Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe
Resource
win7-20240903-en
General
-
Target
e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe
-
Size
349KB
-
MD5
63a982b248342656b70b85779224572c
-
SHA1
8f5749de3525225e7c3358d8137c18e0f75703ab
-
SHA256
e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6
-
SHA512
df882433f6c2732fd5767b6f547fc9d9ada430c4f1adefe84a2fe68cd322daa1a22fec6aeaec481433a90441b00dc975ed37b2b512ad148309fb86324c842036
-
SSDEEP
6144:FB1QKZaOpBjQepew/PjuGyFPr527Uf2u/jGw0qun597/QKjJ8zkjDpyAYpIh:FB1Q6rpr7MrswfLjGwW5xFdRyJp+
Malware Config
Extracted
nanocore
1.2.2.2
bemery2.no-ip.biz:57628
127.0.0.1:57628
997af15f-5576-4030-975c-eb3264fb6789
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-04-23T21:31:33.540664436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
57628
-
default_group
grace
-
enable_debug_mode
true
-
gc_threshold
1.048576e+08
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+09
-
mutex
997af15f-5576-4030-975c-eb3264fb6789
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
bemery2.no-ip.biz
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.2
-
wan_timeout
8000
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4520 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisv.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DPI Service\dpisv.exe RegAsm.exe File opened for modification C:\Program Files (x86)\DPI Service\dpisv.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1988 ping.exe 4968 ping.exe 208 ping.exe 452 ping.exe 1596 ping.exe 3504 ping.exe 4728 ping.exe 5008 ping.exe 3684 ping.exe 2956 ping.exe 4388 ping.exe 4356 ping.exe 3576 ping.exe 696 ping.exe 3316 ping.exe 4492 ping.exe 4880 ping.exe 4076 ping.exe 4196 ping.exe 3916 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 3504 ping.exe 2956 ping.exe 1988 ping.exe 3316 ping.exe 5008 ping.exe 4968 ping.exe 4196 ping.exe 4880 ping.exe 696 ping.exe 3684 ping.exe 1596 ping.exe 208 ping.exe 3916 ping.exe 4728 ping.exe 4356 ping.exe 4076 ping.exe 452 ping.exe 4388 ping.exe 4492 ping.exe 3576 ping.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3060 RegAsm.exe 3060 RegAsm.exe 3060 RegAsm.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe Token: SeDebugPrivilege 3060 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3576 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 86 PID 3660 wrote to memory of 3576 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 86 PID 3660 wrote to memory of 3576 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 86 PID 3660 wrote to memory of 696 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 89 PID 3660 wrote to memory of 696 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 89 PID 3660 wrote to memory of 696 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 89 PID 3660 wrote to memory of 3316 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 93 PID 3660 wrote to memory of 3316 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 93 PID 3660 wrote to memory of 3316 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 93 PID 3660 wrote to memory of 4076 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 95 PID 3660 wrote to memory of 4076 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 95 PID 3660 wrote to memory of 4076 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 95 PID 3660 wrote to memory of 5008 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 97 PID 3660 wrote to memory of 5008 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 97 PID 3660 wrote to memory of 5008 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 97 PID 3660 wrote to memory of 4968 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 99 PID 3660 wrote to memory of 4968 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 99 PID 3660 wrote to memory of 4968 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 99 PID 3660 wrote to memory of 3684 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 101 PID 3660 wrote to memory of 3684 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 101 PID 3660 wrote to memory of 3684 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 101 PID 3660 wrote to memory of 1596 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 103 PID 3660 wrote to memory of 1596 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 103 PID 3660 wrote to memory of 1596 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 103 PID 3660 wrote to memory of 208 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 106 PID 3660 wrote to memory of 208 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 106 PID 3660 wrote to memory of 208 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 106 PID 3660 wrote to memory of 3504 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 109 PID 3660 wrote to memory of 3504 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 109 PID 3660 wrote to memory of 3504 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 109 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 3060 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 111 PID 3660 wrote to memory of 4520 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 112 PID 3660 wrote to memory of 4520 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 112 PID 3660 wrote to memory of 4520 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 112 PID 3660 wrote to memory of 4196 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 113 PID 3660 wrote to memory of 4196 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 113 PID 3660 wrote to memory of 4196 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 113 PID 3660 wrote to memory of 3916 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 116 PID 3660 wrote to memory of 3916 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 116 PID 3660 wrote to memory of 3916 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 116 PID 3660 wrote to memory of 452 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 118 PID 3660 wrote to memory of 452 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 118 PID 3660 wrote to memory of 452 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 118 PID 3660 wrote to memory of 2956 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 120 PID 3660 wrote to memory of 2956 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 120 PID 3660 wrote to memory of 2956 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 120 PID 3660 wrote to memory of 4728 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 122 PID 3660 wrote to memory of 4728 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 122 PID 3660 wrote to memory of 4728 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 122 PID 3660 wrote to memory of 4388 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 124 PID 3660 wrote to memory of 4388 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 124 PID 3660 wrote to memory of 4388 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 124 PID 3660 wrote to memory of 4356 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 126 PID 3660 wrote to memory of 4356 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 126 PID 3660 wrote to memory of 4356 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 126 PID 3660 wrote to memory of 1988 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 128 PID 3660 wrote to memory of 1988 3660 e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe 128 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4520 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe"C:\Users\Admin\AppData\Local\Temp\e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3576
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:696
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3316
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4076
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5008
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4968
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3684
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1596
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:208
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3504
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\e4ca5cad2cf43fb9260709dc99dfc8f9e4d81e3dd42c9464b897a6f58a809ef6.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4520
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4196
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3916
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:452
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2956
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4728
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4388
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4356
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1988
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4492
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4880
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3280
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3824
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4240
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD500f6d7885ff6c3e8f9054613cd854748
SHA13e135ef9f8672c0466e6aa14e135687a4dea6bd4
SHA256400c829ece9cbadf86f01726791b78ab2c9ac26205e3541b3de5a8f40364b9b6
SHA5122b1429c0e7bc01a185478b03a63c08b6fa1b40df9bd898ae584a34c81b9205b00c5d3afd2ffc9f9775fe79ed554ff52b7f5f0bc8eaaf6e1500f1e893682eded4