Analysis
-
max time kernel
120s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 19:07
Behavioral task
behavioral1
Sample
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
Resource
win7-20241010-en
General
-
Target
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
-
Size
2.4MB
-
MD5
5f4e35a011f3717d5ada9865d8867fb0
-
SHA1
cae012e3dcffac07162c72d48f32b62db71b8759
-
SHA256
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
-
SHA512
7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e
-
SSDEEP
49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds policy Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Deletes itself 1 IoCs
pid Process 1348 explorer.exe -
Executes dropped EXE 15 IoCs
pid Process 2516 vmvctr3.exe 2188 vmvctr3.exe 3012 vmvctr3.exe 1160 vmvctr3.exe 2232 vmvctr3.exe 1724 vmvctr3.exe 112 vmvctr3.exe 2100 vmvctr3.exe 1248 vmvctr3.exe 1396 vmvctr3.exe 1876 vmvctr3.exe 2296 vmvctr3.exe 1668 vmvctr3.exe 2940 vmvctr3.exe 2912 vmvctr3.exe -
Loads dropped DLL 17 IoCs
pid Process 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 -
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2880-2-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2880-24-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/files/0x0007000000016fc9-40.dat upx behavioral1/memory/2188-65-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2516-64-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/3012-74-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2188-76-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1160-83-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/3012-85-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1160-92-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2232-99-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2516-101-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1724-106-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/112-111-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2188-113-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2100-118-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1248-124-0x0000000000400000-0x0000000000B28000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 2880 wrote to memory of 3032 2880 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 30 PID 3032 wrote to memory of 2008 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 31 PID 3032 wrote to memory of 2008 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 31 PID 3032 wrote to memory of 2008 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 31 PID 3032 wrote to memory of 2008 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 31 PID 3032 wrote to memory of 2008 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 31 PID 3032 wrote to memory of 1972 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 32 PID 3032 wrote to memory of 1972 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 32 PID 3032 wrote to memory of 1972 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 32 PID 3032 wrote to memory of 1972 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 32 PID 3032 wrote to memory of 1136 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 33 PID 3032 wrote to memory of 1136 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 33 PID 3032 wrote to memory of 1136 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 33 PID 3032 wrote to memory of 1136 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 33 PID 3032 wrote to memory of 1348 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 34 PID 3032 wrote to memory of 1348 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 34 PID 3032 wrote to memory of 1348 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 34 PID 3032 wrote to memory of 1348 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 34 PID 3032 wrote to memory of 1348 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 34 PID 3032 wrote to memory of 1588 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 35 PID 3032 wrote to memory of 1588 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 35 PID 3032 wrote to memory of 1588 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 35 PID 3032 wrote to memory of 1588 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 35 PID 3032 wrote to memory of 1624 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 36 PID 3032 wrote to memory of 1624 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 36 PID 3032 wrote to memory of 1624 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 36 PID 3032 wrote to memory of 1624 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 36 PID 3032 wrote to memory of 3044 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 37 PID 3032 wrote to memory of 3044 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 37 PID 3032 wrote to memory of 3044 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 37 PID 3032 wrote to memory of 3044 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 37 PID 3032 wrote to memory of 1060 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 38 PID 3032 wrote to memory of 1060 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 38 PID 3032 wrote to memory of 1060 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 38 PID 3032 wrote to memory of 1060 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 38 PID 3032 wrote to memory of 2508 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 39 PID 3032 wrote to memory of 2508 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 39 PID 3032 wrote to memory of 2508 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 39 PID 3032 wrote to memory of 2508 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 39 PID 3032 wrote to memory of 2996 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 40 PID 3032 wrote to memory of 2996 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 40 PID 3032 wrote to memory of 2996 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 40 PID 3032 wrote to memory of 2996 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 40 PID 3032 wrote to memory of 772 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 41 PID 3032 wrote to memory of 772 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 41 PID 3032 wrote to memory of 772 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 41 PID 3032 wrote to memory of 772 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 41 PID 3032 wrote to memory of 1944 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 42 PID 3032 wrote to memory of 1944 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 42 PID 3032 wrote to memory of 1944 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 42 PID 3032 wrote to memory of 1944 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 42 PID 3032 wrote to memory of 2908 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 43 PID 3032 wrote to memory of 2908 3032 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"2⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1972
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1136
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1348
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1588
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3044
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1060
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2508
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:772
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2908
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2268
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1444
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1016
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2704
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2924
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2968
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1116
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2444
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1208
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:544
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2448
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1180
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2500
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1596
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1120
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1976
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2224
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2992
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1018KB
MD5bc9b20d15be56588dc1716ce4b0aedee
SHA1054a2970bc0c453b656d0ef2bd1a4f4c97707145
SHA25635b282de1c0bd77fac64a1b1f692f521a37a706d9f110a696d428a81e3035120
SHA5120620e13687e7d3441ad0c11f30e5d2345b26da00f38ef299eb624f338f900b24b403600c2b153faa6e22d98a2ca0e2cd1307997e62052f04d2fa2176fe5648cb
-
Filesize
2.4MB
MD55f4e35a011f3717d5ada9865d8867fb0
SHA1cae012e3dcffac07162c72d48f32b62db71b8759
SHA2560f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
SHA5127ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e