Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
283KB
-
MD5
3817c947e0d26bde329f7481b6d76709
-
SHA1
8f1003d9bd8194b486634df3bbe6dbd64b923e9f
-
SHA256
a1d7a27d0db33680df06c7b7ac1a58ba17c18843af52782f57ec7f94bb023a75
-
SHA512
79cff23f8fad0c1ad2cfcda5f7ab1e4b618c4d49fb4a488cb986b1f708ebe94fb0751f9a6d99e4acebef4a70e4c101bb60db85455bdfbeaa66b5246672698017
-
SSDEEP
6144:J4C2lKti9a/UIPZHrk6BcHvJ1rOjMmmqAZMzLswInEO:J4iwerk6qHrCMmbEyABEO
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral1/memory/1404-15-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-12-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-9-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-8-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-6-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-17-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-158-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-177-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-207-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-226-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-358-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-377-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-420-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1404-439-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1920-583-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1920-586-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1920-584-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1920-580-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1920-578-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1920-576-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2884 GDHIDHIEGI.exe 1764 FIDHIEBAAK.exe 2696 JDGCFBAFBF.exe -
Loads dropped DLL 14 IoCs
pid Process 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2364 set thread context of 1404 2364 file.exe 31 PID 2884 set thread context of 2160 2884 GDHIDHIEGI.exe 37 PID 1764 set thread context of 1920 1764 FIDHIEBAAK.exe 40 PID 2696 set thread context of 1684 2696 JDGCFBAFBF.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FIDHIEBAAK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JDGCFBAFBF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GDHIDHIEGI.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3052 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1404 RegAsm.exe 1684 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 2364 wrote to memory of 1404 2364 file.exe 31 PID 1404 wrote to memory of 2884 1404 RegAsm.exe 35 PID 1404 wrote to memory of 2884 1404 RegAsm.exe 35 PID 1404 wrote to memory of 2884 1404 RegAsm.exe 35 PID 1404 wrote to memory of 2884 1404 RegAsm.exe 35 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 2884 wrote to memory of 2160 2884 GDHIDHIEGI.exe 37 PID 1404 wrote to memory of 1764 1404 RegAsm.exe 38 PID 1404 wrote to memory of 1764 1404 RegAsm.exe 38 PID 1404 wrote to memory of 1764 1404 RegAsm.exe 38 PID 1404 wrote to memory of 1764 1404 RegAsm.exe 38 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1764 wrote to memory of 1920 1764 FIDHIEBAAK.exe 40 PID 1404 wrote to memory of 2696 1404 RegAsm.exe 41 PID 1404 wrote to memory of 2696 1404 RegAsm.exe 41 PID 1404 wrote to memory of 2696 1404 RegAsm.exe 41 PID 1404 wrote to memory of 2696 1404 RegAsm.exe 41 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 2360 2696 JDGCFBAFBF.exe 43 PID 2696 wrote to memory of 1684 2696 JDGCFBAFBF.exe 44 PID 2696 wrote to memory of 1684 2696 JDGCFBAFBF.exe 44 PID 2696 wrote to memory of 1684 2696 JDGCFBAFBF.exe 44 PID 2696 wrote to memory of 1684 2696 JDGCFBAFBF.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\ProgramData\GDHIDHIEGI.exe"C:\ProgramData\GDHIDHIEGI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2160
-
-
-
C:\ProgramData\FIDHIEBAAK.exe"C:\ProgramData\FIDHIEBAAK.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
C:\ProgramData\JDGCFBAFBF.exe"C:\ProgramData\JDGCFBAFBF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\BKJKJEHJJD.exe"5⤵PID:1892
-
C:\ProgramData\BKJKJEHJJD.exe"C:\ProgramData\BKJKJEHJJD.exe"6⤵PID:3048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1076
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\BAKKEGCAAE.exe"5⤵PID:2268
-
C:\ProgramData\BAKKEGCAAE.exe"C:\ProgramData\BAKKEGCAAE.exe"6⤵PID:756
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1632
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AKFHCAKJDBKK" & exit3⤵PID:304
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:3052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5ac7314c596e766b8f4f368579e2e0f8f
SHA10e4941e5e4299d04b9408194542c7362bcabcd2f
SHA256be442a04bc031b4dc72835efeeeb025e9a103c8012382173965fba30bd3a96b9
SHA5124258b6d15cd1c87d1787507f9132e5cf2caebfbf46dd055950dec8bb55faa094571d5b88cc58078adbab49f72fd3439f14ccae04de3d4bde672a540699a49428
-
Filesize
207KB
MD5b1394501c618f78b74c3ca0c2d81a33b
SHA173707a6facef7e1750fb6d47f3aa840558b17a30
SHA25632d0ae27d9ae49a224785cd08bae82b0ec4e944145cb2f106873f70fc2908fe7
SHA5120b3aff6484ee73136fd3bf36afad78f126e520b599def3c76b2e83e150fc919d484fd18d7bce0e006abae554db50ef566a6d13ac349c32fae67ea8e8796ce121
-
Filesize
6KB
MD51af6a4fceca8cf9b1456af5963f37d18
SHA17ff50958391c008363e35bde7b52bc7f2b4fb9cb
SHA256b38b259112b6b354faf5d8ee38e661c6c9dc81d94966b60b4424db4b63f4bfb2
SHA512dbd7d1af5f2de7e4a3e809b2ca5c8b92f9a974a725961284017c40c6e3c92d5670b075a734814dccf894165faa7d755c4baf7feb70a6184d63576f6a5389aa79
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5102841a614a648b375e94e751611b38f
SHA11368e0d6d73fa3cee946bdbf474f577afffe2a43
SHA256c82ee2a0dc2518cb1771e07ce4b91f5ef763dd3dd006819aece867e82a139264
SHA512ca18a888dca452c6b08ad9f14b4936eb9223346c45c96629c3ee4dd6742e947b6825662b42e793135e205af77ad35e6765ac6a2b42cefed94781b3463a811f0a
-
Filesize
219KB
MD528c4d0e3cdd4f30edfc99baf5225394b
SHA185878e1839471f6e23e0613574883fe71d147909
SHA2562b34103f9ffacd451640ce78aa026a2a3175c38a5405e1b875959a8c5be0baaa
SHA512e74980d4a2860ba3051410e92166ce9343948a7a5e68069289f1fdeee2c8171c3218f8dbda8b08363223b67faa3f781716ae902aa4a7842a51edfae126bf69ba
-
Filesize
13KB
MD5e416a22acaeff6cec5aa36a72becbede
SHA19fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f
SHA256edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e
SHA5128ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421
-
Filesize
157KB
MD59b02ef1fa48110db8f7e8bee437d67ee
SHA1b71c3d92b5bd74d4344025326e17671e53bb4c99
SHA256b618543f27e25591a999d037ce31261c3fc01d3e6246f80a79704949678c4992
SHA5129e97d3c4ecb84873406432422ac5dd1311b37d71afe3da7709e18e7bf92d8b96b3b1fca2500f5ebfee66a8a881790bd36d2f46caf1e6ea71392c36ad947f4436
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
504B
MD50fa6525234cdeaa5f3b77aa6c6fa80f4
SHA18ac7f58d7bfc8075ed6f838ab6258d1971718e60
SHA256becff27a14d620e204d5e94104940baf284090af69434f3e1220c657c5737f82
SHA512e7a343e508e126a003fd73ac1750081d46e84859a145792ed69cecf88150515b4f1a63074e9775d7bd24b0ba72835d69ef7a87993a16f5b1f613471453a3a25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD5c1588d04597ff6ef2986ff7e8c236fd9
SHA1d433792785b9cf2ea6f4a0cf52811e3e8ba0c51e
SHA25648655dcd73a09d4eb2c2e4fa394016d6776b819ba5a3ff1472ff7fccb1c46066
SHA512306801673868b2a7e2bc9884f9d9a9735cd878de888536dfa26faec0a0dccc9d230ddbf2d98253c6cef2aef52384f8b4bd56b061c7148decbab33b3f649cc909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD52a0bf7469790e2290d4a9772cdd6da1b
SHA1dc52bf7a2a896b92b118fcda245a906a6aac15f1
SHA256445807f0add850e31d38d8425e2365f82e153a4ac009b464b714d8e0a8786e6f
SHA51242c0fee4046a0666b5226198c843dcca3d1d86f6c19e66c7a3b47045f1d7e62946fd70faef9f115c02e41f5f606c52b974dc05c68f546f98daf4b01745652ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7dab4b8380dd8c11a4730dd54cedd0
SHA1d892bfe1ab76d91a105c69111d949b4cf2dac86c
SHA2560f83c1c13372691990d2aa38d6611edd63cb609493b4d5d377574927ecebe4dd
SHA512dc2ff6b07cb24d8ee14cc0d88edf60f5fc6ea7ac1aefa029296b9e49661679a57ea75e257b2408b8858dec15bcd4b370e461fe6e277d50bed4fc9fdf23224c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2be535e21b73688d3a52d472d944b6
SHA15c59b6d48c271f4349770cb38772eb0804406163
SHA2563a14fddb89f0e7621ec0eb22533dc7556d32b834bead48b79126a3ff5d3bfd06
SHA512a457cb779023bd462490b13949160dca980ec99aacf362d3f57c29f672083de52cf2a7d6a68aa0e9cbcbc2f8984c9868b78d8b149bd9ea0b29b11a9f4fc7a7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54836cec1b8974ae1f9d49d41087ebcc1
SHA1200366061f661330976fb649c16d58c9f6c1d71c
SHA2568dc4fd09061ff832c5b5c9ca323b65a66e95784ecc9d91c69d94f630ddcc6f29
SHA512534f8e854c2c5b97686b320930dad221c48dedc194518e9cbdc6afc65e51400e98335c13a32cd3607d80701eaed06ea067eb4ede60b998915da297aa214ab9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0B0E2398AAEC29C6B80CB11B0A298FD
Filesize546B
MD589d248dd819a86bd1bf5e0a0d11feb7d
SHA1f2e29f8d846246b8cadb833540490f6c61f2d1bc
SHA25612ab94444829a462529aef4f99dbdb32b2efb75b21edbc79fdf1b1dfee4ee59b
SHA512c5e7d484fcfdfdc4fe41691d1ade91a6dced257f15d9e78f20fcd98b7dc8065389e9460f603fc634c2733e1663e180d3bfcde450d885343e7247b3ec5b219f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5ec01552e024310ca0ee02f64eb19c544
SHA14fb058be2a1362141dc6c1c80fa02f3b826e8653
SHA2562eff2cbbdc1373aa1ea0585e967a812044f86840b0b3358f4ed0e77c5c7d88e3
SHA512489dea7f75f4e865df4ddf1a269e6a83c9bbdbb21a9c9a63a25130c523fe9ea727118d0481a287d907b24fd5206fe786ed7d9659d1adda5690d31cca459e8f49
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\76561199768374681[1].htm
Filesize33KB
MD581ed3931739561cbb1dd1bfbfae752f9
SHA15173af8cb0843425c2eafa280f24f51171f0ec12
SHA2561bf4d9ef093cc5e627d4e44ffbe15cd1451c9b8cbc88cd034f4831adbdd596cf
SHA51269dca71b8fd635f3706c6ae202ad8fcbf20af149beb8f670be48e969ba1607dcd213a63378a584286fcbef0ad1573bcdf19a3624ad4709f67b2637376f1b997e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\76561199768374681[1].htm
Filesize33KB
MD545360d3f1a2657e1f1bed0ceddbea00f
SHA16dc8cf526ab3f35c0ff0f77d9416550f63fbe7dc
SHA256e85ba2f1ea01af662121562185f2f78549f11875effefd9e9d9fd1eb95082164
SHA51222c81492f4db6e72b1edd63c2752180a8ba57858be37a97f597084fbecfce7a8ed065c28000ad06e24d1c13110501e335291530c423ab843936b2cf8e0471894
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
322KB
MD523f66b62580e25c71d847802432019f5
SHA1f1da07d11332465fbf5c456660d756350dbff889
SHA2567bf0a7a8bf646c29d39ad64c36b6baae45572cee1ef7695bff3923aa3726705c
SHA512e59e8581e8df58672ce1780f25d330793522ee450717e7ef3d96501474760ac3fc728f954ca8df0dbbd8d23fc9705d8afdc64e1476738598ce93cc5adefc2efc
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571