Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 04:35
Static task
static1
Behavioral task
behavioral1
Sample
f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe
Resource
win7-20240903-en
General
-
Target
f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe
-
Size
349KB
-
MD5
8b8eae7ad113d7ab223a6da5cd36aa94
-
SHA1
75629e504c538c5186f57e8437872cc2f1d23006
-
SHA256
f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755
-
SHA512
d42a55dc53d65dd26aafc8d3edcd81895e8a1678dd8feb3ce45a3e3e21f6dd22d9dd9c1f362436f5634b744f51e61f0b0d6680d5cbf099c630e7dda0bf350030
-
SSDEEP
6144:FB1QKZaOpBjQepew/PjuGyFPr527Uf2u/jGw0qun597/QKjJ8zkjDpyAYpID:FB1Q6rpr7MrswfLjGwW5xFdRyJpA
Malware Config
Extracted
nanocore
1.2.2.2
bemery2.no-ip.biz:57628
127.0.0.1:57628
997af15f-5576-4030-975c-eb3264fb6789
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-04-23T21:31:33.540664436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
57628
-
default_group
grace
-
enable_debug_mode
true
-
gc_threshold
1.048576e+08
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+09
-
mutex
997af15f-5576-4030-975c-eb3264fb6789
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
bemery2.no-ip.biz
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.2
-
wan_timeout
8000
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2072 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Subsystem = "C:\\Program Files (x86)\\WPA Subsystem\\wpass.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 216 set thread context of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WPA Subsystem\wpass.exe RegAsm.exe File opened for modification C:\Program Files (x86)\WPA Subsystem\wpass.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3120 ping.exe 5016 ping.exe 2628 ping.exe 712 ping.exe 4552 ping.exe 4832 ping.exe 4560 ping.exe 652 ping.exe 1700 ping.exe 3912 ping.exe 4596 ping.exe 2752 ping.exe 3872 ping.exe 1804 ping.exe 3884 ping.exe 3976 ping.exe 4964 ping.exe 1364 ping.exe 5056 ping.exe 2932 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 1364 ping.exe 2628 ping.exe 2752 ping.exe 3884 ping.exe 652 ping.exe 2932 ping.exe 4964 ping.exe 5056 ping.exe 3120 ping.exe 3912 ping.exe 3976 ping.exe 5016 ping.exe 3872 ping.exe 1804 ping.exe 4552 ping.exe 4832 ping.exe 4560 ping.exe 1700 ping.exe 4596 ping.exe 712 ping.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3532 RegAsm.exe 3532 RegAsm.exe 3532 RegAsm.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3532 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe Token: SeDebugPrivilege 3532 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 4560 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 82 PID 216 wrote to memory of 4560 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 82 PID 216 wrote to memory of 4560 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 82 PID 216 wrote to memory of 5056 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 88 PID 216 wrote to memory of 5056 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 88 PID 216 wrote to memory of 5056 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 88 PID 216 wrote to memory of 3884 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 91 PID 216 wrote to memory of 3884 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 91 PID 216 wrote to memory of 3884 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 91 PID 216 wrote to memory of 652 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 95 PID 216 wrote to memory of 652 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 95 PID 216 wrote to memory of 652 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 95 PID 216 wrote to memory of 1700 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 97 PID 216 wrote to memory of 1700 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 97 PID 216 wrote to memory of 1700 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 97 PID 216 wrote to memory of 3120 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 99 PID 216 wrote to memory of 3120 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 99 PID 216 wrote to memory of 3120 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 99 PID 216 wrote to memory of 3912 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 101 PID 216 wrote to memory of 3912 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 101 PID 216 wrote to memory of 3912 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 101 PID 216 wrote to memory of 2932 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 103 PID 216 wrote to memory of 2932 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 103 PID 216 wrote to memory of 2932 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 103 PID 216 wrote to memory of 3976 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 107 PID 216 wrote to memory of 3976 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 107 PID 216 wrote to memory of 3976 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 107 PID 216 wrote to memory of 5016 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 109 PID 216 wrote to memory of 5016 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 109 PID 216 wrote to memory of 5016 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 109 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 3532 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 111 PID 216 wrote to memory of 2072 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 112 PID 216 wrote to memory of 2072 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 112 PID 216 wrote to memory of 2072 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 112 PID 216 wrote to memory of 4964 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 113 PID 216 wrote to memory of 4964 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 113 PID 216 wrote to memory of 4964 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 113 PID 216 wrote to memory of 1364 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 116 PID 216 wrote to memory of 1364 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 116 PID 216 wrote to memory of 1364 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 116 PID 216 wrote to memory of 4596 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 118 PID 216 wrote to memory of 4596 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 118 PID 216 wrote to memory of 4596 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 118 PID 216 wrote to memory of 2628 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 120 PID 216 wrote to memory of 2628 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 120 PID 216 wrote to memory of 2628 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 120 PID 216 wrote to memory of 712 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 122 PID 216 wrote to memory of 712 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 122 PID 216 wrote to memory of 712 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 122 PID 216 wrote to memory of 4552 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 124 PID 216 wrote to memory of 4552 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 124 PID 216 wrote to memory of 4552 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 124 PID 216 wrote to memory of 4832 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 126 PID 216 wrote to memory of 4832 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 126 PID 216 wrote to memory of 4832 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 126 PID 216 wrote to memory of 2752 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 128 PID 216 wrote to memory of 2752 216 f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe 128 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2072 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe"C:\Users\Admin\AppData\Local\Temp\f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4560
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5056
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3884
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:652
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1700
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3120
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3912
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2932
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3976
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5016
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\f975dc18b3843351c4d59384d53ede6af68c25e83da40cb495cd9583afb90755.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2072
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4964
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1364
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4596
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2628
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:712
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4552
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4832
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2752
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3872
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1804
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4380
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3344
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD5138b0facde8f72c5ffb8fdbdfff02f85
SHA1199384c0aa69731ef87f8e6adfe0d5a9bfe80aea
SHA25623c6145dba61ce082b4df6465aac9217dd48685935e06056fcbc3d6505404854
SHA5128fd0a213f6b318740fe93a7e2eadcdc64e64ea8aea3ca0a361bf11ae7d1c3f3e400b2415fa60ceb920c125b9bc4d6cc56c884d25031522c52270e82bbf278be2