972 Umbral.exe 4836 Windows Defender.exe 4864 FATALITY.exe 2868 Umbral.exe 1308 Windows Defender.exe 2256 FATALITY.exe 1188 Umbral.exe 548 Windows Defender.exe 3724 FATALITY.exe 2336 Umbral.exe 3504 Windows Defender.exe 3484 FATALITY.exe 3260 Umbral.exe 732 Windows Defender.exe 972 FATALITY.exe 1000 Umbral.exe 4816 Windows Defender.exe 4348 FATALITY.exe 2232 Umbral.exe 3152 Windows Defender.exe 4076 FATALITY.exe 4448 Umbral.exe 2388 Windows Defender.exe 1196 FATALITY.exe 4612 Umbral.exe 2268 Windows Defender.exe 4064 FATALITY.exe 4048 Umbral.exe 2588 Windows Defender.exe 4468 FATALITY.exe 3884 Umbral.exe 4284 Windows Defender.exe 1644 FATALITY.exe 4952 Umbral.exe 3924 Windows Defender.exe 3640 FATALITY.exe 3064 Umbral.exe 4036 Windows Defender.exe 448 FATALITY.exe 1500 Umbral.exe 2812 Windows Defender.exe 756 FATALITY.exe 2568 Umbral.exe 2728 Windows Defender.exe 2232 FATALITY.exe 1020 Umbral.exe 4816 Windows Defender.exe 4872 FATALITY.exe 2844 Umbral.exe 1116 Windows Defender.exe 1940 FATALITY.exe 2352 Umbral.exe 3812 Windows Defender.exe 5016 FATALITY.exe 4064 Umbral.exe 2852 Windows Defender.exe 4284 FATALITY.exe 2032 Umbral.exe 4580 Windows Defender.exe 4584 FATALITY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 26 IoCs
flow ioc 140 discord.com 147 discord.com 25 discord.com 33 discord.com 69 discord.com 119 discord.com 120 discord.com 130 discord.com 148 discord.com 24 discord.com 32 discord.com 46 discord.com 47 discord.com 168 discord.com 61 discord.com 161 discord.com 162 discord.com 60 discord.com 155 discord.com 169 discord.com 68 discord.com 129 discord.com 139 discord.com 154 discord.com 94 discord.com 95 discord.com -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com 65 ip-api.com 98 ip-api.com 165 ip-api.com 37 ip-api.com 56 ip-api.com 72 ip-api.com 123 ip-api.com 135 ip-api.com 158 ip-api.com 11 ip-api.com 144 ip-api.com 151 ip-api.com 172 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 13 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3872 wmic.exe 1244 wmic.exe 5712 Process not Found 2948 wmic.exe 644 Process not Found 244 Process not Found 1092 wmic.exe 5592 Process not Found 5176 Process not Found 5808 Process not Found 4528 Process not Found 2092 wmic.exe 5420 Process not Found -
Runs ping.exe 1 TTPs 13 IoCs
pid Process 552 PING.EXE 4284 Process not Found 4448 Process not Found 5944 Process not Found 2256 PING.EXE 2256 PING.EXE 5924 Process not Found 5560 Process not Found 4952 Process not Found 3564 PING.EXE 5056 PING.EXE 740 Process not Found 4420 Process not Found -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4724 Umbral.exe 4556 powershell.exe 4556 powershell.exe 2600 powershell.exe 2600 powershell.exe 4628 powershell.exe 4628 powershell.exe 1152 powershell.exe 1152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4724 Umbral.exe Token: SeIncreaseQuotaPrivilege 2568 wmic.exe Token: SeSecurityPrivilege 2568 wmic.exe Token: SeTakeOwnershipPrivilege 2568 wmic.exe Token: SeLoadDriverPrivilege 2568 wmic.exe Token: SeSystemProfilePrivilege 2568 wmic.exe Token: SeSystemtimePrivilege 2568 wmic.exe Token: SeProfSingleProcessPrivilege 2568 wmic.exe Token: SeIncBasePriorityPrivilege 2568 wmic.exe Token: SeCreatePagefilePrivilege 2568 wmic.exe Token: SeBackupPrivilege 2568 wmic.exe Token: SeRestorePrivilege 2568 wmic.exe Token: SeShutdownPrivilege 2568 wmic.exe Token: SeDebugPrivilege 2568 wmic.exe Token: SeSystemEnvironmentPrivilege 2568 wmic.exe Token: SeRemoteShutdownPrivilege 2568 wmic.exe Token: SeUndockPrivilege 2568 wmic.exe Token: SeManageVolumePrivilege 2568 wmic.exe Token: 33 2568 wmic.exe Token: 34 2568 wmic.exe Token: 35 2568 wmic.exe Token: 36 2568 wmic.exe Token: SeIncreaseQuotaPrivilege 2568 wmic.exe Token: SeSecurityPrivilege 2568 wmic.exe Token: SeTakeOwnershipPrivilege 2568 wmic.exe Token: SeLoadDriverPrivilege 2568 wmic.exe Token: SeSystemProfilePrivilege 2568 wmic.exe Token: SeSystemtimePrivilege 2568 wmic.exe Token: SeProfSingleProcessPrivilege 2568 wmic.exe Token: SeIncBasePriorityPrivilege 2568 wmic.exe Token: SeCreatePagefilePrivilege 2568 wmic.exe Token: SeBackupPrivilege 2568 wmic.exe Token: SeRestorePrivilege 2568 wmic.exe Token: SeShutdownPrivilege 2568 wmic.exe Token: SeDebugPrivilege 2568 wmic.exe Token: SeSystemEnvironmentPrivilege 2568 wmic.exe Token: SeRemoteShutdownPrivilege 2568 wmic.exe Token: SeUndockPrivilege 2568 wmic.exe Token: SeManageVolumePrivilege 2568 wmic.exe Token: 33 2568 wmic.exe Token: 34 2568 wmic.exe Token: 35 2568 wmic.exe Token: 36 2568 wmic.exe Token: SeDebugPrivilege 4556 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 4628 powershell.exe Token: SeDebugPrivilege 1152 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4468 1136 FATALITY.exe 126 PID 1136 wrote to memory of 4468 1136 FATALITY.exe 126 PID 1136 wrote to memory of 4468 1136 FATALITY.exe 126 PID 1136 wrote to memory of 4724 1136 FATALITY.exe 87 PID 1136 wrote to memory of 4724 1136 FATALITY.exe 87 PID 1136 wrote to memory of 4476 1136 FATALITY.exe 88 PID 1136 wrote to memory of 4476 1136 FATALITY.exe 88 PID 1136 wrote to memory of 4476 1136 FATALITY.exe 88 PID 4468 wrote to memory of 1784 4468 FATALITY.exe 89 PID 4468 wrote to memory of 1784 4468 FATALITY.exe 89 PID 4468 wrote to memory of 1784 4468 FATALITY.exe 89 PID 4468 wrote to memory of 4972 4468 FATALITY.exe 90 PID 4468 wrote to memory of 4972 4468 FATALITY.exe 90 PID 4468 wrote to memory of 4836 4468 FATALITY.exe 162 PID 4468 wrote to memory of 4836 4468 FATALITY.exe 162 PID 4468 wrote to memory of 4836 4468 FATALITY.exe 162 PID 1784 wrote to memory of 4864 1784 FATALITY.exe 92 PID 1784 wrote to memory of 4864 1784 FATALITY.exe 92 PID 1784 wrote to memory of 4864 1784 FATALITY.exe 92 PID 1784 wrote to memory of 2868 1784 FATALITY.exe 93 PID 1784 wrote to memory of 2868 1784 FATALITY.exe 93 PID 1784 wrote to memory of 1308 1784 FATALITY.exe 94 PID 1784 wrote to memory of 1308 1784 FATALITY.exe 94 PID 1784 wrote to memory of 1308 1784 FATALITY.exe 94 PID 4724 wrote to memory of 2568 4724 Umbral.exe 267 PID 4724 wrote to memory of 2568 4724 Umbral.exe 267 PID 4864 wrote to memory of 2256 4864 FATALITY.exe 97 PID 4864 wrote to memory of 2256 4864 FATALITY.exe 97 PID 4864 wrote to memory of 2256 4864 FATALITY.exe 97 PID 4864 wrote to memory of 1188 4864 FATALITY.exe 98 PID 4864 wrote to memory of 1188 4864 FATALITY.exe 98 PID 4864 wrote to memory of 548 4864 FATALITY.exe 214 PID 4864 wrote to memory of 548 4864 FATALITY.exe 214 PID 4864 wrote to memory of 548 4864 FATALITY.exe 214 PID 2256 wrote to memory of 3724 2256 FATALITY.exe 275 PID 2256 wrote to memory of 3724 2256 FATALITY.exe 275 PID 2256 wrote to memory of 3724 2256 FATALITY.exe 275 PID 2256 wrote to memory of 2336 2256 FATALITY.exe 248 PID 2256 wrote to memory of 2336 2256 FATALITY.exe 248 PID 2256 wrote to memory of 3504 2256 FATALITY.exe 283 PID 2256 wrote to memory of 3504 2256 FATALITY.exe 283 PID 2256 wrote to memory of 3504 2256 FATALITY.exe 283 PID 3724 wrote to memory of 3484 3724 FATALITY.exe 104 PID 3724 wrote to memory of 3484 3724 FATALITY.exe 104 PID 3724 wrote to memory of 3484 3724 FATALITY.exe 104 PID 3724 wrote to memory of 3260 3724 FATALITY.exe 105 PID 3724 wrote to memory of 3260 3724 FATALITY.exe 105 PID 3724 wrote to memory of 732 3724 FATALITY.exe 106 PID 3724 wrote to memory of 732 3724 FATALITY.exe 106 PID 3724 wrote to memory of 732 3724 FATALITY.exe 106 PID 3484 wrote to memory of 972 3484 FATALITY.exe 250 PID 3484 wrote to memory of 972 3484 FATALITY.exe 250 PID 3484 wrote to memory of 972 3484 FATALITY.exe 250 PID 3484 wrote to memory of 1000 3484 FATALITY.exe 347 PID 3484 wrote to memory of 1000 3484 FATALITY.exe 347 PID 3484 wrote to memory of 4816 3484 FATALITY.exe 284 PID 3484 wrote to memory of 4816 3484 FATALITY.exe 284 PID 3484 wrote to memory of 4816 3484 FATALITY.exe 284 PID 4724 wrote to memory of 3408 4724 Umbral.exe 565 PID 4724 wrote to memory of 3408 4724 Umbral.exe 565 PID 972 wrote to memory of 4348 972 FATALITY.exe 504 PID 972 wrote to memory of 4348 972 FATALITY.exe 504 PID 972 wrote to memory of 4348 972 FATALITY.exe 504 PID 972 wrote to memory of 2232 972 FATALITY.exe 454 -
Views/modifies file attributes 1 TTPs 14 IoCs
pid Process 392 attrib.exe 5392 Process not Found 3432 attrib.exe 2316 attrib.exe 628 Process not Found 3408 attrib.exe 3904 attrib.exe 5720 Process not Found 2612 Process not Found 4640 Process not Found 5768 Process not Found 6096 Process not Found 3052 attrib.exe 5560 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"24⤵
- Checks computer location settings
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"25⤵
- Checks computer location settings
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"26⤵
- Checks computer location settings
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"27⤵
- Checks computer location settings
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"28⤵
- Checks computer location settings
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"29⤵
- Checks computer location settings
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"30⤵
- Checks computer location settings
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"31⤵
- Checks computer location settings
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"32⤵
- Checks computer location settings
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"33⤵
- Checks computer location settings
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"34⤵
- Checks computer location settings
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"35⤵
- Checks computer location settings
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"36⤵
- Checks computer location settings
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"37⤵
- Checks computer location settings
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"38⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"39⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"40⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"41⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"42⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"43⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"44⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"45⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"46⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"47⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"48⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"49⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"50⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"51⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"52⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"53⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"54⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"55⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"56⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"57⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"58⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"59⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"60⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"61⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"62⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"63⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"64⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"65⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"66⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"67⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"68⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"69⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"70⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"71⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"72⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"73⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"74⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"75⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"76⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"77⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"78⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"79⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"80⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"81⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"82⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"83⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"84⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"85⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"86⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"87⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"88⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"89⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"90⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"91⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"92⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"93⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"94⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"95⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"96⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"97⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"98⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"99⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"100⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"101⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"102⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"103⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"104⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"105⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"106⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"107⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"108⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"109⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"110⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"111⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"112⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"113⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"114⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"115⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"116⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"117⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"118⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"119⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"120⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"121⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"122⤵PID:5092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-