Resubmissions

22-10-2024 18:14

241022-wvjv4szgnm 10

22-10-2024 18:11

241022-wstmjazfqq 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-10-2024 18:14

General

  • Target

    54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe

  • Size

    1.1MB

  • MD5

    db2082d65265145d992f05920fcaf442

  • SHA1

    84edb3496b2bb8db9fab5dbfaa388724aa3b2214

  • SHA256

    54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500

  • SHA512

    55b05af2666a47d7728e90c0bacdeef50d1401ef423d63ecf20c0400a6a82f86004f1af166857684a097e0c960a9ba1d18ef86144ed8d2bdf98b477bfcc08ebf

  • SSDEEP

    24576:pAT8QE+kiVNpJc7YMQGOna45spYKQMtQY/IYHiQqA245zVYjqGSQy:pAI+XNpJc7YMVItmftJ/UQ12qG5SQy

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:34589

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

5

C2

176.113.115.146:9582

Attributes
  • auth_value

    d38b30c1ccd6c1e5088d9e5bd9e51b0f

Extracted

Family

vidar

Version

53.8

Botnet

1521

C2

http://62.204.41.126:80

Attributes
  • profile_id

    1521

Extracted

Family

raccoon

Botnet

afb5c633c4650f69312baef49db9dfa4

C2

http://193.56.146.177

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Extracted

Family

raccoon

Botnet

76426c3f362f5a47a469f0e9d8bc3eef

C2

http://45.95.11.158/

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe
    "C:\Users\Admin\AppData\Local\Temp\54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RyjC4
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd8
        3⤵
          PID:3440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:2
          3⤵
            PID:2056
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3396
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:1
            3⤵
              PID:660
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:1
              3⤵
                PID:428
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3284 /prefetch:8
                3⤵
                  PID:2076
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:1
                  3⤵
                    PID:1344
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:1
                    3⤵
                      PID:1004
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:1
                      3⤵
                        PID:1064
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:1
                        3⤵
                          PID:1500
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6500 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4884
                        • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6780 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5852
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:1
                          3⤵
                            PID:2776
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:1
                            3⤵
                              PID:4904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                              3⤵
                                PID:2592
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                                3⤵
                                  PID:1644
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,2365910915947467300,6347560507906138161,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5532 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1852
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A4aK4
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3564
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd8
                                  3⤵
                                    PID:1020
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1384,13462553433572456658,545380209235140238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 /prefetch:3
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3532
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RLtX4
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:584
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd8
                                    3⤵
                                      PID:5016
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,17935532651582545493,11717648073671383802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:3
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1552
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX4
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1136
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd8
                                      3⤵
                                        PID:228
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,10470482303104418719,15793906747141680923,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1832 /prefetch:2
                                        3⤵
                                          PID:412
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,10470482303104418719,15793906747141680923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
                                          3⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:876
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1nXvZ4
                                        2⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:3844
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff66b13cb8,0x7fff66b13cc8,0x7fff66b13cd8
                                          3⤵
                                            PID:3056
                                        • C:\Program Files (x86)\Company\NewProduct\F0geI.exe
                                          "C:\Program Files (x86)\Company\NewProduct\F0geI.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:3416
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 792
                                            3⤵
                                            • Program crash
                                            PID:3700
                                        • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe
                                          "C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:4884
                                        • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe
                                          "C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:2988
                                        • C:\Program Files (x86)\Company\NewProduct\real.exe
                                          "C:\Program Files (x86)\Company\NewProduct\real.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:2136
                                        • C:\Program Files (x86)\Company\NewProduct\safert44.exe
                                          "C:\Program Files (x86)\Company\NewProduct\safert44.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:4104
                                        • C:\Program Files (x86)\Company\NewProduct\captain09876.exe
                                          "C:\Program Files (x86)\Company\NewProduct\captain09876.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          PID:4216
                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
                                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5600
                                        • C:\Program Files (x86)\Company\NewProduct\USA1.exe
                                          "C:\Program Files (x86)\Company\NewProduct\USA1.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:868
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:4800
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1852
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5348
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5472
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3416 -ip 3416
                                                1⤵
                                                  PID:2568

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files (x86)\Company\NewProduct\F0geI.exe

                                                  Filesize

                                                  339KB

                                                  MD5

                                                  501e0f6fa90340e3d7ff26f276cd582e

                                                  SHA1

                                                  1bce4a6153f71719e786f8f612fbfcd23d3e130a

                                                  SHA256

                                                  f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b

                                                  SHA512

                                                  dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69

                                                • C:\Program Files (x86)\Company\NewProduct\USA1.exe

                                                  Filesize

                                                  274KB

                                                  MD5

                                                  e4ece4bbfe7280b28a11a1f37998562f

                                                  SHA1

                                                  1b23966e6995cfb455691894dadf8fd9c59503ab

                                                  SHA256

                                                  e43a306cd03ecb7463d9b7f24ed7a2190402c25848297b75f2490bde970b2ef2

                                                  SHA512

                                                  65129084f3f90bda87fd44250e93270292a24af04bf47a4c6cc7f0a5663afa1b51d6a05d37c982636bf89de8dba1bdb5f67292616128e8d92a62b79ceb8c86ea

                                                • C:\Program Files (x86)\Company\NewProduct\captain09876.exe

                                                  Filesize

                                                  704KB

                                                  MD5

                                                  ce94ce7de8279ecf9519b12f124543c3

                                                  SHA1

                                                  be2563e381439ed33869a052391eec1ddd40faa0

                                                  SHA256

                                                  f88d6fc5fd36ef3a9c54cf7101728a39a2a2694a0a64f6af1e1befacfbc03f20

                                                  SHA512

                                                  9697cfc31b3344a2929b02ecdf9235756f4641dbb0910e9f6099382916447e2d06e41c153fad50890823f068ae412fb9a55fd274b3b9c7929f2ca972112cc5b7

                                                • C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe

                                                  Filesize

                                                  764KB

                                                  MD5

                                                  8044b9ea12d49d849f8b516ac3d8173b

                                                  SHA1

                                                  68a078e750dad5befd1212a62c903379c1e3525c

                                                  SHA256

                                                  22850fcde13fdc68136d790dee2f85d48069a029a618ceddfd4c6f90b9845d81

                                                  SHA512

                                                  44df6449741275a07f7a3eeb718a1cff7ab6004a5b7501f28fe4269f8601b6ad2a3e6a7beeff0b41e3f2bdf24b6906d49e04b150ae75a33f9537665e4f39eb28

                                                • C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe

                                                  Filesize

                                                  107KB

                                                  MD5

                                                  bbd8ea73b7626e0ca5b91d355df39b7f

                                                  SHA1

                                                  66e298653beb7f652eb44922010910ced6242879

                                                  SHA256

                                                  1aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e

                                                  SHA512

                                                  625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f

                                                • C:\Program Files (x86)\Company\NewProduct\real.exe

                                                  Filesize

                                                  275KB

                                                  MD5

                                                  a2414bb5522d3844b6c9a84537d7ce43

                                                  SHA1

                                                  56c91fc4fe09ce07320c03f186f3d5d293a6089d

                                                  SHA256

                                                  31f4715777f3be6a4a7b34baf25ebfc7af32dd9a2aae826fc73dca6c44fda173

                                                  SHA512

                                                  408ebb002b3bdb77dc243ced28d852801e68e5ff0dbfa450d3e91b89311fe6a3e8473e749619c285c1a5427d8a117350a3798435ed38b56d1a230f0ae270ec60

                                                • C:\Program Files (x86)\Company\NewProduct\safert44.exe

                                                  Filesize

                                                  246KB

                                                  MD5

                                                  414ffd7094c0f50662ffa508ca43b7d0

                                                  SHA1

                                                  6ec67bd53da2ff3d5538a3afcc6797af1e5a53fb

                                                  SHA256

                                                  d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee

                                                  SHA512

                                                  c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  d91478312beae099b8ed57e547611ba2

                                                  SHA1

                                                  4b927559aedbde267a6193e3e480fb18e75c43d7

                                                  SHA256

                                                  df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043

                                                  SHA512

                                                  4086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  d7145ec3fa29a4f2df900d1418974538

                                                  SHA1

                                                  1368d579635ba1a53d7af0ed89bf0b001f149f9d

                                                  SHA256

                                                  efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59

                                                  SHA512

                                                  5bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  180B

                                                  MD5

                                                  4bc8a3540a546cfe044e0ed1a0a22a95

                                                  SHA1

                                                  5387f78f1816dee5393bfca1fffe49cede5f59c1

                                                  SHA256

                                                  f90fcadf34fbec9cabd9bcfdea0a63a1938aef5ea4c1f7b313e77f5d3f5bbdca

                                                  SHA512

                                                  e75437d833a3073132beed8280d30e4bb99b32e94d8671528aec53f39231c30476afb9067791e4eb9f1258611c167bfe98b09986d1877ca3ed96ea37b8bceecf

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  098c82e6786c3398565ea9c996f2b409

                                                  SHA1

                                                  1c7ba6e1e09d342612d8e11a1964b4020507a106

                                                  SHA256

                                                  7be9911765e1d248ec6d61bd3c24bf087c374ddd6b18200e55ca2b65953eb89c

                                                  SHA512

                                                  a81d0cece34b35c3d4b6307e06307f7ab770d449d717504d737b7c9bb0df36916512352fd5769fcf6c96adc341b004bec2e25d9c04fe93e18b56a1982ac6658e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  43b473bb1588ffd6674c03ec778e21ee

                                                  SHA1

                                                  c8d45df0377a9749c881c8cefea75f34771048ca

                                                  SHA256

                                                  b2d77dfcac904a64bfab2e46d076e6428a10d21040012ef8695536a82c7bfff6

                                                  SHA512

                                                  3635a07014a3f1b830b02d66c0f18bb150b3f533dc3a315cd711e748a69f187308c162a28af3267a4011e424f5410e120bc6e4627698c35c1615382514f0a0af

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  206702161f94c5cd39fadd03f4014d98

                                                  SHA1

                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                  SHA256

                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                  SHA512

                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  b8c580c08e58d47c04a51f318df56b5d

                                                  SHA1

                                                  344da2a737a1ba7f3c5e8cb559f94629e9cfe953

                                                  SHA256

                                                  a7b4c61fb7b37795dfd7c78a7b7cb29ed6284ad9f84565f9634cc07afe87f8bb

                                                  SHA512

                                                  bdf40ee45adf6212f5d31af593f76fae7279dbe149633f4d0411008c10eb724b548dc2530b3d322f932ba3c5a87e35f4e90c64f06381c584b2368fec5d2c84ab

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  b9520afc4444e3400700d82cf7d970ef

                                                  SHA1

                                                  1d32bef8b9b5cca73ccb19c447a589025e025cff

                                                  SHA256

                                                  09a37f72e9830cca5c2b0144a5c507beba87a61839fc0e4be5b7f7717483ea6b

                                                  SHA512

                                                  5014ee16d000ee1e4e5b275a4c4ba428b45215d3a11227e03f9ca291c072db5bfde0ce9f0c4164e0dfc3c3d35e83762d64f4c0901f36c91b72ce30042ac5d933

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  1353ab26c15b501ae84d331b914ad5b7

                                                  SHA1

                                                  5a6806f9e5bf2bbef2108815ce55fc6b5c569f89

                                                  SHA256

                                                  05c30c2d4294ab3a6390b6f83aa651d0ba0965c53d43706e53e08da6f56739f5

                                                  SHA512

                                                  3eb2d6c62904c4d0162fac6354e793c9fe75614d731d6c5773dd973c1044fb467563981f1451272fe0deb20e9306cd9de0af09ab2a533141c4e090938568725f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  0c7db5afb6a1830a2c9d479a8b403d10

                                                  SHA1

                                                  b0a1e27180e4fc73b04cf57813ce6462bdb1b8d3

                                                  SHA256

                                                  4b106dcff7bf5b92d7d107a00eeb8623a7506c7494e0d8d069cc4e5c0804b659

                                                  SHA512

                                                  d22ef29bb8109a91c2f2ab08cb0d90013ab64e5caede82ee32b1aed1cf2a6207301763a66f13386c7dc7ece1480dfde103ef02bc350673155343f6ffa357adfb

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  21ec7725418f2f3d156392cfc62c85e1

                                                  SHA1

                                                  abc5f7bec58ae701fa9df01816486baf40dead20

                                                  SHA256

                                                  26ddd7f9381173c42b545382160bcccfa961d9bdf068acbd37c66cb2b260471a

                                                  SHA512

                                                  691e2c8620f0168f3750ed7a1a060e14fba26b582d5a1cd6f02bb2f4c9ac00b8f422ef5fe09689de58de2b5c6bc911dc38333ddbbae1e34ace64184b0364c864

                                                • memory/2988-153-0x0000000005A90000-0x0000000005AA2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/2988-171-0x0000000007300000-0x000000000734C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/2988-152-0x0000000005B00000-0x0000000006118000-memory.dmp

                                                  Filesize

                                                  6.1MB

                                                • memory/2988-167-0x00000000072C0000-0x00000000072FC000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/2988-159-0x00000000073D0000-0x00000000074DA000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/2988-119-0x0000000000640000-0x0000000000660000-memory.dmp

                                                  Filesize

                                                  128KB

                                                • memory/3416-238-0x0000000000400000-0x000000000046E000-memory.dmp

                                                  Filesize

                                                  440KB

                                                • memory/4092-173-0x0000000000400000-0x0000000000433000-memory.dmp

                                                  Filesize

                                                  204KB

                                                • memory/4104-150-0x0000000002560000-0x0000000002566000-memory.dmp

                                                  Filesize

                                                  24KB

                                                • memory/4104-144-0x00000000003E0000-0x0000000000424000-memory.dmp

                                                  Filesize

                                                  272KB

                                                • memory/4884-176-0x0000000000400000-0x00000000004C5000-memory.dmp

                                                  Filesize

                                                  788KB

                                                • memory/5600-209-0x0000000000E40000-0x0000000000E90000-memory.dmp

                                                  Filesize

                                                  320KB