Resubmissions
03-11-2024 11:03
241103-m5srbs1qfs 503-09-2024 16:16
240903-tqvqpssbrg 1003-09-2024 15:55
240903-tdaj1a1anq 6Analysis
-
max time kernel
264s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20240903-es -
resource tags
arch:x64arch:x86image:win7-20240903-eslocale:es-esos:windows7-x64systemwindows -
submitted
03-09-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
FileApp.exe
Resource
win7-20240903-es
Behavioral task
behavioral2
Sample
FileApp.exe
Resource
win10-20240611-es
Behavioral task
behavioral3
Sample
FileApp.exe
Resource
win10v2004-20240802-es
General
-
Target
FileApp.exe
-
Size
739.0MB
-
MD5
a6f1c5f8ff75ca1e78f55e1a05b44b39
-
SHA1
b3a15feeee3c80425027f0f19901a8475f64f014
-
SHA256
7357bdbe52a049e175f5005711fde9fbddde36ad6419006f0c3cf13ed1cb70e3
-
SHA512
a3503a34bee2e531e7d0175a5dc99d7d2a652bbb53d91a9ac6534cbffe1d907f04384ddc48c2bd16e77435d8b0b97118145f3d2e7c9512f2005c9ae900814c68
-
SSDEEP
98304:GMzgISSXaYGFQime2hKRculpYX8GRlwc2h00SQDFaFue:G4SGaRFb3TlpYlwcODFaI
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
147.45.47.36:30035
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/984-221-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/984-220-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/984-219-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/984-216-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/984-214-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
2f3BA_tHgJQpmVn28JifnF08.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f3BA_tHgJQpmVn28JifnF08.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 2800 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\jzlukfpb\ImagePath = "C:\\Windows\\SysWOW64\\jzlukfpb\\nlvwyuxd.exe" svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2f3BA_tHgJQpmVn28JifnF08.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f3BA_tHgJQpmVn28JifnF08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f3BA_tHgJQpmVn28JifnF08.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RegAsm.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 21 IoCs
Processes:
cl72WfKJXpWJZQ8APmUcRgLS.exe_b2DzgFESmNupBrOZqH1QyWa.exeOEWHsjMugMHVUSe6mwjehoSC.exed_LqOyosQVBLJULcMwoiDt6h.exe2f3BA_tHgJQpmVn28JifnF08.exejHfb4pfbrQoklLLfzCz3zu3K.exeMlIQrhcIhmVCbQDsrEQn6hL4.exeIZjZPH9oO9A8PQeCS5PMUuAP.exefl74_lG80XXMpKMOvaIGLvSG.exemrfH53W_UOps4E2YW2zcAy43.exeOEWHsjMugMHVUSe6mwjehoSC.tmpfl74_lG80XXMpKMOvaIGLvSG.exefl74_lG80XXMpKMOvaIGLvSG.exefl74_lG80XXMpKMOvaIGLvSG.exefl74_lG80XXMpKMOvaIGLvSG.exefl74_lG80XXMpKMOvaIGLvSG.exejHfb4pfbrQoklLLfzCz3zu3K.exejHfb4pfbrQoklLLfzCz3zu3K.exejHfb4pfbrQoklLLfzCz3zu3K.exenlvwyuxd.exeAdminCAEHDBAAEC.exepid Process 2368 cl72WfKJXpWJZQ8APmUcRgLS.exe 2772 _b2DzgFESmNupBrOZqH1QyWa.exe 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 2880 d_LqOyosQVBLJULcMwoiDt6h.exe 2676 2f3BA_tHgJQpmVn28JifnF08.exe 2768 jHfb4pfbrQoklLLfzCz3zu3K.exe 2188 MlIQrhcIhmVCbQDsrEQn6hL4.exe 2796 IZjZPH9oO9A8PQeCS5PMUuAP.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1724 mrfH53W_UOps4E2YW2zcAy43.exe 2648 OEWHsjMugMHVUSe6mwjehoSC.tmp 2984 fl74_lG80XXMpKMOvaIGLvSG.exe 708 fl74_lG80XXMpKMOvaIGLvSG.exe 1504 fl74_lG80XXMpKMOvaIGLvSG.exe 612 fl74_lG80XXMpKMOvaIGLvSG.exe 2328 fl74_lG80XXMpKMOvaIGLvSG.exe 1848 jHfb4pfbrQoklLLfzCz3zu3K.exe 2640 jHfb4pfbrQoklLLfzCz3zu3K.exe 2908 jHfb4pfbrQoklLLfzCz3zu3K.exe 1820 nlvwyuxd.exe 1944 AdminCAEHDBAAEC.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
2f3BA_tHgJQpmVn28JifnF08.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 2f3BA_tHgJQpmVn28JifnF08.exe -
Loads dropped DLL 24 IoCs
Processes:
RegAsm.exeOEWHsjMugMHVUSe6mwjehoSC.exeOEWHsjMugMHVUSe6mwjehoSC.tmpjHfb4pfbrQoklLLfzCz3zu3K.exeRegAsm.exeRegAsm.execmd.exepid Process 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2640 RegAsm.exe 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 2648 OEWHsjMugMHVUSe6mwjehoSC.tmp 2648 OEWHsjMugMHVUSe6mwjehoSC.tmp 2648 OEWHsjMugMHVUSe6mwjehoSC.tmp 1848 jHfb4pfbrQoklLLfzCz3zu3K.exe 848 RegAsm.exe 848 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1340 cmd.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
jHfb4pfbrQoklLLfzCz3zu3K.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\22726f0b-26f7-4321-b2cc-27745ea16ef3\\jHfb4pfbrQoklLLfzCz3zu3K.exe\" --AutoStart" jHfb4pfbrQoklLLfzCz3zu3K.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 api.myip.com 51 api.2ip.ua 3 api64.ipify.org 4 api64.ipify.org 6 ipinfo.io 7 ipinfo.io 11 api.myip.com 50 api.2ip.ua 56 api.2ip.ua -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid Process 1280 powercfg.exe 624 powercfg.exe 2896 powercfg.exe 2500 powercfg.exe 2484 powercfg.exe 1916 powercfg.exe 2264 powercfg.exe 1732 powercfg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
2f3BA_tHgJQpmVn28JifnF08.exepid Process 2676 2f3BA_tHgJQpmVn28JifnF08.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
FileApp.exe_b2DzgFESmNupBrOZqH1QyWa.execl72WfKJXpWJZQ8APmUcRgLS.exed_LqOyosQVBLJULcMwoiDt6h.exemrfH53W_UOps4E2YW2zcAy43.exejHfb4pfbrQoklLLfzCz3zu3K.exejHfb4pfbrQoklLLfzCz3zu3K.exenlvwyuxd.exeAdminCAEHDBAAEC.exedescription pid Process procid_target PID 2476 set thread context of 2640 2476 FileApp.exe 30 PID 2772 set thread context of 984 2772 _b2DzgFESmNupBrOZqH1QyWa.exe 48 PID 2368 set thread context of 1204 2368 cl72WfKJXpWJZQ8APmUcRgLS.exe 49 PID 2880 set thread context of 848 2880 d_LqOyosQVBLJULcMwoiDt6h.exe 51 PID 1724 set thread context of 2972 1724 mrfH53W_UOps4E2YW2zcAy43.exe 54 PID 2768 set thread context of 1848 2768 jHfb4pfbrQoklLLfzCz3zu3K.exe 60 PID 2640 set thread context of 2908 2640 jHfb4pfbrQoklLLfzCz3zu3K.exe 70 PID 1820 set thread context of 688 1820 nlvwyuxd.exe 78 PID 1944 set thread context of 2700 1944 AdminCAEHDBAAEC.exe 86 -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2740 sc.exe 1724 sc.exe 1144 sc.exe 2044 sc.exe 1972 sc.exe 2420 sc.exe 592 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RegAsm.exeOEWHsjMugMHVUSe6mwjehoSC.exeRegAsm.exefl74_lG80XXMpKMOvaIGLvSG.execmd.exejHfb4pfbrQoklLLfzCz3zu3K.exesc.execl72WfKJXpWJZQ8APmUcRgLS.exemrfH53W_UOps4E2YW2zcAy43.exejHfb4pfbrQoklLLfzCz3zu3K.exeIZjZPH9oO9A8PQeCS5PMUuAP.exeRegAsm.execmd.exejHfb4pfbrQoklLLfzCz3zu3K.execmd.exeAdminCAEHDBAAEC.exeRegAsm.exesc.exesc.exenlvwyuxd.exeFileApp.exeRegAsm.exesvchost.exeRegAsm.exe_b2DzgFESmNupBrOZqH1QyWa.exeicacls.exenetsh.exe2f3BA_tHgJQpmVn28JifnF08.exeOEWHsjMugMHVUSe6mwjehoSC.tmpd_LqOyosQVBLJULcMwoiDt6h.exejHfb4pfbrQoklLLfzCz3zu3K.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OEWHsjMugMHVUSe6mwjehoSC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fl74_lG80XXMpKMOvaIGLvSG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jHfb4pfbrQoklLLfzCz3zu3K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cl72WfKJXpWJZQ8APmUcRgLS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mrfH53W_UOps4E2YW2zcAy43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jHfb4pfbrQoklLLfzCz3zu3K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IZjZPH9oO9A8PQeCS5PMUuAP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jHfb4pfbrQoklLLfzCz3zu3K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminCAEHDBAAEC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlvwyuxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileApp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _b2DzgFESmNupBrOZqH1QyWa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f3BA_tHgJQpmVn28JifnF08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OEWHsjMugMHVUSe6mwjehoSC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d_LqOyosQVBLJULcMwoiDt6h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jHfb4pfbrQoklLLfzCz3zu3K.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exeRegAsm.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Processes:
jHfb4pfbrQoklLLfzCz3zu3K.exeRegAsm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 jHfb4pfbrQoklLLfzCz3zu3K.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 jHfb4pfbrQoklLLfzCz3zu3K.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 jHfb4pfbrQoklLLfzCz3zu3K.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 190000000100000010000000dbd91ea86008fd8536f2b37529666c7b0f000000010000002000000020d814fd5fc477ce74425e441d8f5b48d38db6f1dd119441bc35777689bd094c030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b0640200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e003000000000000b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079000000140000000100000014000000f352eacf816860c1097c4b852f4332dd93eb5d4f20000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 jHfb4pfbrQoklLLfzCz3zu3K.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
Processes:
2f3BA_tHgJQpmVn28JifnF08.exeMlIQrhcIhmVCbQDsrEQn6hL4.exeRegAsm.exefl74_lG80XXMpKMOvaIGLvSG.exeRegAsm.exejHfb4pfbrQoklLLfzCz3zu3K.exejHfb4pfbrQoklLLfzCz3zu3K.exeRegAsm.exepid Process 2676 2f3BA_tHgJQpmVn28JifnF08.exe 2188 MlIQrhcIhmVCbQDsrEQn6hL4.exe 1204 RegAsm.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 1188 fl74_lG80XXMpKMOvaIGLvSG.exe 848 RegAsm.exe 1848 jHfb4pfbrQoklLLfzCz3zu3K.exe 1848 jHfb4pfbrQoklLLfzCz3zu3K.exe 1204 RegAsm.exe 2908 jHfb4pfbrQoklLLfzCz3zu3K.exe 2908 jHfb4pfbrQoklLLfzCz3zu3K.exe 2972 RegAsm.exe 848 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe 1204 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
fl74_lG80XXMpKMOvaIGLvSG.exeRegAsm.exedescription pid Process Token: SeDebugPrivilege 1188 fl74_lG80XXMpKMOvaIGLvSG.exe Token: SeDebugPrivilege 2972 RegAsm.exe Token: SeBackupPrivilege 2972 RegAsm.exe Token: SeSecurityPrivilege 2972 RegAsm.exe Token: SeSecurityPrivilege 2972 RegAsm.exe Token: SeSecurityPrivilege 2972 RegAsm.exe Token: SeSecurityPrivilege 2972 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
FileApp.exeRegAsm.exeOEWHsjMugMHVUSe6mwjehoSC.exedescription pid Process procid_target PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2476 wrote to memory of 2640 2476 FileApp.exe 30 PID 2640 wrote to memory of 2368 2640 RegAsm.exe 33 PID 2640 wrote to memory of 2368 2640 RegAsm.exe 33 PID 2640 wrote to memory of 2368 2640 RegAsm.exe 33 PID 2640 wrote to memory of 2368 2640 RegAsm.exe 33 PID 2640 wrote to memory of 2772 2640 RegAsm.exe 35 PID 2640 wrote to memory of 2772 2640 RegAsm.exe 35 PID 2640 wrote to memory of 2772 2640 RegAsm.exe 35 PID 2640 wrote to memory of 2772 2640 RegAsm.exe 35 PID 2640 wrote to memory of 2880 2640 RegAsm.exe 37 PID 2640 wrote to memory of 2880 2640 RegAsm.exe 37 PID 2640 wrote to memory of 2880 2640 RegAsm.exe 37 PID 2640 wrote to memory of 2880 2640 RegAsm.exe 37 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2744 2640 RegAsm.exe 38 PID 2640 wrote to memory of 2768 2640 RegAsm.exe 39 PID 2640 wrote to memory of 2768 2640 RegAsm.exe 39 PID 2640 wrote to memory of 2768 2640 RegAsm.exe 39 PID 2640 wrote to memory of 2768 2640 RegAsm.exe 39 PID 2640 wrote to memory of 2676 2640 RegAsm.exe 40 PID 2640 wrote to memory of 2676 2640 RegAsm.exe 40 PID 2640 wrote to memory of 2676 2640 RegAsm.exe 40 PID 2640 wrote to memory of 2676 2640 RegAsm.exe 40 PID 2640 wrote to memory of 2796 2640 RegAsm.exe 41 PID 2640 wrote to memory of 2796 2640 RegAsm.exe 41 PID 2640 wrote to memory of 2796 2640 RegAsm.exe 41 PID 2640 wrote to memory of 2796 2640 RegAsm.exe 41 PID 2640 wrote to memory of 2188 2640 RegAsm.exe 42 PID 2640 wrote to memory of 2188 2640 RegAsm.exe 42 PID 2640 wrote to memory of 2188 2640 RegAsm.exe 42 PID 2640 wrote to memory of 2188 2640 RegAsm.exe 42 PID 2640 wrote to memory of 1188 2640 RegAsm.exe 43 PID 2640 wrote to memory of 1188 2640 RegAsm.exe 43 PID 2640 wrote to memory of 1188 2640 RegAsm.exe 43 PID 2640 wrote to memory of 1188 2640 RegAsm.exe 43 PID 2640 wrote to memory of 1724 2640 RegAsm.exe 45 PID 2640 wrote to memory of 1724 2640 RegAsm.exe 45 PID 2640 wrote to memory of 1724 2640 RegAsm.exe 45 PID 2640 wrote to memory of 1724 2640 RegAsm.exe 45 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47 PID 2744 wrote to memory of 2648 2744 OEWHsjMugMHVUSe6mwjehoSC.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\FileApp.exe"C:\Users\Admin\AppData\Local\Temp\FileApp.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\Documents\iofolko5\cl72WfKJXpWJZQ8APmUcRgLS.exeC:\Users\Admin\Documents\iofolko5\cl72WfKJXpWJZQ8APmUcRgLS.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
-
C:\Users\Admin\Documents\iofolko5\_b2DzgFESmNupBrOZqH1QyWa.exeC:\Users\Admin\Documents\iofolko5\_b2DzgFESmNupBrOZqH1QyWa.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:984
-
-
-
C:\Users\Admin\Documents\iofolko5\d_LqOyosQVBLJULcMwoiDt6h.exeC:\Users\Admin\Documents\iofolko5\d_LqOyosQVBLJULcMwoiDt6h.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAEHDBAAEC.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Users\AdminCAEHDBAAEC.exe"C:\Users\AdminCAEHDBAAEC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDBFCBGCGIJ.exe"5⤵PID:2528
-
C:\Users\AdminDBFCBGCGIJ.exe"C:\Users\AdminDBFCBGCGIJ.exe"6⤵PID:2504
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2044
-
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\OEWHsjMugMHVUSe6mwjehoSC.exeC:\Users\Admin\Documents\iofolko5\OEWHsjMugMHVUSe6mwjehoSC.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\is-C38AM.tmp\OEWHsjMugMHVUSe6mwjehoSC.tmp"C:\Users\Admin\AppData\Local\Temp\is-C38AM.tmp\OEWHsjMugMHVUSe6mwjehoSC.tmp" /SL5="$7011C,3332875,54272,C:\Users\Admin\Documents\iofolko5\OEWHsjMugMHVUSe6mwjehoSC.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exeC:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exeC:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\22726f0b-26f7-4321-b2cc-27745ea16ef3" /deny *S-1-1-0:(OI)(CI)(DE,DC)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exe"C:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exe"C:\Users\Admin\Documents\iofolko5\jHfb4pfbrQoklLLfzCz3zu3K.exe" --Admin IsNotAutoStart IsNotTask6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
-
-
-
C:\Users\Admin\Documents\iofolko5\2f3BA_tHgJQpmVn28JifnF08.exeC:\Users\Admin\Documents\iofolko5\2f3BA_tHgJQpmVn28JifnF08.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Users\Admin\Documents\iofolko5\IZjZPH9oO9A8PQeCS5PMUuAP.exeC:\Users\Admin\Documents\iofolko5\IZjZPH9oO9A8PQeCS5PMUuAP.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jzlukfpb\4⤵
- System Location Discovery: System Language Discovery
PID:372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nlvwyuxd.exe" C:\Windows\SysWOW64\jzlukfpb\4⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jzlukfpb binPath= "C:\Windows\SysWOW64\jzlukfpb\nlvwyuxd.exe /d\"C:\Users\Admin\Documents\iofolko5\IZjZPH9oO9A8PQeCS5PMUuAP.exe\"" type= own start= auto DisplayName= "wifi support"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1144
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jzlukfpb "wifi internet conection"4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jzlukfpb4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Users\Admin\Documents\iofolko5\MlIQrhcIhmVCbQDsrEQn6hL4.exeC:\Users\Admin\Documents\iofolko5\MlIQrhcIhmVCbQDsrEQn6hL4.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:624
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:1280
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:1732
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:2264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "VIFLJRPW"4⤵
- Launches sc.exe
PID:2420
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "VIFLJRPW" binpath= "C:\ProgramData\xprfjygruytr\etzpikspwykg.exe" start= "auto"4⤵
- Launches sc.exe
PID:592
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:1724
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "VIFLJRPW"4⤵
- Launches sc.exe
PID:2740
-
-
-
C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exeC:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"4⤵
- Executes dropped EXE
PID:2984
-
-
C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"4⤵
- Executes dropped EXE
PID:708
-
-
C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"4⤵
- Executes dropped EXE
PID:1504
-
-
C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"4⤵
- Executes dropped EXE
PID:612
-
-
C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"C:\Users\Admin\Documents\iofolko5\fl74_lG80XXMpKMOvaIGLvSG.exe"4⤵
- Executes dropped EXE
PID:2328
-
-
-
C:\Users\Admin\Documents\iofolko5\mrfH53W_UOps4E2YW2zcAy43.exeC:\Users\Admin\Documents\iofolko5\mrfH53W_UOps4E2YW2zcAy43.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
-
C:\Windows\SysWOW64\jzlukfpb\nlvwyuxd.exeC:\Windows\SysWOW64\jzlukfpb\nlvwyuxd.exe /d"C:\Users\Admin\Documents\iofolko5\IZjZPH9oO9A8PQeCS5PMUuAP.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
PID:688
-
-
C:\ProgramData\xprfjygruytr\etzpikspwykg.exeC:\ProgramData\xprfjygruytr\etzpikspwykg.exe1⤵PID:612
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:1916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:2484
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:2500
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:2896
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2900
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cd7a684788f438d7a7ae3946df2e26f
SHA13e5a60f38395f3c10d9243ba696468d2bb698a14
SHA2562ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d
SHA5120fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1
-
Filesize
6KB
MD5267d46a0d5fc4c0fbe1ac157d62955c3
SHA18b5e6f3a399e18c27dd84fafa2d0ad1f6e0c55b0
SHA2564fec4b334e7835087b88c216478e031aca0e2d70ead95c0f7a7037eaa5594eed
SHA5120cd1accf3970e5f509a08342aafb886cdec3a867d11e0d4770b69b765a70da02e5ee6691247e4cc734ac0de9738a7cf51a0bb9112e80e9e8cd45da7e7431c0f2
-
Filesize
669KB
MD5550686c0ee48c386dfcb40199bd076ac
SHA1ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA5120b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5dd776116027bf05105d0b67762a4b1fd
SHA183ba015fca8305a4850fc92d1e510e13451c8176
SHA256cce25db7c21eecfaf30081e72c913ffb4e116a0a3ee7e98b95bea365131cd94f
SHA51282a5b72f659429413e8b2c85909703d6ed1c589da00eb19db9ede116cd65a83dfd1e6fb11462e79c3bd11fe5a626e8d2c3f074384fec296fe6d21e78f6e2a1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD50c7ab8bca7a846177c305f8a839ae6be
SHA15d331608f4879f0c31b75b39a846303e8b2ca9bf
SHA2565c0ef93db3944a4d8b7e47a76681345c8e0baf793e1c698f897902188d5ae820
SHA512c496bbb6b4bd23afd440cc58079f8eb92ec61d0979452f217910a3965f20498c421306abc5923cd4363f521dc6fbab16d07ea7050ab2f784b6c6024b93b10fb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
680KB
MD5fcb9a039e355dca5927a620396662e9d
SHA1ebd8951e470635332cbf43afaf277e6eeaa1aaaf
SHA2567e94a78d2279d7b9760b5c720c4cab64cfe4384ec6ea6f4e39e1a65609890976
SHA512653b0fe17c4074a3c5e8058873b4a2ce7dcb2738f6f2e28dd00ca089214a8554b3782a1f152288cef96dd4027bf31b1d5672a906ccc21e4ceae14a43fa4d020d
-
Filesize
11.9MB
MD557a370a3c9d8153daaf354c2a93e807f
SHA1725692cc0351419495c2795b99e1a94c94299361
SHA2562630ac035e1ff15ff73702b3bf372cfc5af2eae5b5c2b833f076df98cb6ab4a4
SHA512f6e54d2dc29a40d2ba5c8d789e083f824c10acdc5be271bc054627dbfe786f73bc553a53481c427c515acef9a665d257e83a7040811231939db999b78b9ca93c
-
Filesize
1.7MB
MD55bf21229b0e8c6361a56f0aec0121cc4
SHA1a46472a1168dad39660f923bb25dc333d24cd2cb
SHA256249001bdb6015ef538d4654e6f5c5a1522b7382987ec926d062578ae973f8a71
SHA5125de8222c9ae3a6f89a368722cb226f1f82d4b290831c44d3ab84f0d21a3d9432c4dfa126ec53501d0f49227d27c911cd4fe89361d13951117b06897cc52baf0f
-
Filesize
423KB
MD5b2e864c2f8f6e243822a5c133bb41061
SHA15571df4cdc5b65cdc315c95ee52344dda7f12b20
SHA2562cccbfbe95b716e6f8b5ed1634b9ae4e6ab87e1355804ca5aea8d353673ff6a2
SHA51232a6087702abe92daab3e2c194b07006f5b9d3cdf48c692d23775f0d75e2941882920767148564ac7fedc417beadb1ae75734f240d07bec30eb262ae4f534e73
-
Filesize
10.4MB
MD5025ebe0a476fe1a27749e6da0eea724f
SHA1fe844380280463b927b9368f9eace55eb97baab7
SHA2562a51d50f42494c6ab6027dbd35f8861bdd6fe1551f5fb30bf10138619f4bc4b2
SHA5125f2b40713cc4c54098da46f390bbeb0ac2fc0c0872c7fbdfdca26ab087c81ff0144b89347040cc93e35b5e5dd5dc102db28737baea616183bef4caecebfb9799
-
Filesize
3.4MB
MD57a2ac5711382c571a1adc3f296cf10dd
SHA1101ea008e9556045ca374e7304680e164bcbeda8
SHA2565ee907cd468e9d572557e7b8326cd1c577edb733117fa47949fde2989d32144f
SHA5127d7a710b66dc015428e230182761094aa16cd5e48f459aa6e1a64bcdefbbcf5a37118a04bd79ba81f97b69ec8d0c75c9ba5cf8ed2cbae7389fdfb02dd28907a6
-
Filesize
313KB
MD56b19e5c100db0812ffb7813a1503c05d
SHA117032c0b1b056bec3f23786bad5aa17404de3297
SHA256516b1a67a3aafceadff083854b26512174cbed4d455c5d8f8993acc8a895ea2e
SHA512fb97bd74aae13cb4d0205cf704300dfc4f0678dcbd07aacc295bc13b666a4bff46f12786c2d37702a7a783e786a6a92df31df37a39ebcaee74d46c58e0c4e27c
-
Filesize
283KB
MD56f99968cc27d2d6a07a921ab703a5d5d
SHA11b1f72a9ca325b2d7b01f66ae1ebef646b167ec0
SHA2565ef282479f0c6f082f15d3f878f8c4b418259ebc6d7941a472e0f28cdcc43c88
SHA5123ea9cbbb6ab281c02aef8473f40ec00412a05b613d4a45e228e06f4a585ae25ba35dc2eb2a772cf9ab38e86a05b67a4388b4ef306483ef030666d1c242ba370a
-
Filesize
206KB
MD5998f7fb6068e4377618bcdb2138bc6f0
SHA12339b59c00bbe3707926a0f4a5964b5e76d18d57
SHA25615a0da7dfccb96d1a46f5eef42ceaa7fcb49da5c88e32fc78921d6a9b20f12be
SHA512d0896f66aa2422c467daa57612afdf4dffaca1b788ee4f34ecf6f15225aafe879142e9d3bac4db584bcfe9bb8ad47a32c26c9ea0dc7e04370251eac64d4bc9d6
-
Filesize
8.3MB
MD5b5887a19fe50bfa32b524aaad0a453bc
SHA1cd1f3905959cd596c83730a5b03ceef4e9f2a877
SHA256fce5cbeec1eb5274fc3afa55e57fb2f724688cb9d4661a8a86716011493564c7
SHA5125b9914c94101b53314b14335e687552e5da0a4085afb826ae94f45769e9b1e66a35624b6e6b60257514f4adf2acc5c9e048bfa3a24aafb891d203e3011c02538
-
Filesize
812KB
MD57972b08246e568495d9d116fc2d0b159
SHA13e12225494f08369858453fd9fc7481b4f788165
SHA2562a6c90c8db27e6ac04c7e339dfe4b3c2d47a292bcf6fc1c5b4e0ae62fc81ff84
SHA512f0ead246f31d1badb3cd5fd67cb5b3081f027fdad44dd50364734d61722f1bc2cacb1ad5d842ca3f7000a2699e7bdf059a508b54a95f5e155ae274d70e833ff7
-
Filesize
516KB
MD5d8ecb462d3046a0ee172551c5d505c8e
SHA154f9e16b497579964e9afc90c3c0c208f16b4418
SHA256afb9edbf499a4726d798cda9f0f372b4b1019033b68d5eb87a8a83ecb7463d6f
SHA5129eed44c24a71b44e90efc853b75d2103faa3f8518e1efad45c8c4733ee0396c51e8ea11ba6e7d2ac4f30234e6380c3325227cced8d1753373581eb45073c012e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3