Analysis
-
max time kernel
31s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe
Resource
win10v2004-20240802-en
General
-
Target
605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe
-
Size
404KB
-
MD5
24ee596bc8112bf2fb1a2bb592de5f48
-
SHA1
b68b950551a71f04e1ecdda894ce35b7702a18c2
-
SHA256
605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901
-
SHA512
e6f5dd23b0ca48e871a1193b1cf46b011aab00a051db109c64d8ac38176bbd2b176ddaefbd47df17cd59f76529ea4c997cb11edb2ff47fe5fd3a5f92b1edc512
-
SSDEEP
12288:rX25ztpOkX88ZnbKnBVRYRzv3UcwtfDWXBcJ45G35UEO:TC6s889Yr0D3UcqWXBwWy5Ut
Malware Config
Extracted
vidar
11
486564c74cdd6745c0139d65a01027e6
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
vidar
11
8b4d47586874b08947203f03e4db3962
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://underlinemdsj.site/api
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral1/memory/2180-7-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-11-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-16-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-15-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-8-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-6-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-162-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-181-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-211-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-230-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-362-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-381-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-424-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2180-443-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2524-580-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2524-584-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2524-588-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2524-590-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2524-587-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2524-582-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 2256 IDAEHCFHJJ.exe 660 GHJKEHJEGC.exe 2332 IDBAFHDGDG.exe 1608 AdminAEHDAKFIJJ.exe 2056 AdminKFBAECBAEG.exe -
Loads dropped DLL 18 IoCs
pid Process 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2632 RegAsm.exe 2632 RegAsm.exe 2412 cmd.exe 2408 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2504 set thread context of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2256 set thread context of 2248 2256 IDAEHCFHJJ.exe 39 PID 660 set thread context of 2524 660 GHJKEHJEGC.exe 43 PID 2332 set thread context of 2632 2332 IDBAFHDGDG.exe 46 PID 1608 set thread context of 2872 1608 AdminAEHDAKFIJJ.exe 59 PID 2056 set thread context of 2776 2056 AdminKFBAECBAEG.exe 61 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminAEHDAKFIJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GHJKEHJEGC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminKFBAECBAEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDAEHCFHJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDBAFHDGDG.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1320 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2180 RegAsm.exe 2632 RegAsm.exe 2524 RegAsm.exe 2632 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2916 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 31 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2920 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 32 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2504 wrote to memory of 2180 2504 605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe 33 PID 2180 wrote to memory of 2256 2180 RegAsm.exe 37 PID 2180 wrote to memory of 2256 2180 RegAsm.exe 37 PID 2180 wrote to memory of 2256 2180 RegAsm.exe 37 PID 2180 wrote to memory of 2256 2180 RegAsm.exe 37 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2256 wrote to memory of 2248 2256 IDAEHCFHJJ.exe 39 PID 2180 wrote to memory of 660 2180 RegAsm.exe 40 PID 2180 wrote to memory of 660 2180 RegAsm.exe 40 PID 2180 wrote to memory of 660 2180 RegAsm.exe 40 PID 2180 wrote to memory of 660 2180 RegAsm.exe 40 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 1732 660 GHJKEHJEGC.exe 42 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43 PID 660 wrote to memory of 2524 660 GHJKEHJEGC.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe"C:\Users\Admin\AppData\Local\Temp\605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\ProgramData\IDAEHCFHJJ.exe"C:\ProgramData\IDAEHCFHJJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2248
-
-
-
C:\ProgramData\GHJKEHJEGC.exe"C:\ProgramData\GHJKEHJEGC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
-
C:\ProgramData\IDBAFHDGDG.exe"C:\ProgramData\IDBAFHDGDG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAEHDAKFIJJ.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Users\AdminAEHDAKFIJJ.exe"C:\Users\AdminAEHDAKFIJJ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminKFBAECBAEG.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Users\AdminKFBAECBAEG.exe"C:\Users\AdminKFBAECBAEG.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IECBAFCAAKJD" & exit3⤵
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d35016895f29dd6993413730160a386a
SHA1a52d604a695e6b809cf7f8b3e492a1ad3201f9ce
SHA256c62387eac98214d6b115c0c3cd2342b5bde180c6fb3f3180fbe29880f3f772c4
SHA5126d8f14ade80b554ba9e3ad859708f8c97c9458a272c09da0a318b2c68345505b7a3fa68113ae851b65ccfeebe371adff3926abbb0edabc5684f495cd36b56f3d
-
Filesize
92KB
MD52cd7a684788f438d7a7ae3946df2e26f
SHA13e5a60f38395f3c10d9243ba696468d2bb698a14
SHA2562ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d
SHA5120fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
165KB
MD5ebd40e455e52c4f8dd7b5e878a9f1144
SHA193a315175e170d4c8c6e58fc6ea9fd7cf3ae6095
SHA25629fe4201aeb40b09a71c03627ae4e17eecfbdd629b8318ee42c052e4ac22e9e0
SHA512450318160a1a5014d2c8f986eb07342cc56f747d7b2f0d7cf4503d0c7942dd8921f44b258a0d692b6abda5bc74a4012a67e2a0ad0fe3116c2c809bebcc3ee610
-
Filesize
178KB
MD508018452ba5445238b23992250b7e5b6
SHA10fb0a00cf90c29af5ce1bfc3f99ac4327f030dc5
SHA2564e401ed11beacbd20d9558a32e6aa32c1158a467c441e41ba801df045ef5829f
SHA512adb8986ba8a93a1debd490c075ae231d94fe55b9b8cd1e6a77f01b69cffe3271622b7358097bfcebe079a784dec64e692167ad0c79b9a5cc2102de5ecc57f540
-
Filesize
182KB
MD5394d1cd96503065462fb339788b1571e
SHA1491a519fc6c7fb2d0e2ba66b1129e2063d14a1d7
SHA2569c08985a026d3bcd69946f0c3f1334a64f37291fd9176f9395d05f40dbeaf4cb
SHA512040af68275c464c50a37902e794bac4df68a5088e0b578bd872ef7e615b846e78c4a75039717b671bf21bbf7b0299caff470fe7dcef5bd32f0da5300e3aa55f2
-
Filesize
9KB
MD585ec41a6cc19151a69777e244c609f8d
SHA1cceaf26d9237a06249b3d31349ca028a4e16878e
SHA2568d3de0746f1c06094686411b9dffc7d7c634bacf70ec3d7b004135b200c331e3
SHA512df89fb27992c5062f10ec8afcbf316586dac6e0a5564e8203514c677610e2bffdc2f422c1a3da135c1475f82c2e6fbed81ee00f27ba1b25699e6438b53cccf3f
-
Filesize
15KB
MD5c7361e97f8ab7c9f89c51c64d740b0f1
SHA1e07b78d88e504b28aeff0a9f59fc75c348022797
SHA256fa69d3c5893f910bb61a8cd464258b1d62024850ce95e62bd2f2fc5e1d34178e
SHA5129b956df20c59f8488db3743d1167f1f8902a8318fb5d9e8478857e2f35c6e0e82d56df3363f374eb5b10524a200876e5ad53c5fc2ad1977d820c224f645062b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD553531d3b1632c42fbb5282b61f41eb70
SHA13e57dd0a3966162c6bf62d02cef4abcff03c1159
SHA256b949b4e92e2803878a2b71476a58d2cbfd53c95ab7bb1583ce4e77398f135105
SHA51260d25185037c526ac8a8c928891c2ea5fe3a5d8d24fd536b36bdaea07953350aa25c45038c5b0db4166912da3ea502a959dd4de7dd6f602d2d6cdd1d349c73b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527df5104d8f8ba13b06c61ff1451e5dc
SHA1b50ab3866c82ee2d09115a3f81c99b7fb7972417
SHA256b6a1c4e4bb5fc58b585d70cc7720291d095cd0710c4fad5708cbd0ed2eb0c5f6
SHA5125b57842d1ee21f5877af40337d7a898f43fe19c397efbee8c1af53c4c6b5d625b6bb0b7a24062233a05ff68df9022b5c1ec05cf308fba33fbde406de73cf022d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c47dacdff7ca2c645c1585820312d31
SHA164ca9183357064b57c4e7b38df1dbede0bd00c43
SHA256ccfe1bf72d24405beefc3918cb74b75de23b9fe0423f6bf01588e04bce334808
SHA512264aaec81b69ef2cba4407a8b9919e92d8ad1747643a198710fa7b3f5b5590948c567b348b265ecc8ccc02695edd4e446cf6d52791506a68eea4b93324cd4788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD599dafa699c9d1cbe585a6f939f841bdd
SHA1a2eb336d59fc690c9d8ef2c128da77b05f68e4b8
SHA256df3523c42468c1038efcbcc5286c360c7d097b8b7426e91695004aa2187d6454
SHA5128620903121067897cedeb1c0978cce3ca020b1dff44743a8c7207b592f87ceb87e8ce64bb6b316840afb5f5f151492c2077c5932a585077beac1ff26b1198247
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\76561199780418869[1].htm
Filesize33KB
MD59686c3d7619ee7b5054a02f624033961
SHA1ba561f7437bbf3ba2f5424bc0d9f11f68be1c580
SHA25605aa2ef14bb927b763e5e6c003ba77619a2f8e1d3280376c03c5450f98d205c1
SHA512cf9d344f1f29b1ea57523ab6a3d490736d01104612a1c9b53085a8e0221b253ae02ed205950bb181ffe86c041479067ed4617ea0e6c17b9464cec59c409883ad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\76561199780418869[1].htm
Filesize33KB
MD52066ee5c2b0d44c84bc10460ddb3a65a
SHA11ca49675bc006ec7e0b930e4e75b183bc1ddeba8
SHA2564ddeb434945d30c15cddb63742511fb6d116d8a373b0077a85991239948d609e
SHA512e2478f481e0c357decd23009dfcfc2ac662c7aaf55a84a12b7e77020a07d7f3f09132fef7f60610e0b0a1afcb0ae493cf46391e3f028b0303b8e1d3519a38df8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
404KB
MD54f828f95c11479c61692052d9254022a
SHA168f1fbe839f2d41f434bdde176ccc3e6f38ec503
SHA25600c39991e9994d94f4fc657f7072c7e4137baf5aa27961cf5451daf6b3cda75a
SHA51291cc6dc01a62337c542c31337057653c5e41ae7b88621bc1041786a260a5b78fb834869ce8aeca05ab8263c45a41fa7833ee262440d157206b1ddae675d814f5
-
Filesize
372KB
MD58a73502b83ceb6b31b9fefb595876844
SHA141094748fdc11cd79057c14c39210d6833a25323
SHA256af60c2dd60ece7f8e83870b22b1c5c0e095c9c3669171c16eaaff406cda6eeb2
SHA512e5bf9b9b78c8306c13df04db83bbe4c76f0914fffde4bd584a5b96da5150102167df61b1315382a5af68038c2d3cdbd2e2414082659757c402979d3c3772b82c
-
Filesize
327KB
MD5dfd49d1326704cfeee9852999782e4b6
SHA14bd1c441c55ec55a1cac7ca2bfe786a739cb01a4
SHA2562280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef
SHA512fe9e9537f76bf36b6e6abd340ef135d5d017bb2b067239f6871f5a8952d2a5b823dd89838b8d31a928b40a1a70bd83010e5f3f49905672fbcd74b763d65504bf
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571