Overview
overview
10Static
static
10Retrac Patcher.exe
windows7-x64
7Retrac Patcher.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3OGFnPatcher.exe
windows10-2004-x64
9d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...e3.dll
windows7-x64
1resources/...e3.dll
windows10-2004-x64
1resources/...act.js
windows7-x64
3resources/...act.js
windows10-2004-x64
3sqlite-aut...llback
ubuntu-18.04-amd64
1sqlite-aut...llback
debian-9-armhf
1sqlite-aut...llback
debian-9-mips
1sqlite-aut...llback
debian-9-mipsel
1sqlite-aut...ace.js
windows7-x64
3sqlite-aut...ace.js
windows10-2004-x64
3sqlite-aut...al.ps1
windows7-x64
3sqlite-aut...al.ps1
windows10-2004-x64
3sqlite-aut...re.vbs
windows7-x64
1sqlite-aut...re.vbs
windows10-2004-x64
1sqlite-aut...all-sh
ubuntu-18.04-amd64
1Resubmissions
21-09-2024 11:34
240921-nprd1azend 10Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 11:34
Behavioral task
behavioral1
Sample
Retrac Patcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Retrac Patcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
OGFnPatcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral17
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.dll
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral23
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral24
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral25
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral26
Sample
sqlite-autoconf-3440200/Replace.js
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
sqlite-autoconf-3440200/Replace.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
sqlite-autoconf-3440200/aclocal.ps1
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
sqlite-autoconf-3440200/aclocal.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
sqlite-autoconf-3440200/configure.vbs
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
sqlite-autoconf-3440200/configure.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
sqlite-autoconf-3440200/install-sh
Resource
ubuntu1804-amd64-20240611-en
General
-
Target
OGFnPatcher.exe
-
Size
177.3MB
-
MD5
82db6baf5501b11cf7582d68cb173689
-
SHA1
ff40fcae2ecfb00eb3f1a36521afbdc93db1e6e6
-
SHA256
17f48d532943a1160b9c171e183599d28b3a03b4943df8d1b5f8af2aaed142fc
-
SHA512
9d47fc31fec0379b7ec6461401e5cda54f7b64d6ff0a30136e5ad58bb94446cfa6f1e511380eb5bf99f59174e56fdc7a7cd06cf7cf46898c672bf37c36ec4d82
-
SSDEEP
1572864:s+vbimZ3RqPfrrW/GDt+wy2tXgJdtEaxMz6lMp1rJ/Gk/QeF/anRq9A4CGdhVnau:sA5kyGScXQT
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation OGFnPatcher.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System32Kernal = "C:\\Users\\Admin\\AppData\\Local\\Temp\\OGFnPatcher.exe -silent" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 18 raw.githubusercontent.com 20 raw.githubusercontent.com 47 discord.com 19 raw.githubusercontent.com 21 raw.githubusercontent.com 44 discord.com 22 raw.githubusercontent.com 23 raw.githubusercontent.com 25 raw.githubusercontent.com 15 raw.githubusercontent.com 17 raw.githubusercontent.com 24 raw.githubusercontent.com 26 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ipinfo.io 36 ipinfo.io -
An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
pid Process 2944 cmd.exe 4368 cmd.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 4344 tasklist.exe 888 tasklist.exe 4704 tasklist.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 OGFnPatcher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OGFnPatcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OGFnPatcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OGFnPatcher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 OGFnPatcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz OGFnPatcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString OGFnPatcher.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 2032 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 320 WMIC.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 548 powershell.exe 548 powershell.exe 548 powershell.exe 3268 powershell.exe 3268 powershell.exe 3268 powershell.exe 3248 powershell.exe 3248 powershell.exe 3928 powershell.exe 3928 powershell.exe 4560 powershell.exe 4560 powershell.exe 1504 OGFnPatcher.exe 1504 OGFnPatcher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3828 OGFnPatcher.exe Token: SeCreatePagefilePrivilege 3828 OGFnPatcher.exe Token: SeIncreaseQuotaPrivilege 2032 WMIC.exe Token: SeSecurityPrivilege 2032 WMIC.exe Token: SeTakeOwnershipPrivilege 2032 WMIC.exe Token: SeLoadDriverPrivilege 2032 WMIC.exe Token: SeSystemProfilePrivilege 2032 WMIC.exe Token: SeSystemtimePrivilege 2032 WMIC.exe Token: SeProfSingleProcessPrivilege 2032 WMIC.exe Token: SeIncBasePriorityPrivilege 2032 WMIC.exe Token: SeCreatePagefilePrivilege 2032 WMIC.exe Token: SeBackupPrivilege 2032 WMIC.exe Token: SeRestorePrivilege 2032 WMIC.exe Token: SeShutdownPrivilege 2032 WMIC.exe Token: SeDebugPrivilege 2032 WMIC.exe Token: SeSystemEnvironmentPrivilege 2032 WMIC.exe Token: SeRemoteShutdownPrivilege 2032 WMIC.exe Token: SeUndockPrivilege 2032 WMIC.exe Token: SeManageVolumePrivilege 2032 WMIC.exe Token: 33 2032 WMIC.exe Token: 34 2032 WMIC.exe Token: 35 2032 WMIC.exe Token: 36 2032 WMIC.exe Token: SeIncreaseQuotaPrivilege 228 WMIC.exe Token: SeSecurityPrivilege 228 WMIC.exe Token: SeTakeOwnershipPrivilege 228 WMIC.exe Token: SeLoadDriverPrivilege 228 WMIC.exe Token: SeSystemProfilePrivilege 228 WMIC.exe Token: SeSystemtimePrivilege 228 WMIC.exe Token: SeProfSingleProcessPrivilege 228 WMIC.exe Token: SeIncBasePriorityPrivilege 228 WMIC.exe Token: SeCreatePagefilePrivilege 228 WMIC.exe Token: SeBackupPrivilege 228 WMIC.exe Token: SeRestorePrivilege 228 WMIC.exe Token: SeShutdownPrivilege 228 WMIC.exe Token: SeDebugPrivilege 228 WMIC.exe Token: SeSystemEnvironmentPrivilege 228 WMIC.exe Token: SeRemoteShutdownPrivilege 228 WMIC.exe Token: SeUndockPrivilege 228 WMIC.exe Token: SeManageVolumePrivilege 228 WMIC.exe Token: 33 228 WMIC.exe Token: 34 228 WMIC.exe Token: 35 228 WMIC.exe Token: 36 228 WMIC.exe Token: SeDebugPrivilege 4704 tasklist.exe Token: SeIncreaseQuotaPrivilege 1108 WMIC.exe Token: SeSecurityPrivilege 1108 WMIC.exe Token: SeTakeOwnershipPrivilege 1108 WMIC.exe Token: SeLoadDriverPrivilege 1108 WMIC.exe Token: SeSystemProfilePrivilege 1108 WMIC.exe Token: SeSystemtimePrivilege 1108 WMIC.exe Token: SeProfSingleProcessPrivilege 1108 WMIC.exe Token: SeIncBasePriorityPrivilege 1108 WMIC.exe Token: SeCreatePagefilePrivilege 1108 WMIC.exe Token: SeBackupPrivilege 1108 WMIC.exe Token: SeRestorePrivilege 1108 WMIC.exe Token: SeShutdownPrivilege 1108 WMIC.exe Token: SeDebugPrivilege 1108 WMIC.exe Token: SeSystemEnvironmentPrivilege 1108 WMIC.exe Token: SeRemoteShutdownPrivilege 1108 WMIC.exe Token: SeUndockPrivilege 1108 WMIC.exe Token: SeManageVolumePrivilege 1108 WMIC.exe Token: 33 1108 WMIC.exe Token: 34 1108 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 3260 3828 OGFnPatcher.exe 85 PID 3828 wrote to memory of 3260 3828 OGFnPatcher.exe 85 PID 3828 wrote to memory of 4712 3828 OGFnPatcher.exe 87 PID 3828 wrote to memory of 4712 3828 OGFnPatcher.exe 87 PID 3828 wrote to memory of 4924 3828 OGFnPatcher.exe 88 PID 3828 wrote to memory of 4924 3828 OGFnPatcher.exe 88 PID 3828 wrote to memory of 4312 3828 OGFnPatcher.exe 89 PID 3828 wrote to memory of 4312 3828 OGFnPatcher.exe 89 PID 3828 wrote to memory of 1864 3828 OGFnPatcher.exe 90 PID 3828 wrote to memory of 1864 3828 OGFnPatcher.exe 90 PID 3828 wrote to memory of 1260 3828 OGFnPatcher.exe 91 PID 3828 wrote to memory of 1260 3828 OGFnPatcher.exe 91 PID 3828 wrote to memory of 1448 3828 OGFnPatcher.exe 92 PID 3828 wrote to memory of 1448 3828 OGFnPatcher.exe 92 PID 3828 wrote to memory of 1152 3828 OGFnPatcher.exe 93 PID 3828 wrote to memory of 1152 3828 OGFnPatcher.exe 93 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 4480 3828 OGFnPatcher.exe 101 PID 3828 wrote to memory of 3416 3828 OGFnPatcher.exe 102 PID 3828 wrote to memory of 3416 3828 OGFnPatcher.exe 102 PID 3260 wrote to memory of 4704 3260 cmd.exe 104 PID 3260 wrote to memory of 4704 3260 cmd.exe 104 PID 4712 wrote to memory of 2032 4712 cmd.exe 105 PID 4712 wrote to memory of 2032 4712 cmd.exe 105 PID 1864 wrote to memory of 228 1864 cmd.exe 103 PID 1864 wrote to memory of 228 1864 cmd.exe 103 PID 4712 wrote to memory of 4540 4712 cmd.exe 106 PID 4712 wrote to memory of 4540 4712 cmd.exe 106 PID 1864 wrote to memory of 2084 1864 cmd.exe 107 PID 1864 wrote to memory of 2084 1864 cmd.exe 107 PID 4312 wrote to memory of 1108 4312 cmd.exe 108 PID 4312 wrote to memory of 1108 4312 cmd.exe 108 PID 4312 wrote to memory of 3772 4312 cmd.exe 109 PID 4312 wrote to memory of 3772 4312 cmd.exe 109 PID 1260 wrote to memory of 320 1260 cmd.exe 110 PID 1260 wrote to memory of 320 1260 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe"C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic logicaldisk get size | more +1"2⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get size3⤵
- Collects information from the system
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\system32\more.commore +13⤵PID:4540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"2⤵PID:4924
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"2⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\System32\Wbem\WMIC.exewmic OS get caption, osarchitecture3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\system32\more.commore +13⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"2⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\system32\more.commore +13⤵PID:2084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController get name3⤵
- Detects videocard installed
PID:320
-
-
C:\Windows\system32\more.commore +13⤵PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"2⤵PID:1448
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"2⤵PID:1152
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName3⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
-
C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe"C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\patcher" --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2164,i,6884902397894312204,5445439030798024804,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe"C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\patcher" --field-trial-handle=2388,i,6884902397894312204,5445439030798024804,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2372 /prefetch:32⤵PID:3416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=3828 get ExecutablePath"2⤵PID:3256
-
C:\Windows\System32\Wbem\WMIC.exewmic process where processid=3828 get ExecutablePath3⤵PID:4708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v System32Kernal /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe -silent" /f"2⤵PID:3984
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v System32Kernal /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe -silent" /f3⤵
- Adds Run key to start application
PID:1796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"2⤵PID:4532
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:2716
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:4344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵PID:4496
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
PID:2944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,94,118,215,86,104,36,190,210,191,158,213,118,69,65,171,77,134,208,103,139,123,215,32,203,243,251,121,135,219,58,98,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,217,107,72,193,90,9,71,240,156,102,155,85,167,17,230,124,188,26,17,11,83,181,231,73,17,24,66,153,246,3,30,213,48,0,0,0,15,49,109,31,45,121,15,98,19,6,96,233,179,52,141,22,48,238,204,202,154,156,95,146,132,221,232,177,191,178,133,7,62,137,116,50,1,225,8,21,127,52,216,165,130,3,213,65,64,0,0,0,0,162,28,187,117,113,235,27,148,77,112,253,157,81,53,20,64,111,73,197,84,131,170,187,105,129,6,90,31,5,83,187,142,34,81,198,165,62,205,34,247,140,67,78,230,75,221,57,211,121,140,116,127,134,133,186,114,166,150,59,86,213,217,158), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
PID:4368 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,27,201,56,127,79,121,27,69,175,124,126,87,89,19,7,241,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,0,121,162,92,254,76,172,230,174,98,220,161,66,174,166,47,68,200,13,123,128,152,149,208,91,195,234,47,255,249,175,0,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,198,23,48,245,211,211,228,234,160,218,22,107,134,175,243,65,105,168,182,29,205,235,76,179,178,192,87,255,168,160,6,154,48,0,0,0,211,70,245,94,52,97,38,12,76,52,209,104,240,43,55,96,112,117,226,94,35,26,42,105,44,26,156,248,58,145,131,96,94,67,203,96,14,245,233,144,23,209,209,14,202,112,51,222,64,0,0,0,68,74,159,117,33,69,56,22,210,23,222,252,199,47,128,62,9,191,159,208,97,231,84,22,70,123,16,192,250,122,23,221,132,161,232,25,62,228,100,1,64,199,113,18,19,130,239,242,160,166,49,2,166,90,122,197,119,180,219,215,197,185,125,13), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe"C:\Users\Admin\AppData\Local\Temp\OGFnPatcher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\patcher" --gpu-preferences=UAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAhAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1388,i,6884902397894312204,5445439030798024804,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19B
MD5c4efd9a7b61ebf43b608440be5e33369
SHA1926418256c277f1b11b575ec6e92ce6a844612f7
SHA256ed4280859199da5a8f25c0c6d533d0873460ac63368c14a69bbd863ea4bfb30f
SHA5129ea97363868d61d3d51bd3804d638b71ba8dc65260800b3a54051b4725cf08e9d9880a12422a549d94a339c7267e858a7ff5ca9428d64051657134b5c6c20745
-
Filesize
896KB
MD52796634e7582fd3b91eaf3ac09a79dd1
SHA135a73fa55e81832cad3aafd472a282e6729c2737
SHA256c83e57aedf946aa1973dcf063571119d7ab7d4fa9f60a7789f603e86778a6713
SHA51233609100739e5482d7cf1c7cd89e11bb884855e3223c0be0838d6ac48dc85199b83056748cac521236c5814e8cf755e1847896e3d2f349c54ca14fe9f44d0288
-
Filesize
14KB
MD53c824a1eb1e8736ec72dab988264e104
SHA177c0b7e07b221d15ac235aad66b4a38d7ba8a25f
SHA256315f6d1363844799086a9f9ddaae1e63dd2caeb511d94c71a7cd7fd52fcd4f2f
SHA5124c3f550b92bef16fccc396870604df647cf3ccf6c4744ab1ec94b323f65cbdc53e839407b1f6b8d82cea155fd9fa1e66491942666390a1ea88614fbafcab0d70
-
Filesize
618KB
MD561ded64fb04a39d0b43c2f4f39fdf5fe
SHA115ae034c23b867b3fc1c4fda3f86a9490360359a
SHA2569c05aaf53bfd0a4700413415cd95f87a83de77621d603a5a3512f47caf007a4f
SHA512b890adc60c5adc9075d046269fa020d37cb6302478b11af516d96ec84950942413c2040319addc463b5929fe892a20cfb177f9b44ccb191c96cc3379f2e2e98e
-
Filesize
472KB
MD5b5f8e98d1c1890344b653f661a65bd75
SHA1b21a7ca7bb521b526f2ff5b8e5409bf997f7db96
SHA256eaa4c88d96f05a2d61392461e484824d2a7c7592e58428ef7fead0e1b8b42e49
SHA512bba429b788e4bd4cbdb07de905b857eeeee5daa8fddd8c42d7ae60cec2c49429baa718ab477064d4b0df0c3b9d02588e403758544d50db427148eca9028044f0
-
Filesize
211KB
MD5a6f1e0be2f70cc5277cf539d73231f64
SHA114fea6c6ff7b064e594b2f4253be4c20771dad94
SHA2565fb0d0062e924c0d0dafaec3e6a36d574d092d5d9ad73fe748573eb7807a5728
SHA5128e36cc5d8e20108a8f02e8a159c178cc7017ca7ea0de0370012b0a96e86a25f3055c7f1cf437d5262cda93a9c4f40d9646ba8cc834d5b1b35bd85fc6a92fccf8
-
Filesize
16KB
MD5f5475cc1da5492f5913fa4bbefee40ae
SHA19d5157eb20e979a4f4d95a7d9ea6870fbbfa56bb
SHA2562643edae07432f9d985968c4a7652a356f6007625c15db551c7c4dd481d60faa
SHA512aaca128eb70b3aedab0b6ed718a237c8f4a0238dc11a6be4a9aace260e23c7693e8d01bf3f8962becae6ec9fa035b98e027d12da4d81b3f78cafd40b83970195
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
1KB
MD58e26941f21dac5843c6d170e536afccb
SHA126b9ebd7bf3ed13bc51874ba06151850a0dac7db
SHA256316f6ce22306f3018f9f57435ea75092633097182646f7e4ca23e2e2aa1393c0
SHA5129148227032d98d49baf0d81a7435ba3adc653d7790245140acc50c38de00839d26a661b92f6754b15bab54fe81fbcf9003692fd7bef09027f11ef703a5879e62
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82