Overview
overview
10Static
static
1Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10x86/Direct...1].exe
windows7-x64
1x86/Direct...1].exe
windows10-2004-x64
1x86/Paring...1].exe
windows7-x64
1x86/Paring...1].exe
windows10-2004-x64
3x86/api-ms...-1.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/chrome...1].exe
windows7-x64
x86/chrome...1].exe
windows10-2004-x64
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
x86/DirectoryMonitor_[1MB]_[1].exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
x86/DirectoryMonitor_[1MB]_[1].exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
x86/Paring_[1MB]_[1].exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
x86/Paring_[1MB]_[1].exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
x86/api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral8
Sample
x86/api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
x86/api-ms-win-core-rtlsupport-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral10
Sample
x86/api-ms-win-core-string-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
x86/api-ms-win-core-synch-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral12
Sample
x86/api-ms-win-core-synch-l1-2-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral13
Sample
x86/api-ms-win-core-sysinfo-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral14
Sample
x86/api-ms-win-core-timezone-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
x86/api-ms-win-core-util-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral16
Sample
x86/api-ms-win-crt-conio-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral17
Sample
x86/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral18
Sample
x86/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
x86/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral20
Sample
x86/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral21
Sample
x86/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral22
Sample
x86/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral23
Sample
x86/api-ms-win-crt-multibyte-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral24
Sample
x86/api-ms-win-crt-private-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral25
Sample
x86/api-ms-win-crt-process-l1-1-0.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral26
Sample
x86/chrome_[1MB]_[1].exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
x86/chrome_[1MB]_[1].exe
Resource
win10v2004-20240730-en
General
-
Target
Setup.exe
-
Size
9.2MB
-
MD5
1cc167273eeaf450abb5e548edfabc89
-
SHA1
ca47da5cc86c31aea84a6b170bc948f1020abe89
-
SHA256
b16b380f60786a78e3e8760f4a65e0906f744e43b2a04eead206596727443082
-
SHA512
99969849910f81ea0a163562502db3837e1cd506524c408938c12952c10e50ff846604cf5a0774014e0a896ba7c571c969ac168fd38002414dd7a87ed86749d7
-
SSDEEP
196608:Fsd7F8Iox9opRvxDKokM7JQpBgKDQhN0F:Fsd2px4lwrM7ClQhNu
Malware Config
Extracted
lumma
https://dividenntyss.shop/api
https://horizonvxjis.shop/api
https://effectivedoxzj.shop/api
https://parntorpkxzlp.shop/api
https://stimultaionsppzv.shop/api
https://grassytaisol.shop/api
https://broccoltisop.shop/api
https://shellfyyousdjz.shop/api
https://bravedreacisopm.shop/api
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2832 Setup.tmp 2644 Setup.tmp 2592 ImPackr.exe 1460 ImPackr.exe 1472 StrCmp.exe -
Loads dropped DLL 29 IoCs
pid Process 2996 Setup.exe 2832 Setup.tmp 3020 Setup.exe 2644 Setup.tmp 2644 Setup.tmp 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 2592 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1660 more.com 1660 more.com 1668 Hypnotism.pif -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 2656 tasklist.exe 2968 tasklist.exe 1592 tasklist.exe 1728 tasklist.exe 276 tasklist.exe 2612 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1460 set thread context of 1660 1460 ImPackr.exe 64 PID 1660 set thread context of 1668 1660 more.com 66 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ImPackr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ImPackr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StrCmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 780 ping.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ = "_cBluetoothDaemon" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ProxyStubClsid StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\Forward StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\Forward\ = "{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\ = "BtDaemon" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32 StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\VERSION StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ = "__cBluetoothDaemon" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\Version = "2.1" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791} StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\FLAGS\ = "0" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\FLAGS StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC} StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32 StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\ProtectLoad\\EHLWFKVQTCQTI\\StrCmp.exe" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D} StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8A84C003-E3A6-4E71-8E33-5B929D40B81D}\ = "cBluetoothDaemon" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\Forward StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1 StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\0 StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F} StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\LocalServer32 StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BtDaemon.cBluetoothDaemon\Clsid StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\HELPDIR StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC} StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\Version = "2.1" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ = "__cBluetoothDaemon" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\ProgID StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\VERSION\ = "2.1" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\Programmable StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\0\win32 StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\ProtectLoad\\EHLWFKVQTCQTI\\StrCmp.exe" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\ = "BtDaemon.cBluetoothDaemon" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ProxyStubClsid32 StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\Version = "2.1" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\Version = "2.1" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\ProgID\ = "BtDaemon.cBluetoothDaemon" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ProxyStubClsid32 StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7FA487-8CC1-493E-AF0A-E7A294474F25}\TypeLib StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10E6A3D4-CABA-4E61-BD8B-83BA76283791}\ = "cBluetoothDaemon" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\ = "_cBluetoothDaemon" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{65B9560F-CEC2-4DFC-A04D-BEA488DA4DCC}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BtDaemon.cBluetoothDaemon StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{F477A542-C370-42A1-A166-F9CDAF2AF8C6}\2.1\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming\\ProtectLoad\\EHLWFKVQTCQTI" StrCmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F} StrCmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5965C4C-9CC3-4EA3-8079-0B9AA9389A1F}\TypeLib\ = "{F477A542-C370-42A1-A166-F9CDAF2AF8C6}" StrCmp.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 780 ping.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2644 Setup.tmp 2644 Setup.tmp 2592 ImPackr.exe 1460 ImPackr.exe 1460 ImPackr.exe 1660 more.com 1660 more.com -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1460 ImPackr.exe 1660 more.com 1660 more.com -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2968 tasklist.exe Token: SeDebugPrivilege 1592 tasklist.exe Token: SeDebugPrivilege 1728 tasklist.exe Token: SeDebugPrivilege 276 tasklist.exe Token: SeDebugPrivilege 2612 tasklist.exe Token: SeDebugPrivilege 2656 tasklist.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 Setup.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1472 StrCmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2996 wrote to memory of 2832 2996 Setup.exe 31 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 2832 wrote to memory of 3020 2832 Setup.tmp 32 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 3020 wrote to memory of 2644 3020 Setup.exe 33 PID 2644 wrote to memory of 780 2644 Setup.tmp 34 PID 2644 wrote to memory of 780 2644 Setup.tmp 34 PID 2644 wrote to memory of 780 2644 Setup.tmp 34 PID 2644 wrote to memory of 780 2644 Setup.tmp 34 PID 2644 wrote to memory of 2624 2644 Setup.tmp 36 PID 2644 wrote to memory of 2624 2644 Setup.tmp 36 PID 2644 wrote to memory of 2624 2644 Setup.tmp 36 PID 2644 wrote to memory of 2624 2644 Setup.tmp 36 PID 2624 wrote to memory of 2968 2624 cmd.exe 38 PID 2624 wrote to memory of 2968 2624 cmd.exe 38 PID 2624 wrote to memory of 2968 2624 cmd.exe 38 PID 2624 wrote to memory of 2824 2624 cmd.exe 39 PID 2624 wrote to memory of 2824 2624 cmd.exe 39 PID 2624 wrote to memory of 2824 2624 cmd.exe 39 PID 2644 wrote to memory of 1912 2644 Setup.tmp 41 PID 2644 wrote to memory of 1912 2644 Setup.tmp 41 PID 2644 wrote to memory of 1912 2644 Setup.tmp 41 PID 2644 wrote to memory of 1912 2644 Setup.tmp 41 PID 1912 wrote to memory of 1592 1912 cmd.exe 43 PID 1912 wrote to memory of 1592 1912 cmd.exe 43 PID 1912 wrote to memory of 1592 1912 cmd.exe 43 PID 1912 wrote to memory of 996 1912 cmd.exe 44 PID 1912 wrote to memory of 996 1912 cmd.exe 44 PID 1912 wrote to memory of 996 1912 cmd.exe 44 PID 2644 wrote to memory of 1840 2644 Setup.tmp 45 PID 2644 wrote to memory of 1840 2644 Setup.tmp 45 PID 2644 wrote to memory of 1840 2644 Setup.tmp 45 PID 2644 wrote to memory of 1840 2644 Setup.tmp 45 PID 1840 wrote to memory of 1728 1840 cmd.exe 47 PID 1840 wrote to memory of 1728 1840 cmd.exe 47 PID 1840 wrote to memory of 1728 1840 cmd.exe 47 PID 1840 wrote to memory of 2436 1840 cmd.exe 48 PID 1840 wrote to memory of 2436 1840 cmd.exe 48 PID 1840 wrote to memory of 2436 1840 cmd.exe 48 PID 2644 wrote to memory of 1152 2644 Setup.tmp 49 PID 2644 wrote to memory of 1152 2644 Setup.tmp 49 PID 2644 wrote to memory of 1152 2644 Setup.tmp 49 PID 2644 wrote to memory of 1152 2644 Setup.tmp 49 PID 1152 wrote to memory of 276 1152 cmd.exe 51 PID 1152 wrote to memory of 276 1152 cmd.exe 51 PID 1152 wrote to memory of 276 1152 cmd.exe 51 PID 1152 wrote to memory of 380 1152 cmd.exe 52 PID 1152 wrote to memory of 380 1152 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\is-0370Q.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-0370Q.tmp\Setup.tmp" /SL5="$40152,8764920,776192,C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe" /VERYSILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\is-LD10R.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-LD10R.tmp\Setup.tmp" /SL5="$50152,8764920,776192,C:\Users\Admin\AppData\Local\Temp\Setup.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\ping.exe"ping" -n 6 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:780
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"6⤵PID:2824
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"6⤵PID:996
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"6⤵PID:2436
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"6⤵PID:380
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"5⤵PID:1500
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"6⤵PID:1540
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"5⤵PID:1576
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"6⤵PID:1864
-
-
-
C:\Users\Admin\AppData\Local\ptt\ImPackr.exe"C:\Users\Admin\AppData\Local\ptt\ImPackr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Users\Admin\AppData\Roaming\ProtectLoad\ImPackr.exeC:\Users\Admin\AppData\Roaming\ProtectLoad\ImPackr.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1460 -
C:\Users\Admin\AppData\Roaming\ProtectLoad\EHLWFKVQTCQTI\StrCmp.exeC:\Users\Admin\AppData\Roaming\ProtectLoad\EHLWFKVQTCQTI\StrCmp.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com7⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Hypnotism.pifC:\Users\Admin\AppData\Local\Temp\Hypnotism.pif8⤵
- Loads dropped DLL
PID:1668
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b35fbc1944ba6635da9f56876a299c1f
SHA1c29ab56b3201112adaa61a7aa24bd44bdd5a07aa
SHA2562c50c5268987ed144d5af5324012658c6035a5782c48ecf4b1abd7239fdb9f73
SHA512e653bf23a42c6dfc897c75cd47521ff4b3c7d7e4f0a44789a23a75d205931541d974c24e29a61f32aec9cc7f711269d5d20a7d4ab49d17e31992dae8e5686534
-
Filesize
158KB
MD5cbf4827a5920a5f02c50f78ed46d0319
SHA1b035770e9d9283c61f8f8bbc041e3add0197de7b
SHA2567187903a9e4078f4d31f4b709a59d24eb6b417ea289f4f28eabce1ea2e713dce
SHA512d1a285fb630f55df700a74e5222546656de7d2da7e1419e2936078340767d0bab343b603ba0d07140c790eb5d79a8a34b7818b90316ea06cb9f53cad86b6d3f5
-
Filesize
1KB
MD5541423a06efdcd4e4554c719061f82cf
SHA12e12c6df7352c3ed3c61a45baf68eace1cc9546e
SHA25617ad1a64ba1c382abf89341b40950f9b31f95015c6b0d3e25925bfebc1b53eb5
SHA51211cf735dcddba72babb9de8f59e0c180a9fec8268cbfca09d17d8535f1b92c17bf32acda86499e420cbe7763a96d6067feb67fa1ed745067ab326fd5b84188c6
-
Filesize
2KB
MD597b859f11538bbe20f17dfb9c0979a1c
SHA12593ad721d7be3821fd0b40611a467db97be8547
SHA2564ed3ba814de7fd08b4e4c6143d144e603536c343602e1071803b86e58391be36
SHA512905c7879df47559ad271dc052ef8ae38555eac49e8ac516bc011624bf9a622eb10ee5c6a06fbd3e5c0fa956a0d38f03f6808c1c58ee57813818fe8b8319a3541
-
Filesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
Filesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
Filesize
28KB
MD5c16bdb0036083aba512460a356e5fc84
SHA120dbacf9718f981b1e3b21980662a3e634cf39a8
SHA256b18318487981c68e812f3ac0adb5eb39c019d66da83e2ba15084ad8e836f9bbf
SHA512ed55801bbb73fa8ddffe6f0b67d8f4beea4e8f3503c7e93845573c4589af41e7a489f8b67fe8073be0378719fd96d66b6773cd0ed2703f4167e7824fa7b58071
-
Filesize
907KB
MD5a2c4a4c8839fba9933013dd48d65857c
SHA1a94ece2f5c6a95b974b9e456be0112c91d5e51b8
SHA25617edad4451044460a570aa31cc5976ac8d4b5f5a0fb73548eb811c6d1b1e01b9
SHA512860c036475b4a2ebff95fe4ea4fe8a3259e7777639e812d31167e4ec9f4447f1c15abef3b14776bec0305dcc0fa1db43cb2a376babdf6d6eb5e6d5e2c85e57a7
-
Filesize
70KB
MD55120c44f241a12a3d5a3e87856477c13
SHA1cd8a6ef728c48e17d570c8dc582ec49e17104f6d
SHA256fbd4b6011d3d1c2af22827ca548ba19669eef31173d496e75f064ef7a884431c
SHA51267c0e718368e950d42f007d6a21c6f903b084d6514f777b86aab3111ffe3be995949674276081c0281139a0b39119b84630a0ac341d4ae78677ac8346f371ae1
-
Filesize
29KB
MD5d0509de5ba78cdfb67f897b06d9d184d
SHA1f3ea9fa41831739d38353167754c0bb5a9544001
SHA256a5a7183977808efbaa1ca3e55776f09bcae8f30e2aa5b0520c9cd88cd0d4997d
SHA5120cdfb02946e8450a057db69f3e4331adc2b1bffee2d6002ea2a1ba8b9964883dd71c6f5becd41c02a4a06fd84e20836348b56af3696ae21587a774ec75d9f2c5
-
Filesize
3.0MB
MD50a8d31efde93f55df43e8a3cde98e8fa
SHA12df48a22c5cf85cad7cf320384ce5cea51f87cee
SHA256794e4135015d6507846a072f81168eaf297c78dbe529e4cc94ddbb475b43d694
SHA512ecca5f4883591481dad26daac8d8cae4e49644f86c2e3575c2fe3da9c567f75646ebda70bf23f600aa3570c8614093084773f88a29d58f8675cff44f83b438d0
-
Filesize
12KB
MD547cfd05fde4babe79530c7ea730f6dc0
SHA12c055fa81f19d6f024f1f3d5b2dd0d5fde51d87e
SHA2564bb34fe74f86ab389763863ee395a93d73e2d9548c224819ec9055d7c8c4b480
SHA512ece4b4268e0d346e438f6f59fe333f7b6f95e3287791c517ef477935704ad2788e544a877b39abf542cd90a23966302d44cf03fb71e95c4f84ea11e634b3cbd0
-
Filesize
32KB
MD5a70d91a9fd7b65baa0355ee559098bd8
SHA1546127579c06ae0ae4f63f216da422065a859e2f
SHA25696d6264b26decf6595ca6f0584a1b60589ec5dacdf03ddf5fbb6104a6afc9e7a
SHA512f13b735a47090c7c6cc6c2bf9148408ee6db179c96ee6428270541f27e50ad12cff7486f3a6ffac2ba83fd2e6e8e49661e6258f5aee97eb0f48771cbbd22aefa
-
Filesize
262KB
MD5c8a5c9f0824b7132a54764b719b4f436
SHA109a92930aff829fb8df9f2856d7e615c3f185b50
SHA25634ba4b2ca63bbbf0c3be82787b11284d91b6050643c78e7d64d1d25544d72813
SHA5123848311ca0dd357d02cc07496ff5e5cbc6792e9e3e57afb28998269db7207685a742aea2ecc2196f4c5dbbc255bc8c42451e4bbd69a48ea6b97935d938c33db6
-
Filesize
606KB
MD53ea6d805a18715f7368363dea3cd3f4c
SHA130ffafc1dd447172fa91404f07038d759c412464
SHA256a6766c524497144d585efa4fe384b516b563203427003508f7c8f6bffa7c928d
SHA512a102f23741de4ca2184485d9aa4ddd1a36b9ea52cb0859cfd264d69a9996293b7e29b325625f1f6f9330d6c80ff415e09e85e1ae838c58acef585ae8dffe3070
-
Filesize
94KB
MD5bb326fe795e2c1c19cd79f320e169fd3
SHA11c1f2b8d98f01870455712e6eba26d77753adcac
SHA256a8e1b0e676dce9556037d29fd96521ec814858404ba4cfdd0db0edbe22c87bc7
SHA512a1ec894151baa14e4ac1ee9471e8606bf74edd39f7833d9a1a44eee74d403f6b52780c135e9718ff9564fa27d7128c22b8410b21f77e6d804f698cfb4eda65a1
-
Filesize
102KB
MD52f779ac4318fd4990c828f60d16f2b17
SHA1a188080158f8cdfe5050d6e828fb69e17ac0be19
SHA256689951b03517f77b6c04bb57f604f50736dc1a86b87253b0dee73722d4520a11
SHA5127f6dc79ab6db4615bb0c7b31d36cc8750373f9b7c199bfaa8e1eff9dbd6f0b790fe7e4c9dc86b62abb811d93e946e68ddc171701bddba423079447124ca6464c
-
Filesize
1.4MB
MD5a7eaba8bc12b2b7ec2a41a4d9e45008a
SHA16a96a18bb4f1cd6196517713ed634f37f6b0362b
SHA256914b1e53451b8be2c362d62514f28bdef46a133535d959b13f3f4bf3bc63df3a
SHA5120ae7fbdb2677d92c62337aa17b60a4887240a4a426ba638c7633587f4582adbcda2bde5ec824aab1a3f69acf2b391118763842acfab856d3d9764850961a2ac8
-
Filesize
570KB
MD557bf106e5ec51b703b83b69a402dc39f
SHA1bd4cfab7c50318607326504cc877c0bc84ef56ef
SHA25624f2399fc83198ab8d63ee6a1ad6ffbd1eda4d38048d3e809fecd2a3e0709671
SHA5128bf60649ece6bbb66c7b94ed0d9214fbeab030d5813e1e7b5d6d2349ee1de9075b7dfbbbbeae5af0dc21b071a00eafce0771ca1804e6752e9a71e71e6b1447df
-
Filesize
1.0MB
MD5ccc2e312486ae6b80970211da472268b
SHA1025b52ff11627760f7006510e9a521b554230fee
SHA25618be5d3c656236b7e3cd6d619d62496fe3e7f66bf2859e460f8ac3d1a6bdaa9a
SHA512d6892abb1a85b9cf0fc6abe1c3aca6c46fc47541dffc2b75f311e8d2c9c1d367f265599456bd77be0e2b6d20c6c22ff5f0c46e7d9ba22c847ad1cbedc8ca3eff
-
Filesize
47KB
MD5916d7425a559aaa77f640710a65f9182
SHA123d25052aef9ba71ddeef7cfa86ee43d5ba1ea13
SHA256118de01fb498e81eab4ade980a621af43b52265a9fcbae5dedc492cdf8889f35
SHA512d0c260a0347441b4e263da52feb43412df217c207eba594d59c10ee36e47e1a098b82ce633851c16096b22f4a4a6f8282bdd23d149e337439fe63a77ec7343bc