Overview
overview
10Static
static
10Setup.exe
windows7-x64
7Setup.exe
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3IMHttpComm.dll
windows7-x64
3IMHttpComm.dll
windows10-2004-x64
3ImLc.exe
windows7-x64
7ImLc.exe
windows10-2004-x64
10ImLookExU.dll
windows7-x64
1ImLookExU.dll
windows10-2004-x64
1ImLookU.dll
windows7-x64
1ImLookU.dll
windows10-2004-x64
1ImNtUtilU.dll
windows7-x64
3ImNtUtilU.dll
windows10-2004-x64
3ImUtilsU.dll
windows7-x64
1ImUtilsU.dll
windows10-2004-x64
1ImWrappU.dll
windows7-x64
1ImWrappU.dll
windows10-2004-x64
1SftTree_IX86_U_60.dll
windows7-x64
1SftTree_IX86_U_60.dll
windows10-2004-x64
1cateran.docx
windows7-x64
4cateran.docx
windows10-2004-x64
1mfc80u.dll
windows7-x64
1mfc80u.dll
windows10-2004-x64
1msvcp80.dll
windows7-x64
1msvcp80.dll
windows10-2004-x64
1msvcr80.dll
windows7-x64
1msvcr80.dll
windows10-2004-x64
1wlessfp1.dll
windows7-x64
3wlessfp1.dll
windows10-2004-x64
3Analysis
-
max time kernel
52s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 21:56
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
IMHttpComm.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
IMHttpComm.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
ImLc.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
ImLc.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
ImLookExU.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
ImLookExU.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
ImLookU.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
ImLookU.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ImNtUtilU.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
ImNtUtilU.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
ImUtilsU.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
ImUtilsU.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
ImWrappU.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
ImWrappU.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
SftTree_IX86_U_60.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
SftTree_IX86_U_60.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
cateran.docx
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
cateran.docx
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
mfc80u.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
mfc80u.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
msvcp80.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
msvcp80.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
msvcr80.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
msvcr80.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
wlessfp1.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
wlessfp1.dll
Resource
win10v2004-20240709-en
General
-
Target
ImLc.exe
-
Size
302KB
-
MD5
62f06ce16a02ebab81871add6066666b
-
SHA1
47c52f3b5dc542d2509bcf1f723598b9b4e88d46
-
SHA256
88c6341f8779755aa42bf23b70f28a3835cb9e910cb3f47a1e79b8e959061184
-
SHA512
82a27a06f1aa5bbf83c697423ae433cbcd1738642c576398b32830b42223811d4cb7623aee24a7e5e77cdf3bbf3a2727120a4d16dcd5ffc6d19c6bd34134ff6c
-
SSDEEP
6144:2fzYe2KpQo3hELM/4QVG5stx4etDnOd2sdsKsKsKsKsEI6:2fzjp7hzx40VsdsKsKsKsKsEI6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ImLc.exeBt.exepid process 2132 ImLc.exe 2932 Bt.exe -
Loads dropped DLL 15 IoCs
Processes:
ImLc.exeImLc.exenetsh.exePoplarNegligee.pifpid process 2120 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2704 netsh.exe 2704 netsh.exe 2236 PoplarNegligee.pif -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ImLc.exenetsh.exedescription pid process target process PID 2132 set thread context of 2704 2132 ImLc.exe netsh.exe PID 2704 set thread context of 2236 2704 netsh.exe PoplarNegligee.pif -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Modifies registry class 64 IoCs
Processes:
Bt.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid32 Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ = "cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6} Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\Version = "2.1" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\LocalServer32 Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\UpdateTls\\FGOZQGSYCGPLHMRHBG\\Bt.exe" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\FLAGS\ = "0" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\Version = "2.1" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\ProgID Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\ProgID\ = "BtDaemon.cBluetoothDaemon" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming\\UpdateTls\\FGOZQGSYCGPLHMRHBG" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC} Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25} Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\ = "BtDaemon" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ = "_cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32 Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ = "cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\UpdateTls\\FGOZQGSYCGPLHMRHBG\\Bt.exe" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\Version = "2.1" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\Forward Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\VERSION Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ProxyStubClsid Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\VERSION\ = "2.1" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32 Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid32 Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\Version = "2.1" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F} Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC} Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ = "_cBluetoothDaemon" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\ = "BtDaemon.cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\0 Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BtDaemon.cBluetoothDaemon\ = "BtDaemon.cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BtDaemon.cBluetoothDaemon\Clsid Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ = "cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791} Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid32 Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\TypeLib Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BtDaemon.cBluetoothDaemon\Clsid\ = "{4F7FA487-8CC1-493E-AF0A-E7A294474F25}" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D} Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ProxyStubClsid32 Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ = "cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ = "__cBluetoothDaemon" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Bt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ = "__cBluetoothDaemon" Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BtDaemon.cBluetoothDaemon Bt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\Forward Bt.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
ImLc.exeImLc.exenetsh.exepid process 2120 ImLc.exe 2132 ImLc.exe 2132 ImLc.exe 2704 netsh.exe 2704 netsh.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
ImLc.exenetsh.exepid process 2132 ImLc.exe 2704 netsh.exe 2704 netsh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Bt.exepid process 2932 Bt.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ImLc.exeImLc.exenetsh.exedescription pid process target process PID 2120 wrote to memory of 2132 2120 ImLc.exe ImLc.exe PID 2120 wrote to memory of 2132 2120 ImLc.exe ImLc.exe PID 2120 wrote to memory of 2132 2120 ImLc.exe ImLc.exe PID 2120 wrote to memory of 2132 2120 ImLc.exe ImLc.exe PID 2132 wrote to memory of 2932 2132 ImLc.exe Bt.exe PID 2132 wrote to memory of 2932 2132 ImLc.exe Bt.exe PID 2132 wrote to memory of 2932 2132 ImLc.exe Bt.exe PID 2132 wrote to memory of 2932 2132 ImLc.exe Bt.exe PID 2132 wrote to memory of 2704 2132 ImLc.exe netsh.exe PID 2132 wrote to memory of 2704 2132 ImLc.exe netsh.exe PID 2132 wrote to memory of 2704 2132 ImLc.exe netsh.exe PID 2132 wrote to memory of 2704 2132 ImLc.exe netsh.exe PID 2132 wrote to memory of 2704 2132 ImLc.exe netsh.exe PID 2704 wrote to memory of 2236 2704 netsh.exe PoplarNegligee.pif PID 2704 wrote to memory of 2236 2704 netsh.exe PoplarNegligee.pif PID 2704 wrote to memory of 2236 2704 netsh.exe PoplarNegligee.pif PID 2704 wrote to memory of 2236 2704 netsh.exe PoplarNegligee.pif PID 2704 wrote to memory of 2236 2704 netsh.exe PoplarNegligee.pif
Processes
-
C:\Users\Admin\AppData\Local\Temp\ImLc.exe"C:\Users\Admin\AppData\Local\Temp\ImLc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\UpdateTls\ImLc.exeC:\Users\Admin\AppData\Roaming\UpdateTls\ImLc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\UpdateTls\FGOZQGSYCGPLHMRHBG\Bt.exeC:\Users\Admin\AppData\Roaming\UpdateTls\FGOZQGSYCGPLHMRHBG\Bt.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Event Triggered Execution: Netsh Helper DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\PoplarNegligee.pifC:\Users\Admin\AppData\Local\Temp\PoplarNegligee.pif4⤵
- Loads dropped DLL
PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD535b842f41e38659ac947a063b03f3d7e
SHA1a88ccd60aec32c52a14331d60331d7d292837ea4
SHA256a13023a91551aeecc04afebe3d6c93a3326091951968a724c0a6f0da8b74c63a
SHA512ad02a9bc97d718863dd7d9151f73594baad0b9bac844e6bc54c4d0fb8748fd7f98158204c540a38d019f04ec21547ae3a87dd629efaefffd611a5155a9669ec2
-
Filesize
32KB
MD5a70d91a9fd7b65baa0355ee559098bd8
SHA1546127579c06ae0ae4f63f216da422065a859e2f
SHA25696d6264b26decf6595ca6f0584a1b60589ec5dacdf03ddf5fbb6104a6afc9e7a
SHA512f13b735a47090c7c6cc6c2bf9148408ee6db179c96ee6428270541f27e50ad12cff7486f3a6ffac2ba83fd2e6e8e49661e6258f5aee97eb0f48771cbbd22aefa
-
Filesize
262KB
MD56527be4d6a3333dc5a49218c4f80530d
SHA197c8965b01d2644fb17a0f818af59bc0471e38a7
SHA256908ab22cb8fa1b9125cf5746e5591fd84e4853326a812b9431ca1c0b9e997e1f
SHA51269a57cc28583861b97a02968106f007d56c2b5826fc5aa843978f0bf3a3f155ad9f2b7dfbe8260e38c2a7b1ed759f6f6fadbeef32cec9d7c4ab8f541f645dc5b
-
Filesize
606KB
MD53ea6d805a18715f7368363dea3cd3f4c
SHA130ffafc1dd447172fa91404f07038d759c412464
SHA256a6766c524497144d585efa4fe384b516b563203427003508f7c8f6bffa7c928d
SHA512a102f23741de4ca2184485d9aa4ddd1a36b9ea52cb0859cfd264d69a9996293b7e29b325625f1f6f9330d6c80ff415e09e85e1ae838c58acef585ae8dffe3070
-
Filesize
94KB
MD5bb326fe795e2c1c19cd79f320e169fd3
SHA11c1f2b8d98f01870455712e6eba26d77753adcac
SHA256a8e1b0e676dce9556037d29fd96521ec814858404ba4cfdd0db0edbe22c87bc7
SHA512a1ec894151baa14e4ac1ee9471e8606bf74edd39f7833d9a1a44eee74d403f6b52780c135e9718ff9564fa27d7128c22b8410b21f77e6d804f698cfb4eda65a1
-
Filesize
1.4MB
MD511d04f26d2fddde31baea41874db2dc9
SHA1934492f00d56ea6a3aa2a41661529704e847c539
SHA25601d00bbe1bb408c06417092f3e35c90d29fe4ee6a697e4e99c98c9891d852274
SHA5124819cc1b1e924aaac97642bc0b566012547cfbac02721ab63ebdc039d88f81957d1de4089a47c645bd0f9f09de3c52f7ccdbcaa78005b2b335adc5dadc52b212
-
Filesize
1.0MB
MD5ccc2e312486ae6b80970211da472268b
SHA1025b52ff11627760f7006510e9a521b554230fee
SHA25618be5d3c656236b7e3cd6d619d62496fe3e7f66bf2859e460f8ac3d1a6bdaa9a
SHA512d6892abb1a85b9cf0fc6abe1c3aca6c46fc47541dffc2b75f311e8d2c9c1d367f265599456bd77be0e2b6d20c6c22ff5f0c46e7d9ba22c847ad1cbedc8ca3eff
-
Filesize
570KB
MD557bf106e5ec51b703b83b69a402dc39f
SHA1bd4cfab7c50318607326504cc877c0bc84ef56ef
SHA25624f2399fc83198ab8d63ee6a1ad6ffbd1eda4d38048d3e809fecd2a3e0709671
SHA5128bf60649ece6bbb66c7b94ed0d9214fbeab030d5813e1e7b5d6d2349ee1de9075b7dfbbbbeae5af0dc21b071a00eafce0771ca1804e6752e9a71e71e6b1447df
-
Filesize
32KB
MD56ca0f9855f89f8d5b7c66afa03e9d333
SHA102bf7c58da5576d86f77699a5aaa2d059c254983
SHA25624c74262346636f63b0c1afdb64ff000244610ad2ad6a46acb6a596433fede60
SHA5120ba90446e7f6290f90d3b8b99ee0e8c03cd39e623cbd4ae4ab748c6174d52424b49ab50e765ae71fe278363f8c883c50a65a8e817c788d4a3930fffecab0cfe3
-
Filesize
859KB
MD58a67389bef05d08048fffaf94cbfe591
SHA13dede8a14e0c5086fe360feafb1dfba9c7b18e3e
SHA256ae2bf7c45a3a55fd0c4f9ae4104a7040d4884361de895af429cc84579fca7e21
SHA5123e6ef477a8c3c59c5fde13fe60fcb341a6384f1ab287d2a6fe36dfc522550c46b1427d47f7ee415f2f2a996a870a8f11cb78e83fec5296007acee0419a444f22
-
Filesize
70KB
MD55120c44f241a12a3d5a3e87856477c13
SHA1cd8a6ef728c48e17d570c8dc582ec49e17104f6d
SHA256fbd4b6011d3d1c2af22827ca548ba19669eef31173d496e75f064ef7a884431c
SHA51267c0e718368e950d42f007d6a21c6f903b084d6514f777b86aab3111ffe3be995949674276081c0281139a0b39119b84630a0ac341d4ae78677ac8346f371ae1
-
Filesize
29KB
MD5d0509de5ba78cdfb67f897b06d9d184d
SHA1f3ea9fa41831739d38353167754c0bb5a9544001
SHA256a5a7183977808efbaa1ca3e55776f09bcae8f30e2aa5b0520c9cd88cd0d4997d
SHA5120cdfb02946e8450a057db69f3e4331adc2b1bffee2d6002ea2a1ba8b9964883dd71c6f5becd41c02a4a06fd84e20836348b56af3696ae21587a774ec75d9f2c5
-
Filesize
47KB
MD5916d7425a559aaa77f640710a65f9182
SHA123d25052aef9ba71ddeef7cfa86ee43d5ba1ea13
SHA256118de01fb498e81eab4ade980a621af43b52265a9fcbae5dedc492cdf8889f35
SHA512d0c260a0347441b4e263da52feb43412df217c207eba594d59c10ee36e47e1a098b82ce633851c16096b22f4a4a6f8282bdd23d149e337439fe63a77ec7343bc
-
Filesize
302KB
MD562f06ce16a02ebab81871add6066666b
SHA147c52f3b5dc542d2509bcf1f723598b9b4e88d46
SHA25688c6341f8779755aa42bf23b70f28a3835cb9e910cb3f47a1e79b8e959061184
SHA51282a27a06f1aa5bbf83c697423ae433cbcd1738642c576398b32830b42223811d4cb7623aee24a7e5e77cdf3bbf3a2727120a4d16dcd5ffc6d19c6bd34134ff6c
-
Filesize
158KB
MD5cbf4827a5920a5f02c50f78ed46d0319
SHA1b035770e9d9283c61f8f8bbc041e3add0197de7b
SHA2567187903a9e4078f4d31f4b709a59d24eb6b417ea289f4f28eabce1ea2e713dce
SHA512d1a285fb630f55df700a74e5222546656de7d2da7e1419e2936078340767d0bab343b603ba0d07140c790eb5d79a8a34b7818b90316ea06cb9f53cad86b6d3f5