Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe
Resource
win7-20240903-en
General
-
Target
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe
-
Size
349KB
-
MD5
5b4a51f981f0ffef02fb8e2c942ecc5a
-
SHA1
e294496564f3cd3b8ada092198af2f508dc6f8a7
-
SHA256
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff
-
SHA512
d03c6dfd536169759dc567bd7c57876801e6139cd67aa17c06ecd4bcc2952c9006f8017f5e11237db3203199c8e48101f81e4c6d052d9dcf68e89a6916a37d40
-
SSDEEP
6144:FB1QKZaOpBjQepew/PjuGyFPr527Uf2u/jGw0qun597/QKjJ8zkjDpyAYpI1:FB1Q6rpr7MrswfLjGwW5xFdRyJpy
Malware Config
Extracted
nanocore
1.2.2.2
bemery2.no-ip.biz:57628
127.0.0.1:57628
997af15f-5576-4030-975c-eb3264fb6789
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2015-04-23T21:31:33.540664436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
57628
-
default_group
grace
-
enable_debug_mode
true
-
gc_threshold
1.048576e+08
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+09
-
mutex
997af15f-5576-4030-975c-eb3264fb6789
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
bemery2.no-ip.biz
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.2
-
wan_timeout
8000
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe -
Adds Run key to start application 2 TTPs 18 IoCs
Processes:
REG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeRegAsm.exeREG.exeREG.exeREG.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Subsystem = "C:\\Program Files (x86)\\DPI Subsystem\\dpiss.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\subfolder\\chrome.exe.exe" REG.exe -
Processes:
RegAsm.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exedescription pid Process procid_target PID 2848 set thread context of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 -
Drops file in Program Files directory 2 IoCs
Processes:
RegAsm.exedescription ioc Process File created C:\Program Files (x86)\DPI Subsystem\dpiss.exe RegAsm.exe File opened for modification C:\Program Files (x86)\DPI Subsystem\dpiss.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
attrib.exeping.exeping.exeREG.exeREG.exe8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exeping.exeping.exeping.exeping.exeping.exeREG.exeREG.exeREG.exeREG.exeping.exeping.exeping.exeping.exeping.exeREG.exeREG.exeREG.exeping.exeping.exeREG.exeREG.exeping.exeping.exeping.exeRegAsm.exeREG.exeREG.exeping.exeping.exeping.exeREG.exeREG.exeREG.exeREG.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid Process 3664 ping.exe 2376 ping.exe 4948 ping.exe 3244 ping.exe 1820 ping.exe 3736 ping.exe 1784 ping.exe 768 ping.exe 3900 ping.exe 3488 ping.exe 552 ping.exe 4628 ping.exe 5036 ping.exe 4952 ping.exe 4444 ping.exe 3484 ping.exe 3776 ping.exe 1896 ping.exe 3668 ping.exe 4968 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid Process 552 ping.exe 1784 ping.exe 4444 ping.exe 3488 ping.exe 3776 ping.exe 1896 ping.exe 4968 ping.exe 3664 ping.exe 3736 ping.exe 3900 ping.exe 3484 ping.exe 3668 ping.exe 5036 ping.exe 1820 ping.exe 3244 ping.exe 768 ping.exe 2376 ping.exe 4628 ping.exe 4948 ping.exe 4952 ping.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
RegAsm.exe8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exepid Process 3836 RegAsm.exe 3836 RegAsm.exe 3836 RegAsm.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegAsm.exepid Process 3836 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exeRegAsm.exedescription pid Process Token: SeDebugPrivilege 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe Token: SeDebugPrivilege 3836 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exedescription pid Process procid_target PID 2848 wrote to memory of 1820 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 82 PID 2848 wrote to memory of 1820 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 82 PID 2848 wrote to memory of 1820 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 82 PID 2848 wrote to memory of 4952 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 84 PID 2848 wrote to memory of 4952 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 84 PID 2848 wrote to memory of 4952 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 84 PID 2848 wrote to memory of 3664 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 90 PID 2848 wrote to memory of 3664 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 90 PID 2848 wrote to memory of 3664 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 90 PID 2848 wrote to memory of 3736 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 93 PID 2848 wrote to memory of 3736 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 93 PID 2848 wrote to memory of 3736 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 93 PID 2848 wrote to memory of 1784 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 97 PID 2848 wrote to memory of 1784 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 97 PID 2848 wrote to memory of 1784 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 97 PID 2848 wrote to memory of 3244 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 99 PID 2848 wrote to memory of 3244 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 99 PID 2848 wrote to memory of 3244 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 99 PID 2848 wrote to memory of 4444 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 101 PID 2848 wrote to memory of 4444 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 101 PID 2848 wrote to memory of 4444 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 101 PID 2848 wrote to memory of 768 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 103 PID 2848 wrote to memory of 768 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 103 PID 2848 wrote to memory of 768 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 103 PID 2848 wrote to memory of 3900 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 106 PID 2848 wrote to memory of 3900 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 106 PID 2848 wrote to memory of 3900 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 106 PID 2848 wrote to memory of 3484 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 109 PID 2848 wrote to memory of 3484 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 109 PID 2848 wrote to memory of 3484 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 109 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 3836 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 111 PID 2848 wrote to memory of 756 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 112 PID 2848 wrote to memory of 756 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 112 PID 2848 wrote to memory of 756 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 112 PID 2848 wrote to memory of 3488 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 113 PID 2848 wrote to memory of 3488 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 113 PID 2848 wrote to memory of 3488 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 113 PID 2848 wrote to memory of 3776 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 116 PID 2848 wrote to memory of 3776 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 116 PID 2848 wrote to memory of 3776 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 116 PID 2848 wrote to memory of 1896 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 118 PID 2848 wrote to memory of 1896 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 118 PID 2848 wrote to memory of 1896 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 118 PID 2848 wrote to memory of 552 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 120 PID 2848 wrote to memory of 552 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 120 PID 2848 wrote to memory of 552 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 120 PID 2848 wrote to memory of 2376 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 122 PID 2848 wrote to memory of 2376 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 122 PID 2848 wrote to memory of 2376 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 122 PID 2848 wrote to memory of 4628 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 124 PID 2848 wrote to memory of 4628 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 124 PID 2848 wrote to memory of 4628 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 124 PID 2848 wrote to memory of 4948 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 126 PID 2848 wrote to memory of 4948 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 126 PID 2848 wrote to memory of 4948 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 126 PID 2848 wrote to memory of 3668 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 128 PID 2848 wrote to memory of 3668 2848 8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe 128 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe"C:\Users\Admin\AppData\Local\Temp\8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1820
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4952
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3664
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3736
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1784
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3244
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4444
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:768
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3900
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3484
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\8c467f37af66dda628f7c21e19cb4b2cc4b5f36be6047913d0383a1ce70989ff.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:756
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3488
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3776
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1896
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:552
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2376
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4628
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4948
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3668
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4968
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5036
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:184
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:428
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4332
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4912
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD57772b2903f5109fbd37ab0909ff453b4
SHA1723bb07491d2680f9bf93214474a89a24cdc0eb0
SHA256014fff65cd0c999f154bd94dfc4b0f67c900deecce5f755faf9178d7845f10e6
SHA5126e9c3119e46943a9b01b2bb9a0df8139299656da2cbbdd2ad18737592c20d3d56d1d66da6f87371950d63a677f5ddd87e79e7af0118fe33b66fff6feea9cdbdd