Analysis
-
max time kernel
117s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 19:07
Behavioral task
behavioral1
Sample
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
Resource
win7-20241010-en
General
-
Target
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
-
Size
2.4MB
-
MD5
5f4e35a011f3717d5ada9865d8867fb0
-
SHA1
cae012e3dcffac07162c72d48f32b62db71b8759
-
SHA256
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
-
SHA512
7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e
-
SSDEEP
49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds policy Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Executes dropped EXE 15 IoCs
pid Process 668 vmvctr3.exe 3560 vmvctr3.exe 2964 vmvctr3.exe 208 vmvctr3.exe 1628 vmvctr3.exe 2944 vmvctr3.exe 4868 vmvctr3.exe 976 vmvctr3.exe 4672 vmvctr3.exe 3096 vmvctr3.exe 1432 vmvctr3.exe 1932 vmvctr3.exe 2924 vmvctr3.exe 4132 vmvctr3.exe 4976 vmvctr3.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 744 set thread context of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 3560 set thread context of 1932 3560 vmvctr3.exe 151 PID 668 set thread context of 2924 668 vmvctr3.exe 152 PID 2964 set thread context of 4976 2964 vmvctr3.exe 162 -
resource yara_rule behavioral2/memory/744-0-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/744-2-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/744-8-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/files/0x0009000000023cad-21.dat upx behavioral2/memory/668-36-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3560-37-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2964-41-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/668-42-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3560-46-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/208-47-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2964-50-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1628-51-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/208-56-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2944-57-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3560-54-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/668-53-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2964-59-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1628-61-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4868-62-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2944-68-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/976-69-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4868-73-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/208-77-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/976-79-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3096-80-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4672-85-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1432-86-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1628-83-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3560-91-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/668-101-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3096-107-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4132-112-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1432-118-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4132-124-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2944-121-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2964-135-0x0000000000400000-0x0000000000B28000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 744 wrote to memory of 3196 744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 89 PID 3196 wrote to memory of 1680 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 3196 wrote to memory of 1680 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 3196 wrote to memory of 1680 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 3196 wrote to memory of 1680 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 3196 wrote to memory of 2384 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 103 PID 3196 wrote to memory of 2384 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 103 PID 3196 wrote to memory of 1896 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 104 PID 3196 wrote to memory of 1896 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 104 PID 3196 wrote to memory of 1896 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 104 PID 3196 wrote to memory of 4032 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 105 PID 3196 wrote to memory of 4032 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 105 PID 3196 wrote to memory of 4032 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 105 PID 3196 wrote to memory of 1632 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 106 PID 3196 wrote to memory of 1632 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 106 PID 3196 wrote to memory of 1796 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 107 PID 3196 wrote to memory of 1796 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 107 PID 3196 wrote to memory of 1796 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 107 PID 3196 wrote to memory of 2236 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 108 PID 3196 wrote to memory of 2236 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 108 PID 3196 wrote to memory of 4524 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 109 PID 3196 wrote to memory of 4524 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 109 PID 3196 wrote to memory of 4524 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 109 PID 3196 wrote to memory of 1700 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 110 PID 3196 wrote to memory of 1700 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 110 PID 3196 wrote to memory of 2072 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 111 PID 3196 wrote to memory of 2072 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 111 PID 3196 wrote to memory of 2072 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 111 PID 3196 wrote to memory of 728 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 112 PID 3196 wrote to memory of 728 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 112 PID 3196 wrote to memory of 772 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 113 PID 3196 wrote to memory of 772 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 113 PID 3196 wrote to memory of 772 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 113 PID 3196 wrote to memory of 4040 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 114 PID 3196 wrote to memory of 4040 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 114 PID 3196 wrote to memory of 3696 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 115 PID 3196 wrote to memory of 3696 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 115 PID 3196 wrote to memory of 3696 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 115 PID 3196 wrote to memory of 4516 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 116 PID 3196 wrote to memory of 4516 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 116 PID 3196 wrote to memory of 2292 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 117 PID 3196 wrote to memory of 2292 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 117 PID 3196 wrote to memory of 2292 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 117 PID 3196 wrote to memory of 4252 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 118 PID 3196 wrote to memory of 4252 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 118 PID 3196 wrote to memory of 1736 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 119 PID 3196 wrote to memory of 1736 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 119 PID 3196 wrote to memory of 1736 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 119 PID 3196 wrote to memory of 4220 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 120 PID 3196 wrote to memory of 4220 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 120 PID 3196 wrote to memory of 4156 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 121 PID 3196 wrote to memory of 4156 3196 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1680 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:1932
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:4976
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4132
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2384
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1896
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1632
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2236
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1700
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:728
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4040
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4516
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4252
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4220
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2248
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2844
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1756
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1576
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4384
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1640
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:244
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:5080
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4332
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:668 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD514bae2561a767133725257c6ef55c89e
SHA127f7d1009dcf7205e1709146bede191632374ddf
SHA256af93288f4018559643aef401759c059fa53f05be73568eda783092e9d2aed73a
SHA512f7c3ccad371b08105d286521808e2159320b40afdfee957ba2031264d11ba165aef3f71d814534c42c0d00f5823cd2166101b61b85fb62f21a55785cac70a66e
-
Filesize
1018KB
MD5bc9b20d15be56588dc1716ce4b0aedee
SHA1054a2970bc0c453b656d0ef2bd1a4f4c97707145
SHA25635b282de1c0bd77fac64a1b1f692f521a37a706d9f110a696d428a81e3035120
SHA5120620e13687e7d3441ad0c11f30e5d2345b26da00f38ef299eb624f338f900b24b403600c2b153faa6e22d98a2ca0e2cd1307997e62052f04d2fa2176fe5648cb
-
Filesize
2.4MB
MD55f4e35a011f3717d5ada9865d8867fb0
SHA1cae012e3dcffac07162c72d48f32b62db71b8759
SHA2560f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
SHA5127ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e