Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
708610982c93031b1f8666a8bdf496f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
708610982c93031b1f8666a8bdf496f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
708610982c93031b1f8666a8bdf496f0N.exe
-
Size
6.0MB
-
MD5
708610982c93031b1f8666a8bdf496f0
-
SHA1
f4e36e0624ba714fcd2c0a67f8e621f73fc3e1bd
-
SHA256
337f970e714e24afe4f69ce24776f97f013631193b2bc9b515e570586c7a9bf4
-
SHA512
86a9b195089243d3380a7f2817075b8839f8aca4e343fdd2d4879aee7e954e36dd6c95e5193f6a4bd2f7498d5333785619850e6769a79452ef7eaee0b5e8368a
-
SSDEEP
98304:ZyKgr4HtnobS4p4n/h9w8/ZMiGdFqN6r0WTUeauZ1goGJR9JtCr:ZIrME4/h9HZMiGbrMeauZ1goGJPs
Malware Config
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234de-190.dat family_fabookie -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/files/0x000a0000000234f1-128.dat Nirsoft behavioral2/memory/4100-203-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/1632-214-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 708610982c93031b1f8666a8bdf496f0N.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 12 IoCs
pid Process 2192 Installer.exe 376 Setup.exe 2532 80EBA4EA58D40136.exe 4060 80EBA4EA58D40136.exe 4924 file.exe 5100 1725754243473.exe 4752 BTRSetp.exe 452 gdrrr.exe 4100 jfiag3g_gg.exe 1632 jfiag3g_gg.exe 312 1725754267441.exe 1500 ThunderFW.exe -
Loads dropped DLL 1 IoCs
pid Process 4252 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00080000000234dc-198.dat upx behavioral2/memory/4100-199-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4100-203-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/files/0x0008000000023524-207.dat upx behavioral2/memory/1632-208-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/1632-214-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gdrrr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 80EBA4EA58D40136.exe -
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mmfngadcomiickibopmdllneekdclfma\1.0.0.0_0\manifest.json 80EBA4EA58D40136.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 46 iplogger.org 47 iplogger.org 60 iplogger.org 62 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 63 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 80EBA4EA58D40136.exe File opened for modification \??\PhysicalDrive0 80EBA4EA58D40136.exe File opened for modification \??\PhysicalDrive0 Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 376 Setup.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2532 set thread context of 5060 2532 80EBA4EA58D40136.exe 108 PID 2532 set thread context of 2628 2532 80EBA4EA58D40136.exe 122 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag3g_gg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfiag3g_gg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1725754243473.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80EBA4EA58D40136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1725754267441.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ThunderFW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 708610982c93031b1f8666a8bdf496f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80EBA4EA58D40136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3980 cmd.exe 2372 PING.EXE 4136 cmd.exe 3952 PING.EXE 4340 cmd.exe 4864 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName 80EBA4EA58D40136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName 80EBA4EA58D40136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName 80EBA4EA58D40136.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 80EBA4EA58D40136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 80EBA4EA58D40136.exe -
Kills process with taskkill 1 IoCs
pid Process 4968 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4864 PING.EXE 2372 PING.EXE 3952 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5100 1725754243473.exe 5100 1725754243473.exe 1632 jfiag3g_gg.exe 1632 jfiag3g_gg.exe 312 1725754267441.exe 312 1725754267441.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3476 msiexec.exe Token: SeIncreaseQuotaPrivilege 3476 msiexec.exe Token: SeSecurityPrivilege 3172 msiexec.exe Token: SeCreateTokenPrivilege 3476 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3476 msiexec.exe Token: SeLockMemoryPrivilege 3476 msiexec.exe Token: SeIncreaseQuotaPrivilege 3476 msiexec.exe Token: SeMachineAccountPrivilege 3476 msiexec.exe Token: SeTcbPrivilege 3476 msiexec.exe Token: SeSecurityPrivilege 3476 msiexec.exe Token: SeTakeOwnershipPrivilege 3476 msiexec.exe Token: SeLoadDriverPrivilege 3476 msiexec.exe Token: SeSystemProfilePrivilege 3476 msiexec.exe Token: SeSystemtimePrivilege 3476 msiexec.exe Token: SeProfSingleProcessPrivilege 3476 msiexec.exe Token: SeIncBasePriorityPrivilege 3476 msiexec.exe Token: SeCreatePagefilePrivilege 3476 msiexec.exe Token: SeCreatePermanentPrivilege 3476 msiexec.exe Token: SeBackupPrivilege 3476 msiexec.exe Token: SeRestorePrivilege 3476 msiexec.exe Token: SeShutdownPrivilege 3476 msiexec.exe Token: SeDebugPrivilege 3476 msiexec.exe Token: SeAuditPrivilege 3476 msiexec.exe Token: SeSystemEnvironmentPrivilege 3476 msiexec.exe Token: SeChangeNotifyPrivilege 3476 msiexec.exe Token: SeRemoteShutdownPrivilege 3476 msiexec.exe Token: SeUndockPrivilege 3476 msiexec.exe Token: SeSyncAgentPrivilege 3476 msiexec.exe Token: SeEnableDelegationPrivilege 3476 msiexec.exe Token: SeManageVolumePrivilege 3476 msiexec.exe Token: SeImpersonatePrivilege 3476 msiexec.exe Token: SeCreateGlobalPrivilege 3476 msiexec.exe Token: SeCreateTokenPrivilege 3476 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3476 msiexec.exe Token: SeLockMemoryPrivilege 3476 msiexec.exe Token: SeIncreaseQuotaPrivilege 3476 msiexec.exe Token: SeMachineAccountPrivilege 3476 msiexec.exe Token: SeTcbPrivilege 3476 msiexec.exe Token: SeSecurityPrivilege 3476 msiexec.exe Token: SeTakeOwnershipPrivilege 3476 msiexec.exe Token: SeLoadDriverPrivilege 3476 msiexec.exe Token: SeSystemProfilePrivilege 3476 msiexec.exe Token: SeSystemtimePrivilege 3476 msiexec.exe Token: SeProfSingleProcessPrivilege 3476 msiexec.exe Token: SeIncBasePriorityPrivilege 3476 msiexec.exe Token: SeCreatePagefilePrivilege 3476 msiexec.exe Token: SeCreatePermanentPrivilege 3476 msiexec.exe Token: SeBackupPrivilege 3476 msiexec.exe Token: SeRestorePrivilege 3476 msiexec.exe Token: SeShutdownPrivilege 3476 msiexec.exe Token: SeDebugPrivilege 3476 msiexec.exe Token: SeAuditPrivilege 3476 msiexec.exe Token: SeSystemEnvironmentPrivilege 3476 msiexec.exe Token: SeChangeNotifyPrivilege 3476 msiexec.exe Token: SeRemoteShutdownPrivilege 3476 msiexec.exe Token: SeUndockPrivilege 3476 msiexec.exe Token: SeSyncAgentPrivilege 3476 msiexec.exe Token: SeEnableDelegationPrivilege 3476 msiexec.exe Token: SeManageVolumePrivilege 3476 msiexec.exe Token: SeImpersonatePrivilege 3476 msiexec.exe Token: SeCreateGlobalPrivilege 3476 msiexec.exe Token: SeCreateTokenPrivilege 3476 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3476 msiexec.exe Token: SeLockMemoryPrivilege 3476 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3476 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 2192 3812 708610982c93031b1f8666a8bdf496f0N.exe 86 PID 3812 wrote to memory of 2192 3812 708610982c93031b1f8666a8bdf496f0N.exe 86 PID 3812 wrote to memory of 2192 3812 708610982c93031b1f8666a8bdf496f0N.exe 86 PID 2192 wrote to memory of 376 2192 Installer.exe 88 PID 2192 wrote to memory of 376 2192 Installer.exe 88 PID 2192 wrote to memory of 376 2192 Installer.exe 88 PID 376 wrote to memory of 3476 376 Setup.exe 89 PID 376 wrote to memory of 3476 376 Setup.exe 89 PID 376 wrote to memory of 3476 376 Setup.exe 89 PID 3172 wrote to memory of 4252 3172 msiexec.exe 91 PID 3172 wrote to memory of 4252 3172 msiexec.exe 91 PID 3172 wrote to memory of 4252 3172 msiexec.exe 91 PID 376 wrote to memory of 2532 376 Setup.exe 101 PID 376 wrote to memory of 2532 376 Setup.exe 101 PID 376 wrote to memory of 2532 376 Setup.exe 101 PID 376 wrote to memory of 4060 376 Setup.exe 102 PID 376 wrote to memory of 4060 376 Setup.exe 102 PID 376 wrote to memory of 4060 376 Setup.exe 102 PID 376 wrote to memory of 3980 376 Setup.exe 103 PID 376 wrote to memory of 3980 376 Setup.exe 103 PID 376 wrote to memory of 3980 376 Setup.exe 103 PID 2192 wrote to memory of 4924 2192 Installer.exe 105 PID 2192 wrote to memory of 4924 2192 Installer.exe 105 PID 2192 wrote to memory of 4924 2192 Installer.exe 105 PID 3980 wrote to memory of 2372 3980 cmd.exe 106 PID 3980 wrote to memory of 2372 3980 cmd.exe 106 PID 3980 wrote to memory of 2372 3980 cmd.exe 106 PID 4060 wrote to memory of 1376 4060 80EBA4EA58D40136.exe 107 PID 4060 wrote to memory of 1376 4060 80EBA4EA58D40136.exe 107 PID 4060 wrote to memory of 1376 4060 80EBA4EA58D40136.exe 107 PID 2532 wrote to memory of 5060 2532 80EBA4EA58D40136.exe 108 PID 2532 wrote to memory of 5060 2532 80EBA4EA58D40136.exe 108 PID 2532 wrote to memory of 5060 2532 80EBA4EA58D40136.exe 108 PID 2532 wrote to memory of 5060 2532 80EBA4EA58D40136.exe 108 PID 2532 wrote to memory of 5060 2532 80EBA4EA58D40136.exe 108 PID 2532 wrote to memory of 5060 2532 80EBA4EA58D40136.exe 108 PID 1376 wrote to memory of 4968 1376 cmd.exe 110 PID 1376 wrote to memory of 4968 1376 cmd.exe 110 PID 1376 wrote to memory of 4968 1376 cmd.exe 110 PID 2532 wrote to memory of 5100 2532 80EBA4EA58D40136.exe 111 PID 2532 wrote to memory of 5100 2532 80EBA4EA58D40136.exe 111 PID 2532 wrote to memory of 5100 2532 80EBA4EA58D40136.exe 111 PID 4924 wrote to memory of 4136 4924 file.exe 112 PID 4924 wrote to memory of 4136 4924 file.exe 112 PID 4924 wrote to memory of 4136 4924 file.exe 112 PID 2192 wrote to memory of 4752 2192 Installer.exe 114 PID 2192 wrote to memory of 4752 2192 Installer.exe 114 PID 4136 wrote to memory of 3952 4136 cmd.exe 115 PID 4136 wrote to memory of 3952 4136 cmd.exe 115 PID 4136 wrote to memory of 3952 4136 cmd.exe 115 PID 2192 wrote to memory of 452 2192 Installer.exe 116 PID 2192 wrote to memory of 452 2192 Installer.exe 116 PID 2192 wrote to memory of 452 2192 Installer.exe 116 PID 452 wrote to memory of 4100 452 gdrrr.exe 117 PID 452 wrote to memory of 4100 452 gdrrr.exe 117 PID 452 wrote to memory of 4100 452 gdrrr.exe 117 PID 452 wrote to memory of 1632 452 gdrrr.exe 118 PID 452 wrote to memory of 1632 452 gdrrr.exe 118 PID 452 wrote to memory of 1632 452 gdrrr.exe 118 PID 4060 wrote to memory of 4340 4060 80EBA4EA58D40136.exe 119 PID 4060 wrote to memory of 4340 4060 80EBA4EA58D40136.exe 119 PID 4060 wrote to memory of 4340 4060 80EBA4EA58D40136.exe 119 PID 4340 wrote to memory of 4864 4340 cmd.exe 121 PID 4340 wrote to memory of 4864 4340 cmd.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\708610982c93031b1f8666a8bdf496f0N.exe"C:\Users\Admin\AppData\Local\Temp\708610982c93031b1f8666a8bdf496f0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exeC:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe 0011 installp14⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵PID:5060
-
-
C:\Users\Admin\AppData\Roaming\1725754243473.exe"C:\Users\Admin\AppData\Roaming\1725754243473.exe" /sjson "C:\Users\Admin\AppData\Roaming\1725754243473.txt"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵PID:2628
-
-
C:\Users\Admin\AppData\Roaming\1725754267441.exe"C:\Users\Admin\AppData\Roaming\1725754267441.exe" /sjson "C:\Users\Admin\AppData\Roaming\1725754267441.txt"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exeC:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe 200 installp14⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops Chrome extension
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe"5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4864
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe" >> NUL4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"3⤵
- Executes dropped EXE
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 42F11DB3BB8A2E817525DAF3D110D851 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
6KB
MD584878b1a26f8544bda4e069320ad8e7d
SHA151c6ee244f5f2fa35b563bffb91e37da848a759c
SHA256809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444
SHA5124742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549
-
Filesize
5.8MB
MD55b0dd7584865516869f2d1d8c2eea131
SHA1f02ae45e08dce791681450e3e4e038147cacf321
SHA2567f0f4dbee4b6bd80769e640b089603c8593e7dd97c0a2dd122e5ca05d7823d9c
SHA51243ed616167cb76f6f9945032b687b659239dbb6d38477b85862bb3bb9770ea2348852c25ac89afa44686261ef313b865d592f2f373edc7f7ebd73ac8b5c5a7fd
-
Filesize
175KB
MD54cfee35f55ecaef4bdc4508eb5d46f8a
SHA1be092ce3723b7a8ea942ec59c1c30e5d585b89ba
SHA256fa828cf0731d35f2e35606d56aad77fc5fff41dfd5d37a5ad0f657b38b57cfbe
SHA5124cf15a517f103750ac0ad93bb858b930f7c2f454ecc688f0adbe20ee9a8b18dc04fc004d0678b3de5b94a50049d8e73fa1c3616adfa5aeb716e1ad6521913401
-
Filesize
4.3MB
MD5e70e40b7acda24d775bfa15b89137483
SHA1a993e1cccbfbdf0ec6eead05a99506e3fdc4e146
SHA25626b8ffe7b3e413e1cb19c534d3b8c2bd05244aad79d84f96a6eb9ad5e5e19136
SHA5120ff7bb4228a2aee8d062031c31c67e05b88176efb0771602a591a599a78d7d03ba5e4d343caf8f4fadc14230b0b07605900eeb76a8e593fb22528a98d4300053
-
Filesize
134KB
MD54127593be833d53d84be69a1073b46d6
SHA1589338f5597ae7bc8e184dcf06b7bf0cb21ca104
SHA256d0ba78c12f7fc6d3c7976b561c6e092bdefc4ee297b51c1f1bd2c13b775df5a4
SHA512a239cf6ebd06f3d3955dd7fc885e3d0a8bc6d363c5861e4e2a2ed02f23fba6a852ba01a6e3b3582e5e763fc721867d38c1ee58af9f62e8f366a57d5863753ddb
-
Filesize
975KB
MD56a714c56525073f78181129ce52175db
SHA1eb7a9356e9cc40368e1774035c23b15b7c8d792b
SHA25657c417f53d9032a2f256cee17c274df2d411858abb14789406671c1dca6017c4
SHA51204a183bddeeaa6fe316596fad52a6e707549ca2e93b2b294c618b4381018bf5791582e2ac08e0f5e5cea86ac980a56208e54e1e310945614e00524d50a00c550
-
Filesize
71KB
MD5f0372ff8a6148498b19e04203dbb9e69
SHA127fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8
SHA256298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf
SHA51265d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865
-
Filesize
14.0MB
MD5053f33bc51ecaceb8bdbe1f13b24b384
SHA16e24d04820330d86de573e08252dfa37ea2266bd
SHA256bce0a9a2886c985a61e3bff1f8e3c6d8c6d5a7f69c105c310d665c20008bdd6b
SHA512728db52fde0e473b2c32a48d1aa3aceedae376c70204a19007f81647ab67526c0c6911e0f14872a8470cd912564173e641c1e989328c422642d1f9eb255c1d68
-
Filesize
31B
MD5b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
Filesize
1KB
MD54888df6747c7b5165d3be00ff648ba1e
SHA1a103dc0dd8da8ee99b0a06e0f5a915641e9268ed
SHA256c820b1e9412f9e03a716787097c53ae3de6640dff9fbf81e20efdea7ba9897ef
SHA5120888ffb551c1cf6fbd54fef1a7457232250cf74c88972fc63d6c4ed455c525ad3d94791cf4092da932a600fabada873c77125f627ad31a7184e030f4b352b793
-
Filesize
231KB
MD57cc103f6fd70c6f3a2d2b9fca0438182
SHA1699bd8924a27516b405ea9a686604b53b4e23372
SHA256dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1
SHA51292ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128
-
Filesize
184KB
MD57fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
Filesize
61KB
MD5a6279ec92ff948760ce53bba817d6a77
SHA15345505e12f9e4c6d569a226d50e71b5a572dce2
SHA2568b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
SHA512213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c
-
Filesize
101KB
MD5ef6f72358cb02551caebe720fbc55f95
SHA1b5ee276e8d479c270eceb497606bd44ee09ff4b8
SHA2566562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5
SHA512ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90
-
Filesize
10KB
MD5b198ea3e355ce219af5fecbfde746ba8
SHA1b23a0b93bbb4ee6c3c05c6d2219da601fa471fcc
SHA2564a4e1c2988e8be6d09e9c83c04b71dbc2af7872e2a7e6bd18689739837a4893c
SHA512df45dedda3d09b46c471bb79e6aaf9416c2129476d96d2021e454515213c57e8c4515f7615b01394be1a615bfecbf596f666cea62b3f0d076f1dc40ffcd91ca7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bevga8mt.Admin\storage\default\moz-extension+++c9cdd9b2-a8a6-4f4c-8167-86f19e1820e6^userContextId=4294967295\idb\3647222921wleabcEoxlt-eengsairo.sqlite
Filesize48KB
MD52eab03c24e521ee22c08a3e3bab16d7f
SHA1d8ea20c5d4e7866c66ef36201e27fce4e10ad12b
SHA2565c1fffc1e126ebbc19e4ef0cff60d5a0278cc57868737157746827acf7248ba2
SHA512916cefe311d2b01d58062a022f5172880bd99c817b421f354a75a5c09e013676da7e2c16f333f1be121d62cb848b9739b0f2c4d2f45c56789574b93a97c7685b