Analysis
-
max time kernel
111s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2024 23:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lawyerconsult.top
Resource
win10-20240404-en
General
-
Target
http://lawyerconsult.top
Malware Config
Extracted
remcos
Back-September
fullimmersion777.com:8090
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
hello.exe
-
copy_folder
windw
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
rimcsl-94LESJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 4708 AUGUST.exe 5092 DZIPR.exe 1332 DZIPR.exe 2228 AUGUST.exe 984 DZIPR.exe 2188 DZIPR.exe 4464 AUGUST.exe 4492 DZIPR.exe -
Loads dropped DLL 5 IoCs
pid Process 5092 DZIPR.exe 1332 DZIPR.exe 984 DZIPR.exe 2188 DZIPR.exe 4492 DZIPR.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1332 set thread context of 2552 1332 DZIPR.exe 93 PID 2188 set thread context of 4692 2188 DZIPR.exe 102 PID 4492 set thread context of 5040 4492 DZIPR.exe 108 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\lnfast_x64.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUGUST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUGUST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUGUST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133717801051338911" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 5092 DZIPR.exe 1332 DZIPR.exe 1332 DZIPR.exe 1332 DZIPR.exe 2552 cmd.exe 2552 cmd.exe 984 DZIPR.exe 2188 DZIPR.exe 2188 DZIPR.exe 2188 DZIPR.exe 4692 cmd.exe 4692 cmd.exe 4692 cmd.exe 4692 cmd.exe 4492 DZIPR.exe 4492 DZIPR.exe 4492 DZIPR.exe 5040 cmd.exe 5040 cmd.exe 5040 cmd.exe 5040 cmd.exe 932 powershell.exe 932 powershell.exe 932 powershell.exe 932 powershell.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1332 DZIPR.exe 2188 DZIPR.exe 2552 cmd.exe 4492 DZIPR.exe 4692 cmd.exe 5040 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 1220 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2072 4988 chrome.exe 74 PID 4988 wrote to memory of 2072 4988 chrome.exe 74 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 2848 4988 chrome.exe 76 PID 4988 wrote to memory of 500 4988 chrome.exe 77 PID 4988 wrote to memory of 500 4988 chrome.exe 77 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78 PID 4988 wrote to memory of 392 4988 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lawyerconsult.top1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff902d99758,0x7ff902d99768,0x7ff902d997782⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:22⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2676 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2692 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4204 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4304 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4700 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4584 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4988 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4720 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:5112
-
-
C:\Users\Admin\Downloads\AUGUST.exe"C:\Users\Admin\Downloads\AUGUST.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Users\Admin\DZIPR.exe"C:\Users\Admin\DZIPR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exeC:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2552 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1792,i,4513536469385582160,11281305360292314544,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1948
-
C:\Users\Admin\Downloads\AUGUST.exe"C:\Users\Admin\Downloads\AUGUST.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\DZIPR.exe"C:\Users\Admin\DZIPR.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exeC:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4692 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
-
-
-
C:\Users\Admin\Downloads\AUGUST.exe"C:\Users\Admin\Downloads\AUGUST.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Users\Admin\DZIPR.exe"C:\Users\Admin\DZIPR.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5040 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\cmd\" -spe -an -ai#7zMap27064:68:7zEvent10061⤵
- Suspicious use of FindShellTrayWindow
PID:1220
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell wget http://127.0.0.1/hello -OutFile C:\Users\Admin\AppData\Roaming/hello.msi && C:\Users\Admin\AppData\Roaming/hello.msi1⤵PID:4304
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wget http://127.0.0.1/hello -OutFile C:\Users\Admin\AppData\Roaming/hello.msi2⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD59883e2a61a892b54cb9b219d9e067887
SHA1ccb02e4bbced428cb9ab0bd4c3aab4ddd5c8c92c
SHA256bc038cefd187af1d73b60cf8b9eac32b3c47c69e0a913f6fbb6f87c8c57ec337
SHA5120d108ec5f5227203eeb2138265ea47161d5d5b7a817c00e5f5a8751981a9fd610390295596647c75d31d82427d4d67496c3f9ab970f068a35dacf70e412fce64
-
Filesize
6KB
MD5c10f325ca18a2e95735398444955f018
SHA1ff9c2a0e5ab5b24ea4c473ea2ddf2dd24c931e89
SHA256815bf49e0787142ff6708efa48badbe365fb813e583eae1c9577ea240768e5fe
SHA512f685979b0ac6864518aaff4ed307c9dbd6e9b00cd63d1a670ac2a31c137b21d1c02cc5406e430786ab40e0119ce370bde11ad6abb49b55e4410ce55df13b5571
-
Filesize
6KB
MD53f8cac785f010e0701a0eea3ff07456d
SHA16f3647942777d4c921b9adbd3d92ec6100b413fa
SHA256c7802b97b74a0ea94f3ff726a7bd1bc2f5ab74898d88458955bf27bb04a7a4fe
SHA512cd50fec24efc1165e664fa29b4ad027b3cfc6163ca243ac35343f0e0c7893dc6bf168c9adfdcd9bb3636455efbf50b0ba22dbb1c36c1e388206fd7d82d3f9323
-
Filesize
6KB
MD5631abf66eea67b4c34cc005d016deefa
SHA11d8a04857bf458502ccb3b9140e422e886c95f47
SHA256a4c1649d680bc7857df65865f1a363916be64d9a07f8888d0febefb3425d453f
SHA512f9dbea5bb90b17a815c35ffec153afa63da2071d10d38143a3542dc7faffd878ed23c9ecb999bba4464a00d574cb3e39c7b15336e4f9585306ccce41e4f515f0
-
Filesize
6KB
MD58aff928699917a72f93e6ec4bb64ec25
SHA1dbe878f77e9d11eb031d335606177c4537b2aaa2
SHA2565892908346c5453b47e8ba4543cfeaf69389f37d69c9df802913f56e0c82afd1
SHA5124862c778ef0b047353543eb522bbba298e24f19b600b0c52a82a46d37a5e508c8781686a323cf9cc3e06768c7b77372b33fb01536b9a2ac268492b8dee524d32
-
Filesize
136KB
MD509336c6c59173a330990700f9a0fb1b0
SHA1a0dcc817b66586227e8661bbe01c84a7775e5f7f
SHA25608e38ab61e8080a80f8e3af6d9efff9896a210f1a8d0f6342b4563945f0fafe7
SHA5120dff6e7193e1260443beb858baaab7bbc8044332d39b161d5b8de8f8b3e292884d038003583ddb4cbcb3584ebb69c401d4060b6e419ce5c5978b9665b73eb624
-
Filesize
105KB
MD5c6941a3878485598029e28d662099fba
SHA19ae3072dc4c9ef3fbdb0261229048a601c4a68f3
SHA25683e71066c4f82b8e9ab6862fde6f21a667795b15af966cbd646f4eb3435ad23d
SHA51266df0599358dfe4e984788deb51b32d9e5254a08a883127d824cd88807a7fbaac2300abd98bf0779d86fce0810eb68ac2195ef07520647ed8b0b76ac9d8cf4f0
-
Filesize
104KB
MD5b6118afa453ad77e27ee334e61143980
SHA1198993edd2036ff6753056d331fa370b326a5199
SHA2562c04f056361f44444901bb81a9e05efdcb4e33aaf4a4b674ac5526c292d585b1
SHA51233ab24ac93e87457bbeba913db4adc7d095bb86c3a48483f90d23a3c87247029ddb24e30212e61ed7ddd3273b74e7fc18e932cded8c0a6bbfb04a05831793735
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1.2MB
MD5e4d7547f3b0c288582190e57f7f58111
SHA138377ae9cfbc1cffe33ec7f7bd8c725f9be2e25f
SHA256d9a2e39e0627edfe897e7ffc3ec26b40bf52365bbb26e4ed38862a05b5704d46
SHA512ee05f6056f807beaf6f8ce1633b49ba1e4bd1ca67338255486f5e73eb855e0dab8eef2b17d1a7a9c8357e822bbb452f379b389128408a3569c6a2a7e8a7d511c
-
Filesize
1.2MB
MD532daafc9ffa19e1f8fe6c7af4cde97a2
SHA12458ee8cc5b774a11b6fcd1b33a47a4f1b118e77
SHA25683f3179847705bd1d74dbf5c40544979c456444b2bab1b0f693428298c1068a5
SHA512a5066ef086bb3a6631630a4d50e4bbffae1de5556a8c2808c45c581cb0fc29d55db8fad41fc90639cc299a361608f31a01751cd1939a051874b72710a7ea66ea
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1.2MB
MD5174d2d3e016e6fdc298255823a606de8
SHA1ad749fc432378426e25789e25d3b55fbbc903779
SHA256c8cdc707944320080fc684a1c51d672c208ce781820472909a0ff1d33ca4aadc
SHA5126db7e3e3ee36a927a87187933df538eece40fa5d28b3d65980fdb8de0ff608ede29424547800d6f5a347feadb1a0aa1e2b23f59390d63877e7c355d813e959a3
-
Filesize
346KB
MD5ad28d4167571382569d2384ffd7bd2a9
SHA1efc7534bcb1645d4056702e073519f571d8db77b
SHA256f919a8e63ec0f2f05ac01a6cab4088c13fbf14a38b071cfa9f710c9e069462eb
SHA5128f28867b46dd7a801cbf70d8d7fe5f2bfb8654a417c40ba264faf81af8bb1a28e1a1200fdc9828a4a4c6df0a13817055290c16f9468d311b8d8049a2439348d9
-
Filesize
8.4MB
MD5ec9ce1d67f98072281015c7726fba245
SHA1e89b16265acf4a251b527ddf22830f2650987263
SHA2569ab4145d5525ae741b80f4e66f505abba59adcbe01868dfef84fbe4450634cc1
SHA51221db8f3ae325021589de9c2489ab2ce6814722a17a92476a56147478aa9767ce5c4769169f287060cc08ad76019178ba547fcef32074ef1afb1926845e7158e1
-
Filesize
4.6MB
MD525860926414bf43383246f7c773a8d6c
SHA1760390a4a14df085f4c841067f52c79409cdc93e
SHA256a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958
SHA51261825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07
-
Filesize
1KB
MD5366c282c7a62e3d9c015712e853b8306
SHA1ddd78e90728521a9900efea258be422dced9db0a
SHA2563df71d7698545780cb5b0e5d61dc514e093ef824ad99bf6a57594ba3ca9620c6
SHA512f9ad50a6c1e97a864b428a5850bf0b9653dba7f734ee0758a7f51c72a0c261c1f4540cd042ac5c9d49810dbe614b8c1ff3834497842f47acb314cfe886a1a06e
-
Filesize
952KB
MD54649f3a4e58c6040b07f6d486c149a71
SHA164f8fc631c5fb4e5f6bc20c207047d8e2b500587
SHA2565d81ca77492946aa2cfe00349342de8cceb317d8649bedbfd95992dca885f184
SHA5124e1b229d30403b594e992fe0893e568161c8d901fe20461093d11159ab03b5dd410d1834bc64ac4ccc39d4f6b072946703f06eeb982d79b1c9a1b773b57013b7
-
Filesize
70KB
MD5f125e72b3968ca233ef3c7e2f4db34e7
SHA14fb34044ef18cedbd3ede4272c44416d3f11735c
SHA256ced30560c6c0fc15cbdbdbc0d480dca6b41ce3183057e43b419dd6814a33db92
SHA512b645d1eb685a69b9ca9bbdb1f4638af8ae151ddfb9527c423f7779971246ed60f981ce26ce8af2fc7b63164e7c13e9c6e98a7f148831a1e59318e60e5a39f881
-
Filesize
280B
MD507ffd26e875ec1713b4c00e881700143
SHA198cc5bd54c1c6a8dbabd2146227e81114434670d
SHA2560cc329fcac6b775dddc649da8fb9e09414182f79bacae46e25584f94dc1da6cf
SHA5126444daad44721dd20520bde5896ede02b41bc4b1f9ff3f475c333f1a796767f19b3d786c6a3beb58d254726e9a5b03a56cc2ec67536f4db8cb31c2fa996ca5f4