Analysis
-
max time kernel
298s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
Worship.zip
Resource
win7-20240708-en
General
-
Target
Worship.zip
-
Size
3.0MB
-
MD5
a434b381dcb08f556173d1f11d161d54
-
SHA1
19c9f4b392bc8fafa41ad3b4a724fb66c761564f
-
SHA256
dc71309d185aa1c39ae1ce97daab077bdb1f9ca1617e2fccd741d15a9be8648b
-
SHA512
fd009c2b60d8540120b8fcc5e3e652e7356a665d29fdc2367da787a3b72f0b1d44d04ff715ddaf62b774c42aa430283df60d89790607e549186016a35f6f0c4d
-
SSDEEP
49152:hNTjSwTYLIE3gF+5b6ECl5w2FgaaPVgIGH2B/Ca2IXNxmfHzPhfTiiz:7uQYLISr1Ss0QgIY24qXm51z
Malware Config
Extracted
djvu
http://cajgtus.com/test1/get.php
-
extension
.watz
-
offline_id
Lc3VTezPWbMhuVAQFzJUdeA68PwI7UDpc5aKHYt1
- payload_url
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/abe121434ad837dd5bdd03878a14485820240531135509/34284d Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0874PsawqS
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
147.45.47.36:30035
Extracted
lumma
https://stamppreewntnq.shop/api
https://locatedblsoqp.shop/api
Signatures
-
Detected Djvu ransomware 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2656-209-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2656-207-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1560-231-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1560-230-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1560-229-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1560-226-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1560-224-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops startup file 1 IoCs
Processes:
eruy1u628ynibrJHWsmyxp6E.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNNT.lnk eruy1u628ynibrJHWsmyxp6E.exe -
Executes dropped EXE 19 IoCs
Processes:
VV_22__2DLz8ViM1jrF_R6iL.exeeruy1u628ynibrJHWsmyxp6E.exexVgYPV_K4LUHOzKuQoDbXikQ.exeh2PXVUpO7VPPDpwHJlB_xBgz.exeilV6EjsxgVOJNFHFQBfEzPHa.exeOmTpmUm9O4I7wa71Z1lUcWVa.exeJyqIGlqdhrNdXxdhVmHXzcwY.exeetZM4gVUuzTcVn5cNb9lQsv7.exejq6xYRjzX_hXFXec5SaVIZIM.execxr20XMewyeALwN4CoQgbAzd.exeilV6EjsxgVOJNFHFQBfEzPHa.tmpcxr20XMewyeALwN4CoQgbAzd.exeeruy1u628ynibrJHWsmyxp6E.execxr20XMewyeALwN4CoQgbAzd.execxr20XMewyeALwN4CoQgbAzd.exeAdminEBGDHJECFC.exeAdminCAFBGHIDBG.exeetzpikspwykg.exepid process 2084 VV_22__2DLz8ViM1jrF_R6iL.exe 2340 eruy1u628ynibrJHWsmyxp6E.exe 976 xVgYPV_K4LUHOzKuQoDbXikQ.exe 2024 h2PXVUpO7VPPDpwHJlB_xBgz.exe 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 2504 JyqIGlqdhrNdXxdhVmHXzcwY.exe 2196 etZM4gVUuzTcVn5cNb9lQsv7.exe 960 jq6xYRjzX_hXFXec5SaVIZIM.exe 2488 cxr20XMewyeALwN4CoQgbAzd.exe 896 ilV6EjsxgVOJNFHFQBfEzPHa.tmp 2656 cxr20XMewyeALwN4CoQgbAzd.exe 2448 eruy1u628ynibrJHWsmyxp6E.exe 2760 cxr20XMewyeALwN4CoQgbAzd.exe 3048 cxr20XMewyeALwN4CoQgbAzd.exe 2628 AdminEBGDHJECFC.exe 2884 AdminCAFBGHIDBG.exe 476 1076 etzpikspwykg.exe -
Loads dropped DLL 26 IoCs
Processes:
Worship.pifilV6EjsxgVOJNFHFQBfEzPHa.exeilV6EjsxgVOJNFHFQBfEzPHa.tmperuy1u628ynibrJHWsmyxp6E.execxr20XMewyeALwN4CoQgbAzd.exeRegAsm.execmd.execmd.exepid process 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 2664 Worship.pif 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe 896 ilV6EjsxgVOJNFHFQBfEzPHa.tmp 896 ilV6EjsxgVOJNFHFQBfEzPHa.tmp 896 ilV6EjsxgVOJNFHFQBfEzPHa.tmp 896 ilV6EjsxgVOJNFHFQBfEzPHa.tmp 2448 eruy1u628ynibrJHWsmyxp6E.exe 2656 cxr20XMewyeALwN4CoQgbAzd.exe 1540 RegAsm.exe 1540 RegAsm.exe 2748 cmd.exe 2396 cmd.exe 476 -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eruy1u628ynibrJHWsmyxp6E.execxr20XMewyeALwN4CoQgbAzd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV6 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV6\\ExtreamFanV6.exe" eruy1u628ynibrJHWsmyxp6E.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2e348701-bad8-4ce5-88bd-01049c8e5222\\cxr20XMewyeALwN4CoQgbAzd.exe\" --AutoStart" cxr20XMewyeALwN4CoQgbAzd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api64.ipify.org 9 ipinfo.io 13 api.myip.com 14 api.myip.com 60 api.2ip.ua 5 api64.ipify.org 8 ipinfo.io 39 api.2ip.ua 40 api.2ip.ua -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 2488 powercfg.exe 2836 powercfg.exe 2756 powercfg.exe 2716 powercfg.exe 2172 powercfg.exe 960 powercfg.exe 1576 powercfg.exe 2400 powercfg.exe -
System Binary Proxy Execution: Verclsid 1 TTPs 1 IoCs
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Suspicious use of SetThreadContext 12 IoCs
Processes:
Worship.pifcxr20XMewyeALwN4CoQgbAzd.exejq6xYRjzX_hXFXec5SaVIZIM.exeVV_22__2DLz8ViM1jrF_R6iL.exeetZM4gVUuzTcVn5cNb9lQsv7.exeJyqIGlqdhrNdXxdhVmHXzcwY.exeeruy1u628ynibrJHWsmyxp6E.execxr20XMewyeALwN4CoQgbAzd.exeAdminEBGDHJECFC.exeAdminCAFBGHIDBG.exeetzpikspwykg.exedescription pid process target process PID 2776 set thread context of 2664 2776 Worship.pif Worship.pif PID 2488 set thread context of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 960 set thread context of 2812 960 jq6xYRjzX_hXFXec5SaVIZIM.exe RegAsm.exe PID 2084 set thread context of 1560 2084 VV_22__2DLz8ViM1jrF_R6iL.exe RegAsm.exe PID 2196 set thread context of 2780 2196 etZM4gVUuzTcVn5cNb9lQsv7.exe RegAsm.exe PID 2504 set thread context of 1540 2504 JyqIGlqdhrNdXxdhVmHXzcwY.exe RegAsm.exe PID 2340 set thread context of 2448 2340 eruy1u628ynibrJHWsmyxp6E.exe eruy1u628ynibrJHWsmyxp6E.exe PID 2760 set thread context of 3048 2760 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2628 set thread context of 2160 2628 AdminEBGDHJECFC.exe RegAsm.exe PID 2884 set thread context of 2596 2884 AdminCAFBGHIDBG.exe RegAsm.exe PID 1076 set thread context of 2516 1076 etzpikspwykg.exe conhost.exe PID 1076 set thread context of 2572 1076 etzpikspwykg.exe svchost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2840 sc.exe 2888 sc.exe 1072 sc.exe 2664 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RegAsm.execxr20XMewyeALwN4CoQgbAzd.exeeruy1u628ynibrJHWsmyxp6E.execxr20XMewyeALwN4CoQgbAzd.exeRegAsm.exeJyqIGlqdhrNdXxdhVmHXzcwY.exeRegAsm.exeicacls.exeschtasks.exeAdminCAFBGHIDBG.execmd.exetimeout.exeilV6EjsxgVOJNFHFQBfEzPHa.execxr20XMewyeALwN4CoQgbAzd.exeAdminEBGDHJECFC.execmd.exeWorship.pifilV6EjsxgVOJNFHFQBfEzPHa.tmpschtasks.exeVV_22__2DLz8ViM1jrF_R6iL.exejq6xYRjzX_hXFXec5SaVIZIM.exeRegAsm.exeRegAsm.exeRegAsm.exeetZM4gVUuzTcVn5cNb9lQsv7.exeeruy1u628ynibrJHWsmyxp6E.execmd.exeWorship.pifcxr20XMewyeALwN4CoQgbAzd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxr20XMewyeALwN4CoQgbAzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eruy1u628ynibrJHWsmyxp6E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxr20XMewyeALwN4CoQgbAzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JyqIGlqdhrNdXxdhVmHXzcwY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminCAFBGHIDBG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilV6EjsxgVOJNFHFQBfEzPHa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxr20XMewyeALwN4CoQgbAzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminEBGDHJECFC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worship.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilV6EjsxgVOJNFHFQBfEzPHa.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VV_22__2DLz8ViM1jrF_R6iL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jq6xYRjzX_hXFXec5SaVIZIM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language etZM4gVUuzTcVn5cNb9lQsv7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eruy1u628ynibrJHWsmyxp6E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worship.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxr20XMewyeALwN4CoQgbAzd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exeRegAsm.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 584 timeout.exe -
Processes:
RegAsm.exeRegAsm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0f000000010000002000000020d814fd5fc477ce74425e441d8f5b48d38db6f1dd119441bc35777689bd094c030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b0640200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e003000000000000b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f007200690074007900000020000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 140000000100000014000000f352eacf816860c1097c4b852f4332dd93eb5d4f0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b0640f000000010000002000000020d814fd5fc477ce74425e441d8f5b48d38db6f1dd119441bc35777689bd094c20000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2496 schtasks.exe 1172 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
Worship.pifOmTpmUm9O4I7wa71Z1lUcWVa.exeRegAsm.execxr20XMewyeALwN4CoQgbAzd.exeRegAsm.execxr20XMewyeALwN4CoQgbAzd.exeRegAsm.exeetzpikspwykg.exepid process 2776 Worship.pif 2776 Worship.pif 2776 Worship.pif 2776 Worship.pif 2776 Worship.pif 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 2780 RegAsm.exe 2656 cxr20XMewyeALwN4CoQgbAzd.exe 2656 cxr20XMewyeALwN4CoQgbAzd.exe 1540 RegAsm.exe 3048 cxr20XMewyeALwN4CoQgbAzd.exe 3048 cxr20XMewyeALwN4CoQgbAzd.exe 2812 RegAsm.exe 1540 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 2780 RegAsm.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1224 OmTpmUm9O4I7wa71Z1lUcWVa.exe 1076 etzpikspwykg.exe 1076 etzpikspwykg.exe 1076 etzpikspwykg.exe 1076 etzpikspwykg.exe 1076 etzpikspwykg.exe 1076 etzpikspwykg.exe 1076 etzpikspwykg.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
RegAsm.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 2812 RegAsm.exe Token: SeBackupPrivilege 2812 RegAsm.exe Token: SeSecurityPrivilege 2812 RegAsm.exe Token: SeSecurityPrivilege 2812 RegAsm.exe Token: SeSecurityPrivilege 2812 RegAsm.exe Token: SeSecurityPrivilege 2812 RegAsm.exe Token: SeShutdownPrivilege 2488 powercfg.exe Token: SeShutdownPrivilege 2716 powercfg.exe Token: SeShutdownPrivilege 2756 powercfg.exe Token: SeShutdownPrivilege 2836 powercfg.exe Token: SeShutdownPrivilege 2400 powercfg.exe Token: SeShutdownPrivilege 960 powercfg.exe Token: SeLockMemoryPrivilege 2572 svchost.exe Token: SeShutdownPrivilege 1576 powercfg.exe Token: SeShutdownPrivilege 2172 powercfg.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Worship.pifpid process 2776 Worship.pif 2776 Worship.pif 2776 Worship.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Worship.pifpid process 2776 Worship.pif 2776 Worship.pif 2776 Worship.pif -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Worship.pifWorship.pifilV6EjsxgVOJNFHFQBfEzPHa.execxr20XMewyeALwN4CoQgbAzd.exedescription pid process target process PID 2776 wrote to memory of 2664 2776 Worship.pif Worship.pif PID 2776 wrote to memory of 2664 2776 Worship.pif Worship.pif PID 2776 wrote to memory of 2664 2776 Worship.pif Worship.pif PID 2776 wrote to memory of 2664 2776 Worship.pif Worship.pif PID 2776 wrote to memory of 2664 2776 Worship.pif Worship.pif PID 2776 wrote to memory of 2664 2776 Worship.pif Worship.pif PID 2664 wrote to memory of 2084 2664 Worship.pif VV_22__2DLz8ViM1jrF_R6iL.exe PID 2664 wrote to memory of 2084 2664 Worship.pif VV_22__2DLz8ViM1jrF_R6iL.exe PID 2664 wrote to memory of 2084 2664 Worship.pif VV_22__2DLz8ViM1jrF_R6iL.exe PID 2664 wrote to memory of 2084 2664 Worship.pif VV_22__2DLz8ViM1jrF_R6iL.exe PID 2664 wrote to memory of 2340 2664 Worship.pif eruy1u628ynibrJHWsmyxp6E.exe PID 2664 wrote to memory of 2340 2664 Worship.pif eruy1u628ynibrJHWsmyxp6E.exe PID 2664 wrote to memory of 2340 2664 Worship.pif eruy1u628ynibrJHWsmyxp6E.exe PID 2664 wrote to memory of 2340 2664 Worship.pif eruy1u628ynibrJHWsmyxp6E.exe PID 2664 wrote to memory of 976 2664 Worship.pif xVgYPV_K4LUHOzKuQoDbXikQ.exe PID 2664 wrote to memory of 976 2664 Worship.pif xVgYPV_K4LUHOzKuQoDbXikQ.exe PID 2664 wrote to memory of 976 2664 Worship.pif xVgYPV_K4LUHOzKuQoDbXikQ.exe PID 2664 wrote to memory of 976 2664 Worship.pif xVgYPV_K4LUHOzKuQoDbXikQ.exe PID 2664 wrote to memory of 2504 2664 Worship.pif JyqIGlqdhrNdXxdhVmHXzcwY.exe PID 2664 wrote to memory of 2504 2664 Worship.pif JyqIGlqdhrNdXxdhVmHXzcwY.exe PID 2664 wrote to memory of 2504 2664 Worship.pif JyqIGlqdhrNdXxdhVmHXzcwY.exe PID 2664 wrote to memory of 2504 2664 Worship.pif JyqIGlqdhrNdXxdhVmHXzcwY.exe PID 2664 wrote to memory of 2024 2664 Worship.pif h2PXVUpO7VPPDpwHJlB_xBgz.exe PID 2664 wrote to memory of 2024 2664 Worship.pif h2PXVUpO7VPPDpwHJlB_xBgz.exe PID 2664 wrote to memory of 2024 2664 Worship.pif h2PXVUpO7VPPDpwHJlB_xBgz.exe PID 2664 wrote to memory of 2024 2664 Worship.pif h2PXVUpO7VPPDpwHJlB_xBgz.exe PID 2664 wrote to memory of 2196 2664 Worship.pif etZM4gVUuzTcVn5cNb9lQsv7.exe PID 2664 wrote to memory of 2196 2664 Worship.pif etZM4gVUuzTcVn5cNb9lQsv7.exe PID 2664 wrote to memory of 2196 2664 Worship.pif etZM4gVUuzTcVn5cNb9lQsv7.exe PID 2664 wrote to memory of 2196 2664 Worship.pif etZM4gVUuzTcVn5cNb9lQsv7.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 1744 2664 Worship.pif ilV6EjsxgVOJNFHFQBfEzPHa.exe PID 2664 wrote to memory of 960 2664 Worship.pif jq6xYRjzX_hXFXec5SaVIZIM.exe PID 2664 wrote to memory of 960 2664 Worship.pif jq6xYRjzX_hXFXec5SaVIZIM.exe PID 2664 wrote to memory of 960 2664 Worship.pif jq6xYRjzX_hXFXec5SaVIZIM.exe PID 2664 wrote to memory of 960 2664 Worship.pif jq6xYRjzX_hXFXec5SaVIZIM.exe PID 2664 wrote to memory of 1224 2664 Worship.pif OmTpmUm9O4I7wa71Z1lUcWVa.exe PID 2664 wrote to memory of 1224 2664 Worship.pif OmTpmUm9O4I7wa71Z1lUcWVa.exe PID 2664 wrote to memory of 1224 2664 Worship.pif OmTpmUm9O4I7wa71Z1lUcWVa.exe PID 2664 wrote to memory of 1224 2664 Worship.pif OmTpmUm9O4I7wa71Z1lUcWVa.exe PID 2664 wrote to memory of 2488 2664 Worship.pif cxr20XMewyeALwN4CoQgbAzd.exe PID 2664 wrote to memory of 2488 2664 Worship.pif cxr20XMewyeALwN4CoQgbAzd.exe PID 2664 wrote to memory of 2488 2664 Worship.pif cxr20XMewyeALwN4CoQgbAzd.exe PID 2664 wrote to memory of 2488 2664 Worship.pif cxr20XMewyeALwN4CoQgbAzd.exe PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 1744 wrote to memory of 896 1744 ilV6EjsxgVOJNFHFQBfEzPHa.exe ilV6EjsxgVOJNFHFQBfEzPHa.tmp PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe PID 2488 wrote to memory of 2656 2488 cxr20XMewyeALwN4CoQgbAzd.exe cxr20XMewyeALwN4CoQgbAzd.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Worship.zip1⤵PID:2092
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵
- System Binary Proxy Execution: Verclsid
PID:2756
-
C:\Users\Admin\Documents\Worship\Worship.pif"C:\Users\Admin\Documents\Worship\Worship.pif" C:\Users\Admin\DOCUME~1\Worship\y1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\Documents\Worship\Worship.pifC:\Users\Admin\Documents\Worship\Worship.pif2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\Documents\iofolko5\VV_22__2DLz8ViM1jrF_R6iL.exeC:\Users\Admin\Documents\iofolko5\VV_22__2DLz8ViM1jrF_R6iL.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1560
-
-
-
C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exeC:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe"C:\Users\Admin\Documents\iofolko5\eruy1u628ynibrJHWsmyxp6E.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1172
-
-
-
-
C:\Users\Admin\Documents\iofolko5\xVgYPV_K4LUHOzKuQoDbXikQ.exeC:\Users\Admin\Documents\iofolko5\xVgYPV_K4LUHOzKuQoDbXikQ.exe3⤵
- Executes dropped EXE
PID:976
-
-
C:\Users\Admin\Documents\iofolko5\JyqIGlqdhrNdXxdhVmHXzcwY.exeC:\Users\Admin\Documents\iofolko5\JyqIGlqdhrNdXxdhVmHXzcwY.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEBGDHJECFC.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Users\AdminEBGDHJECFC.exe"C:\Users\AdminEBGDHJECFC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\AFBKKFBAEGDH" & exit8⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\timeout.exetimeout /t 109⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:584
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAFBGHIDBG.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Users\AdminCAFBGHIDBG.exe"C:\Users\AdminCAFBGHIDBG.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\h2PXVUpO7VPPDpwHJlB_xBgz.exeC:\Users\Admin\Documents\iofolko5\h2PXVUpO7VPPDpwHJlB_xBgz.exe3⤵
- Executes dropped EXE
PID:2024
-
-
C:\Users\Admin\Documents\iofolko5\etZM4gVUuzTcVn5cNb9lQsv7.exeC:\Users\Admin\Documents\iofolko5\etZM4gVUuzTcVn5cNb9lQsv7.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2960
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
-
C:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exeC:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\is-LASPI.tmp\ilV6EjsxgVOJNFHFQBfEzPHa.tmp"C:\Users\Admin\AppData\Local\Temp\is-LASPI.tmp\ilV6EjsxgVOJNFHFQBfEzPHa.tmp" /SL5="$50228,3518631,54272,C:\Users\Admin\Documents\iofolko5\ilV6EjsxgVOJNFHFQBfEzPHa.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:896
-
-
-
C:\Users\Admin\Documents\iofolko5\jq6xYRjzX_hXFXec5SaVIZIM.exeC:\Users\Admin\Documents\iofolko5\jq6xYRjzX_hXFXec5SaVIZIM.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Users\Admin\Documents\iofolko5\OmTpmUm9O4I7wa71Z1lUcWVa.exeC:\Users\Admin\Documents\iofolko5\OmTpmUm9O4I7wa71Z1lUcWVa.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "VIFLJRPW"4⤵
- Launches sc.exe
PID:2888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "VIFLJRPW" binpath= "C:\ProgramData\xprfjygruytr\etzpikspwykg.exe" start= "auto"4⤵
- Launches sc.exe
PID:1072
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "VIFLJRPW"4⤵
- Launches sc.exe
PID:2840
-
-
-
C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exeC:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exeC:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2e348701-bad8-4ce5-88bd-01049c8e5222" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe"C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe"C:\Users\Admin\Documents\iofolko5\cxr20XMewyeALwN4CoQgbAzd.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
-
-
-
-
C:\ProgramData\xprfjygruytr\etzpikspwykg.exeC:\ProgramData\xprfjygruytr\etzpikspwykg.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2516
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Verclsid
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD524b1ff1f8ba8c5e20613a652b7ddcafb
SHA148cb72e8fb1bb1d586ccde26de74154130d2b219
SHA256c45735085c630196f711708160c78f204d8fa3fd36dc7c49cfc039442ae4c9d7
SHA512d277a6a0830dabc5b7d535f3d84c948a70ae3fd9a16948b55ccd69340726390f6346c91098c0a48d8f40cb76a83299fcfccf92b59675f36692b8537bbd720c8c
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5aaa5656ebde7fc2d9987fb2d30a3411b
SHA17ce08cb33f17e42f1ea3a1e5c36c00e29313e7a7
SHA25678014e8477aa9c0973e84a7ae12098071f58492c479b117557c128667206e88c
SHA512b98a6f3fabdaca1f2129be8ea6a4df83e5b5a5228e53b2b846ddf8bf42df113559db90c8a5be7b05a1cd166f309b561c83edba8d7b5ddd367518a487679b9c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b4da8ae7cd3a69f847e5c45bea7a1b
SHA1b8620a8257078e0ee6b495485edcae3861ed3e4c
SHA2565ed078547bde6344eedccc14798d86c2e37c846dcadcbf206f8f22159fe04bb9
SHA5123de840c81f8f873a00bc18c2735226a5713dca0ad784e0b534e1fb6c36c00bc7b3eca73d52571333d2453203d810f1bc92531c2a9c7b8298cb69d9112056587f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9dec15dfbc0665b36c7e4b3ad9568b
SHA161cb4655163305064b8291ed9a75daa7ea2fd807
SHA2569c09b541860b4b24527945913a9abbeb0f4fa7ac351a1db9132d7b3ff561c4aa
SHA512578b1a0c25c4cbef58cb31d9a4e99c40673433b1709fb9d8961a0db0a673e42fff591414aa083e1ff885e6db71c78bdc5afd523f6244966a6a115a672e8bc7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752ca4da5e54ec39a658b9097897635f
SHA1fafc0762bdddfe862acef7c3b6de17a242813132
SHA2566e27bb5f036a7e5c3499164e4f6f6e51adada013f049a469e28828bcd54c406d
SHA512e5f658cb0c26b649d32a318598de2c9fa0927f9c6f32da13dafb17e42b75ee07cd3e0581694c52de5926a4cc54311aef0da58a160c17351c8c6b7a3c79c45b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6367443401adba8d66f0370a687b594
SHA1fab4f9cc7815be5a700a49285aadc70b0bf1a8a8
SHA25627eb51f1e22b34c5f455d7d1fb76d656558708845a47a69c52fa606853acc282
SHA512d86bc42968cc1a351317ac29638267854d06a0648269e5339665617b4c93261fcad1fe0adb39cd72e0f68ed943b5be59782f5c8264bbeba8fc9e4d9652a844e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5597fc57b8e02218b1471e7f63c54d12f
SHA16dcc7ad714752deafa3e11e39bc829839d713853
SHA2564337d5fc263a5915da5f22b35564f6b25f9a47f740908fbbd7a256111edba5a6
SHA512b1de0ab069452bf953daefad3e28a775546acb7bd769dccb19cdb47f0ebe85263fc373f0f984ede6e8718b77f36142be01d569839178f8aabe88129ae157afbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
680KB
MD556c6aeb0a4efc6f2312f8337fdb77d10
SHA128d9890a37b96c119fe2eeb3c5f48103e7468738
SHA2567fc4e6672e1aa983e1ed885f71bc3710309b5e5d487184434945cfd2fd763dd2
SHA512f2e2d3f84327717a7cfd143bc0a23fe304d59deeb250eee07b5fc861fab26af3a5fc7a5058ec9a3d0d446e661b101655e6532cf4898f8af1f15ac0d0998cad00
-
Filesize
206KB
MD5ab68db6a238464a75b669938a3512ae1
SHA148a7e2ed179d29d783d55fe610598474825bdf95
SHA25686bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5
SHA512b811a8f5d3d2fab469a97a9a0d59d6b132b4fecbc7048dd203d25c938e7047b487e9a85799f8d9b04c0e01f307f3ff1bd0c3af967a8813c3ab0d72c69650364c
-
Filesize
10.4MB
MD5025ebe0a476fe1a27749e6da0eea724f
SHA1fe844380280463b927b9368f9eace55eb97baab7
SHA2562a51d50f42494c6ab6027dbd35f8861bdd6fe1551f5fb30bf10138619f4bc4b2
SHA5125f2b40713cc4c54098da46f390bbeb0ac2fc0c0872c7fbdfdca26ab087c81ff0144b89347040cc93e35b5e5dd5dc102db28737baea616183bef4caecebfb9799
-
Filesize
313KB
MD58e0ae87939388dfd7d6470bdd397b309
SHA13af328c5c81fe77ab5d74cc97866e03490e5d080
SHA2565ed77020f0296739fb5b4ef5133bbdd84a0c8f69ac71cec490343b26dd066c4d
SHA512d3cfb86296b49744ac9a89b6a4a402e44a3d65c137a4a1f814c698001a2c609f0c7ce9fadd483511f6ec43811a5f81bd145dd1899be728ed3d7a9b3e0bf9a756
-
Filesize
812KB
MD57972b08246e568495d9d116fc2d0b159
SHA13e12225494f08369858453fd9fc7481b4f788165
SHA2562a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84
SHA512f0ead246f31d1badb3cd5fd67cb5b3081f027fdad44dd50364734d61722f1bc2cacb1ad5d842ca3f7000a2699e7bdf059a508b54a95f5e155ae274d70e833ff7
-
Filesize
2.9MB
MD5d4ac1a0d0504ab9a127defa511df833e
SHA19254864b6917eba6d4d4616ac2564f192626668b
SHA256a29c9ebecbe58f11b98fa8f685619e46bbe0a73ca7f770a71a14051aa0bd9848
SHA51259b707d1c4f3c66337ec2f913de4b3506786a31108fc621bdbe7201490e91b0f7b70505763f71d53eee0eaacf477dc6ef9cd50769881654daf1b678eaaf994c5
-
Filesize
282KB
MD59d1e5520a634731ed9747be9e9af7c5d
SHA16bc547c7e26073f71be0017e29c8702ddea2fc11
SHA25690c0395f668f198d1aed010aaabbdab7c7f78b5a8c90072f4a2225683ebaac36
SHA5123cc597e4b451252361707740fe58ea18ff8734a9adad48458760518d1828beb55bd0ddb080daf7c1a29cda462b7cabab3c3829fc5c811b1d3069a5d507b7cbaa
-
Filesize
215KB
MD5f88b5bbdd03e0467d18e6f436ab2683c
SHA1dd9300fc17bfd44c08e5995ebc772a6d3d32170d
SHA256507c4f043a45ee6897ef1ceedbc1df125afd88c5a850a61b8a62d2d3a81a8d21
SHA512c7c0cf8f07d916af26f797dce7ddc9b501265ce61d356753b37c377e8e796ee3e0798923da6013ac29c3f90ae0db1b7483eff911364b0ff0ee946a612c738590
-
Filesize
3.6MB
MD52dd856fd610de4ef190dc02bce097b73
SHA1fceaa9f208ec87b296cb0989988d98ccee206c14
SHA2569764001c0b991b432e236f3dcd4bce60c92505decc02939b8096bbcbe6f43958
SHA512ddd87d9012d4a9c59307f7b88cd6d2ec787d2977f4f9ec397a93b571d5a2efe5c8837dbbe51e23385f75c8ecf868f912c214a2c600497f266ec4b382ab7070c5
-
Filesize
516KB
MD5d8ecb462d3046a0ee172551c5d505c8e
SHA154f9e16b497579964e9afc90c3c0c208f16b4418
SHA256afb9edbf499a4726d798cda9f0f372b4b1019033b68d5eb87a8a83ecb7463d6f
SHA5129eed44c24a71b44e90efc853b75d2103faa3f8518e1efad45c8c4733ee0396c51e8ea11ba6e7d2ac4f30234e6380c3325227cced8d1753373581eb45073c012e
-
Filesize
271KB
MD58cb57865f3a9a465a2b06c7cfad880d8
SHA127ec8d1902fbbf1035a60d2d58436f759e02f50f
SHA2564cbe05e05abdc4e781d990fe7addeae545ee9b598ea5620a8b2f8de4a2d1e3dc
SHA5126832766a41f8bbde588d9d55c250c3090646b11d5cad45fcb5c22e37a29d424e8680657064b4ebbfa250f4fef50118496451c6ce819db0ecda7f21f723df4bc8
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3