Analysis

  • max time kernel
    584s
  • max time network
    559s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2024 01:06

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/archive/refs/heads/master.zip

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 10 IoCs
  • Drops startup file 32 IoCs
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 20 IoCs
  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/archive/refs/heads/master.zip
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8001546f8,0x7ff800154708,0x7ff800154718
      2⤵
        PID:1016
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
        2⤵
          PID:744
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:8
          2⤵
            PID:4968
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
            2⤵
              PID:1604
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:3728
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8
                2⤵
                  PID:4636
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3576
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5492 /prefetch:8
                  2⤵
                    PID:3164
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:1
                    2⤵
                      PID:2624
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                      2⤵
                        PID:2660
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:1
                        2⤵
                          PID:1876
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:1
                          2⤵
                            PID:1400
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:1
                            2⤵
                              PID:2196
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                              2⤵
                                PID:5580
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5604 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1392
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1316
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                                2⤵
                                  PID:1512
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:1
                                  2⤵
                                    PID:1220
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:1
                                    2⤵
                                      PID:1572
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                                      2⤵
                                        PID:5252
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,16914261702663421340,8215809987518603627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:8
                                        2⤵
                                          PID:6084
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:1264
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3972
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:5880
                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"
                                              1⤵
                                                PID:6032
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\TEMP1_~1.ZIP\THE-MA~1\BANKIN~1\DanaBot.dll f1 C:\Users\Admin\AppData\Local\Temp\TEMP1_~1.ZIP\THE-MA~1\BANKIN~1\DanaBot.exe@6032
                                                  2⤵
                                                  • Loads dropped DLL
                                                  PID:6128
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\TEMP1_~1.ZIP\THE-MA~1\BANKIN~1\DanaBot.dll,f0
                                                    3⤵
                                                    • Blocklisted process makes network request
                                                    • Loads dropped DLL
                                                    PID:3596
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 948
                                                      4⤵
                                                      • Program crash
                                                      PID:5428
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 464
                                                  2⤵
                                                  • Program crash
                                                  PID:3720
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6032 -ip 6032
                                                1⤵
                                                  PID:1648
                                                • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Amus.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Amus.exe"
                                                  1⤵
                                                  • Adds Run key to start application
                                                  • Drops file in Windows directory
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2308
                                                • C:\Windows\system32\AUDIODG.EXE
                                                  C:\Windows\system32\AUDIODG.EXE 0x4f8 0x508
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5280
                                                • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Anap.a.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Anap.a.exe"
                                                  1⤵
                                                    PID:4720
                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Axam.a.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Axam.a.exe"
                                                    1⤵
                                                    • Drops startup file
                                                    • Adds Run key to start application
                                                    • Drops file in Program Files directory
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4612
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\BubbleBoy.html
                                                    1⤵
                                                      PID:3016
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8001546f8,0x7ff800154708,0x7ff800154718
                                                        2⤵
                                                          PID:4456
                                                      • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                        "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Brontok.exe"
                                                        1⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Drops file in Program Files directory
                                                        • Modifies registry class
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3892
                                                      • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                        "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Funsoul.exe"
                                                        1⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Drops file in Program Files directory
                                                        • Modifies registry class
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1948
                                                      • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                        "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Gruel.a.exe"
                                                        1⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Drops file in Program Files directory
                                                        • Modifies registry class
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5668
                                                      • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                        "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Happy99.exe"
                                                        1⤵
                                                        • Drops startup file
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Drops file in Program Files directory
                                                        • Modifies registry class
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2132
                                                      • C:\Windows\System32\WScript.exe
                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\ILOVEYOU.vbs"
                                                        1⤵
                                                          PID:2376
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\Klez.e.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1552
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Windows\system32\taskmgr.exe" /4
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1012
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault3bb4bb44h00f6h4985h86b5h037b8259ead8
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5636
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Windows\system32\taskmgr.exe" /4
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3436
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\masum.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2476
                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Windows\debug\PASSWD.LOG
                                                          1⤵
                                                          • Opens file in notepad (likely ransom note)
                                                          PID:1768
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\MyPics.a.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:6132
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5684
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Email-Worm\NakedWife.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:528
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master (1).zip\The-MALWARE-Repo-master\Trojan\000.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5832
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Windows\system32\cmd.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3920
                                                        • C:\Users\Admin\AppData\Roaming\Axam.exe
                                                          "C:\Users\Admin\AppData\Roaming\Axam.exe" "C:\Windows\system32\cmd.exe"
                                                          1⤵
                                                          • Drops startup file
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in Program Files directory
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5036
                                                        • C:\Windows\system32\LogonUI.exe
                                                          "LogonUI.exe" /flags:0x4 /state0:0xa38df855 /state1:0x41c64e6d
                                                          1⤵
                                                          • Modifies data under HKEY_USERS
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1560
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3596 -ip 3596
                                                          1⤵
                                                            PID:2672
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                            1⤵
                                                              PID:5948

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              302B

                                                              MD5

                                                              3565a089a0f8b2b5afb04ec4379b44dc

                                                              SHA1

                                                              4075ac633db35b158e4142860a2fd4f331780f9c

                                                              SHA256

                                                              941689078f2ed21767fd0aa5ad330df33b8a0ac96acccb2020f307558d6087cb

                                                              SHA512

                                                              112538d7d1af9c02536db20acfc6cea3225341d0f1468ad49ab980a65c74c9111fbf2514776e4e40bd2fbb13d1703dc47cc647b780dc503be99f6fa712c925a5

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              453B

                                                              MD5

                                                              3c134fc18e7bdaf02d63571d193799ad

                                                              SHA1

                                                              7e6f22569d16202195410f29e6c74d093f1fa930

                                                              SHA256

                                                              087f1acb6ed4d7563daaf6f0e1110dc7b3d5b4d6130ba19389cdf3eb90e9d347

                                                              SHA512

                                                              5b02fda689e01d570fced10841daea8f543467b9a0ea138149c486c6d9fd56a0684901af16cbf2b3ad7f1d0b6cf6b08bc36288afcec4d5552b5863ef854570d6

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              604B

                                                              MD5

                                                              9ec5dcbc21f0309fc9c7c545063986b5

                                                              SHA1

                                                              eaea4f607aeefc9f6081d4b122ebaec421e7029b

                                                              SHA256

                                                              273c2c218dd1d27bca1ad23115deb50ee860332b724f7a1b1aa906e055d0d38d

                                                              SHA512

                                                              e2044e50dd09b7df76b76ae96f1fbfea85a73e5055891df4b464b8cf981f5ef623fa660f6b5c3beda289d4166cb39a38e3153a1ed6e4e74fda7ea0914a3ea935

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              755B

                                                              MD5

                                                              c73f3203dbe2960f84a494e1662db2c9

                                                              SHA1

                                                              27835a0be12637153e54411bea70546c1de82770

                                                              SHA256

                                                              60683424722818828849fcd2e3893265de28c94d660d64b8cb1d1f31a20026c2

                                                              SHA512

                                                              4cbb057b8d9760f0e16bfc110405f2f239c52b0559a59759e310266fc6bf96e84fd5798a30bcbea56e748890ce335825845e0df1c269ca03501cf7f32e0cb1cc

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              906B

                                                              MD5

                                                              73e598672cece33b0c27f3a2f8d3501d

                                                              SHA1

                                                              cb1955298a70cd5cc2f55fe127a56dfc6fbbccfc

                                                              SHA256

                                                              0250e34f90f6e94dde2cab734f5ac2cb9c6aa9fe1b91d7e9e651f20645296363

                                                              SHA512

                                                              4094ba8f8b335133b836702d58c6660d2edc74d869f5bbcc1bc5a4a30f4f60e79ed4937464f0ec2f10daa4b1d866ade04c179b14450d0cb3f73ccf4b2c00fcb6

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              3b1cc48b2addf796ebde1c6d0c020bea

                                                              SHA1

                                                              53b249bef441ad8dff4f5a90ef149ab10803cfdf

                                                              SHA256

                                                              d8c19dae05edffa4dd0957dcfa45eac44273842b1364c5a999a0a21c1108ccf8

                                                              SHA512

                                                              525cac7d2070540abdfa8b6ea43631610f9c7440346f319b90c1826d73d7d125d165a2718a04f82eac1b47202afa1b6c6f2576af0fa76b03f9058bd21fa90f77

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              64fd1f107fe39a118a1e0df6a2231c21

                                                              SHA1

                                                              1757c6e25e245eebd74994acefc148a55ca85675

                                                              SHA256

                                                              a671cbd881a552e34f8c7594f6dbfd1442d5a702ed914fead3cd0fcc5f37d51e

                                                              SHA512

                                                              450e1a6ef677bd192fac285af9aa2e71267d1a8ba138fd3a5a1da9f3267540fa951a1e9c4e2b3bf724f326d5c20eb51113005660c7865158ad0669089c16b53f

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              d1a3d2a396b79cd871f99665b134a49a

                                                              SHA1

                                                              2ab15e630b751e94d72362f2b55f60c4d7f35f40

                                                              SHA256

                                                              7ba07c3784813a0f9cc1ff90f54c5517e288bde40d5ccbe8b098af4975c16ee6

                                                              SHA512

                                                              d88ddaa9e3e9213e7f9bc19da72011e51c66199b10557e79e2edc5e50f0879a51216817a9dbede8807c8ec8b8b9457482f49ad00576c0c214e0bac2d034b79c7

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              865a45b31cb7baefb3b71ae51eb67308

                                                              SHA1

                                                              42094765f9627e713f573b2e6a203183068a6159

                                                              SHA256

                                                              99f2f70a9e34a9c63f6107b8308e41b83139f62b72a2f2ffd2394b0063ec79e2

                                                              SHA512

                                                              70ba8d348e1954b90a078ff47b9d63ca7663b9ae7c0c8e32f50b53acfd928465f91cb36760a1560d80d33ca07e7e815e18905b0b104ae52de80e5a58fdc73d1f

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              f66b8249919fa2b7bb00beddfffa2f9a

                                                              SHA1

                                                              321e81d7eead2350c57600ebc6ff0a9b4a4e06b2

                                                              SHA256

                                                              8ebb03500bb9833bda093b9d8ababd2bb633a0b97913765e05191ea51ac4adcc

                                                              SHA512

                                                              1034bb1e17c26c928a9b2cbb5f7615754af844883980922adf7f81e10821e6851780d49ee4edc8de955cc3d50e84f4ad7b57b90c96d9ca7f4f63acabd9449d9f

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              b7922b0709a026f2188f725dae20b6e8

                                                              SHA1

                                                              4b91513018aa95f062f4ed4b5b9f88032b7ccbe2

                                                              SHA256

                                                              0e81b90f3c97c85cdd3b4734667ecd140045cd795e89b6b3fb28bdbc1d0fc015

                                                              SHA512

                                                              02f6afa56f7ec2fb4664d0e9522a5a5d0a1912e4f830d8b4bc9c186322d0fc21cfa0f2e65567057ba8da1cf1dbd44e886b9b393a0fe47a7b60665d36b6790fe1

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              f97e2548b10247a8f61605db9a7f5946

                                                              SHA1

                                                              6ef69ffb824a6842f6bedb2f800cf3e31ca0135a

                                                              SHA256

                                                              3cd268a890a1e10796a4d9c43e7d678baf8ff25b614c8cf45f23f18c0bd3fbff

                                                              SHA512

                                                              e4a68819058b08e55000462a177f137575ebb741c021ce8ae471335bbc0678e095e6fb4e499ba7e3ec18deead014d83b2fea7c2f378ec67888aaf0ebef0734b0

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              70f1b79dbc67e18f03a8ccb43fd1f26c

                                                              SHA1

                                                              17810bd14fdf097d6cb6b33b5e8f91506c0d5049

                                                              SHA256

                                                              c7745cfbe269513787a15c12e8e660b604733ae13f3df90b932c9d2aad827300

                                                              SHA512

                                                              c6483cb7eec581a248e810314b67b81677130c8b4e29688911cb3a2b1c967242abed36d3c0c8b971fee67b7198b1c988dfe8bc16eca89f7413ff40151c4b15d6

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              778dde4a011f182dcb7c714c44eb476d

                                                              SHA1

                                                              ea5e86c47b4446f1e7cd3fecf31572af0a2c46b5

                                                              SHA256

                                                              99714f76e76ce0ee69c5b26a88e795a9c100856131226e12e8b7894bb9fb26e2

                                                              SHA512

                                                              3b9cdc4f025c6e3d7fa61e2d6aafb7d2f796bbe01c7a4561fda0890c37ce281b76fa175ef7fc7f4f92d868e2c8cac5a4fd1b3e664ff5a93670c778ed86032952

                                                            • C:\Autoexec.bat

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              8ded210487270f9a7481f9c588ad6c73

                                                              SHA1

                                                              e0cf84eb5c3b7e5860fee3a3632431c21bd90b37

                                                              SHA256

                                                              2a1617e7b39e564314c792a36b8fb20df3af55cd0b3ce9d7753081c991ca0855

                                                              SHA512

                                                              1701aa2a480b44e90af73983dbec183d110007f9e8769c3620b8727224fcf38294049a5d743a824dd121f26ea161c3fd8d6c3af4fbc9fa75119f132b0f9c30cd

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              2f842025e22e522658c640cfc7edc529

                                                              SHA1

                                                              4c2b24b02709acdd159f1b9bbeb396e52af27033

                                                              SHA256

                                                              1191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e

                                                              SHA512

                                                              6e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              54aadd2d8ec66e446f1edb466b99ba8d

                                                              SHA1

                                                              a94f02b035dc918d8d9a46e6886413f15be5bff0

                                                              SHA256

                                                              1971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e

                                                              SHA512

                                                              7e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                              Filesize

                                                              255B

                                                              MD5

                                                              d11edf9e08a127c768843acea41d0bc5

                                                              SHA1

                                                              ff1af9b39de4a3f547407fd9864ffdd2bb6c7354

                                                              SHA256

                                                              217e4d9d1412e45abf7a653f72a5ab8b53bc8fc6f377f52a042668a41abc7478

                                                              SHA512

                                                              92c3f0def567b0e2f2523ed25eb9d4abff06070b8be744fea4a6678f25f292439d7bc0c8015eaa6281b7f43149eebb3d3821cd6d6436598481113694b11ddea3

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              751e7953e3a25d8c3067285cd9b62861

                                                              SHA1

                                                              48ecdfae2f3b58e3b697e00c2a6c72d75a51c6c3

                                                              SHA256

                                                              756e19476fe329906f69bc0f222cef409b6a61a72ba41d0326c85e018462ff72

                                                              SHA512

                                                              ad68e5377ddb1c8e26502e6cfe97f5e38e46f02fc1101f8f46ca646cc7d71cb035a07f4c54158cf8760eb8ad652d7f90e259bdc33d8403d673799ebb370e4646

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              166fe9918527a509beb3f425a4e00752

                                                              SHA1

                                                              9fea49bf2a160f811b38c3548c30e76760a99bd9

                                                              SHA256

                                                              136f4d2b4cab095a28b85385ab538e4c51f1b153dbabc898ad232bd375829aed

                                                              SHA512

                                                              243c14234af7ef906ed1689853ae4f945657bd1d9fa0f7e3f6c46aae1743f0a04d3f342071e14e78e8f8a771085cba69920128203f4e62c54818b1d69c099402

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              34a0408fdd4f637721d4e1e1e4c9a62a

                                                              SHA1

                                                              e7e031ada8fad4e6cbad897378365378d4c832f9

                                                              SHA256

                                                              b2588aa5289421e5739611d1af4cd83ca363d324aa31abed989ef9577df5827c

                                                              SHA512

                                                              a819f21e03d158821b6435c0a965b0b6b7ba54748f95798672eb9a86949a3db88e6c6c1ffce9452095fe9674056bcdba14b9a7ad75079b9e12b3f5e01f14b0f5

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              ee73dddec43810e6fbc41123706720cd

                                                              SHA1

                                                              84c3189aebb97902dace3b68baff61330d4c42a6

                                                              SHA256

                                                              6b5db3b53dcc80668e90d9f80f76412b5a590e99ecd34b592a7d23d6dd6d7785

                                                              SHA512

                                                              92bdbc08f953ba4817b038c9300ca93001e7e927ecd978f02a8115ad8f32e3cf96e8d1fa1ed483b38f753ac4af4c588cae80c665b192eb07de9d64b23795fa8e

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              d0acf2f3be46e1619b64f4a593ca382c

                                                              SHA1

                                                              66c1405fc95828cc4cfb0208e735468879497634

                                                              SHA256

                                                              7874b581ae2fc7c8cc6362f0b8188a42885cc29ff4027259857c513817b2cad0

                                                              SHA512

                                                              baaf47517ad437b768c934e736937d97c097e3250477757086f12d24073f084ea310ecab3670e702d1c94d867ca69cebd41041b544b29a4d2b5450371d371c49

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                              Filesize

                                                              371B

                                                              MD5

                                                              62782c7127707440f8fccf6c2bd9481c

                                                              SHA1

                                                              bd06133a2bdcc116a123efb4e8f9adcbd2678781

                                                              SHA256

                                                              8a195d6dd01d3871c9113395538858f4ca66667846c92ef9a12971f56d3b1612

                                                              SHA512

                                                              75cadc5bee7de9aaf03383d928b7e2bcbd8a1816542571ef721aa7238d79bc73f39d34c63e5226768e445f06eb4ddc476b7b0390261cb9aa68f3d6b686b6bed7

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5cc51c.TMP

                                                              Filesize

                                                              367B

                                                              MD5

                                                              a65daba765c9a78200e79a9470af23be

                                                              SHA1

                                                              b3101551975d62c1362073c299d1c1eb4b60d253

                                                              SHA256

                                                              3285ff0578bc450d875bb37a072b3f277395e08d65bf920697fcbec6d4ac007a

                                                              SHA512

                                                              9efb81b4ab18f0a71ad128c2b854deed10e317a86bd2d5b9e4a0e0fc6092e6ad32379134daf86d9d90a82d44e0857f2849f5b5256ecd2edc32b5db329a72ca1e

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                              Filesize

                                                              16B

                                                              MD5

                                                              6752a1d65b201c13b62ea44016eb221f

                                                              SHA1

                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                              SHA256

                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                              SHA512

                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              c9030358b7c7b0f4786dc66b088455b5

                                                              SHA1

                                                              09acb861c9e3a0e8921c8c5338dda22c0518c40d

                                                              SHA256

                                                              566940b67b02cf7bfbc5205ea6de4967070fa078adb831afb4791ad7e1028829

                                                              SHA512

                                                              0bb9def3f3bedbe12e119c5d8240ec72ea4a12c3e61986a69e172cb83b3a121c20f5f8b3d763b46460fb510a37cae7966977ac8d9eaddd825ba3c0275657b521

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              5412de8d5ecf836df80288883756e2f4

                                                              SHA1

                                                              3532e7658cc967d2767e3eb755f9a224791f5307

                                                              SHA256

                                                              7b845137578e5355d076855053e8e8d987291670d676acbad11870ebef124789

                                                              SHA512

                                                              8e69c45d2d3785e5e92fc774868f9e754e5e4dd848b65a419cd0e43dcb6940070daff127b34b2dfabb9615af180fb52e3b18c3ff988c8a654701c4975b51c22a

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              3ae9531974154ebf2afc5784bc5e38a0

                                                              SHA1

                                                              1704ccf7e147d8908c8234a7c5e2075cfcc10819

                                                              SHA256

                                                              5027fd42e8ada383886ffa39fcfa6da39147790a769d8e349bc58001a00ed977

                                                              SHA512

                                                              f56f77f8647528fcbd328a7fe01bad0ac5a2e7c132bb600957d1b06f29260267775298a5a9eeecee75ce9230863059a02b8890cc3930535d5bb53d3590f9790b

                                                            • C:\Users\Admin\AppData\Local\Temp\TEMP1_~1.ZIP\THE-MA~1\BANKIN~1\DanaBot.dll

                                                              Filesize

                                                              2.4MB

                                                              MD5

                                                              7e76f7a5c55a5bc5f5e2d7a9e886782b

                                                              SHA1

                                                              fc500153dba682e53776bef53123086f00c0e041

                                                              SHA256

                                                              abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3

                                                              SHA512

                                                              0318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24

                                                            • C:\Users\Admin\AppData\Roaming\Axam.exe

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              0fbf8022619ba56c545b20d172bf3b87

                                                              SHA1

                                                              752e5ce51f0cf9192b8fa1d28a7663b46e3577ff

                                                              SHA256

                                                              4ae7d63ec497143c2acde1ba79f1d9eed80086a420b6f0a07b1e2917da0a6c74

                                                              SHA512

                                                              e8d44147609d04a1a158066d89b739c00b507c8ff208dac72fdc2a42702d336c057ae4b77c305f4ccdfe089665913098d84a3160a834aaebe41f95f4b4bfddeb

                                                            • C:\Windows\Messenger.exe

                                                              Filesize

                                                              50KB

                                                              MD5

                                                              47abd68080eee0ea1b95ae31968a3069

                                                              SHA1

                                                              ffbdf4b2224b92bd78779a7c5ac366ccb007c14d

                                                              SHA256

                                                              b5fc4fd50e4ba69f0c8c8e5c402813c107c605cab659960ac31b3c8356c4e0ec

                                                              SHA512

                                                              c9dfabffe582b29e810db8866f8997af1bd3339fa30e79575377bde970fcad3e3b6e9036b3a88d0c5f4fa3545eea8904d9faabf00142d5775ea5508adcd4dc0a

                                                            • memory/528-432-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/528-499-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/1012-303-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/1012-320-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/1552-313-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/1948-284-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/2132-288-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/2308-186-0x0000000000400000-0x000000000040E000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/2308-514-0x0000000000400000-0x000000000040E000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/2476-389-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/3436-341-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/3596-184-0x00000000020D0000-0x000000000233B000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/3596-272-0x00000000020D0000-0x000000000233B000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/3596-214-0x00000000020D0000-0x000000000233B000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/3892-241-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/3892-282-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/3920-812-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/4612-239-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/4612-216-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5036-832-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5636-327-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5668-273-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5668-285-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5684-455-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5832-750-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/5832-796-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/6032-185-0x0000000000400000-0x0000000000AAD000-memory.dmp

                                                              Filesize

                                                              6.7MB

                                                            • memory/6128-181-0x00000000020B0000-0x000000000231B000-memory.dmp

                                                              Filesize

                                                              2.4MB

                                                            • memory/6132-431-0x0000000000400000-0x000000000040C000-memory.dmp

                                                              Filesize

                                                              48KB