Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 19:18
Behavioral task
behavioral1
Sample
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
Resource
win7-20241023-en
General
-
Target
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
-
Size
2.4MB
-
MD5
5f4e35a011f3717d5ada9865d8867fb0
-
SHA1
cae012e3dcffac07162c72d48f32b62db71b8759
-
SHA256
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
-
SHA512
7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e
-
SSDEEP
49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds policy Run key to start application 2 TTPs 16 IoCs
Processes:
svchost.exe0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exevmvctr3.exevmvctr3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe -
Executes dropped EXE 10 IoCs
Processes:
vmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exepid process 544 vmvctr3.exe 1276 vmvctr3.exe 3012 vmvctr3.exe 2284 vmvctr3.exe 1552 vmvctr3.exe 1040 vmvctr3.exe 1748 vmvctr3.exe 2632 vmvctr3.exe 2964 vmvctr3.exe 1804 vmvctr3.exe -
Loads dropped DLL 6 IoCs
Processes:
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exesvchost.exepid process 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 332 svchost.exe 332 svchost.exe 332 svchost.exe 332 svchost.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exesvchost.exevmvctr3.exevmvctr3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exedescription pid process target process PID 1736 set thread context of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 544 set thread context of 2284 544 vmvctr3.exe vmvctr3.exe PID 1276 set thread context of 1552 1276 vmvctr3.exe vmvctr3.exe PID 3012 set thread context of 1040 3012 vmvctr3.exe vmvctr3.exe PID 2284 set thread context of 1012 2284 vmvctr3.exe explorer.exe PID 1748 set thread context of 2632 1748 vmvctr3.exe vmvctr3.exe PID 2964 set thread context of 1804 2964 vmvctr3.exe vmvctr3.exe -
Processes:
resource yara_rule behavioral1/memory/1736-0-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1736-2-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1736-26-0x0000000000400000-0x0000000000B28000-memory.dmp upx C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe upx behavioral1/memory/544-54-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1276-58-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/3012-65-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/332-64-0x0000000004B30000-0x0000000005258000-memory.dmp upx behavioral1/memory/544-66-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1276-67-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/544-88-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1276-110-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/3012-135-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1748-146-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/1748-189-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2964-200-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral1/memory/2964-221-0x0000000000400000-0x0000000000B28000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vmvctr3.exevmvctr3.exe0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exesvchost.exevmvctr3.exevmvctr3.exe0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exeexplorer.exevmvctr3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
explorer.exepid process 1012 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exepid process 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exedescription pid process target process PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1736 wrote to memory of 1204 1736 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe PID 1204 wrote to memory of 332 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe svchost.exe PID 1204 wrote to memory of 332 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe svchost.exe PID 1204 wrote to memory of 332 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe svchost.exe PID 1204 wrote to memory of 332 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe svchost.exe PID 1204 wrote to memory of 332 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe svchost.exe PID 1204 wrote to memory of 2936 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2936 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2936 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2936 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2964 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2964 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2964 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2964 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 604 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 604 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 604 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 604 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2924 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2924 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2924 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2924 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 1392 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 1392 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 1392 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 1392 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2868 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2868 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2868 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2868 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2696 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2696 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2696 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2696 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2708 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2708 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2708 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2708 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2724 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2724 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2724 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2724 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2756 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2756 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2756 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2756 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2768 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2768 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2768 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2768 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe explorer.exe PID 1204 wrote to memory of 2816 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2816 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe PID 1204 wrote to memory of 2816 1204 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"2⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:332 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2832
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2752
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3008
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1680
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2368
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1912
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3016
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:3044
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2928
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2692
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2688
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2724
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2768
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2864
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2352
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2136
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:3068
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3048
-
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2936
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2964
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2924
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1392
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2868
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2696
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2708
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2756
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2816
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2352
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2508
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2456
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1588
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1804
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2016
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2764
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1332
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3052
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3040
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1744
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2004
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:868
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1740
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1300
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:544 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1660
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD514bae2561a767133725257c6ef55c89e
SHA127f7d1009dcf7205e1709146bede191632374ddf
SHA256af93288f4018559643aef401759c059fa53f05be73568eda783092e9d2aed73a
SHA512f7c3ccad371b08105d286521808e2159320b40afdfee957ba2031264d11ba165aef3f71d814534c42c0d00f5823cd2166101b61b85fb62f21a55785cac70a66e
-
Filesize
1018KB
MD5bc9b20d15be56588dc1716ce4b0aedee
SHA1054a2970bc0c453b656d0ef2bd1a4f4c97707145
SHA25635b282de1c0bd77fac64a1b1f692f521a37a706d9f110a696d428a81e3035120
SHA5120620e13687e7d3441ad0c11f30e5d2345b26da00f38ef299eb624f338f900b24b403600c2b153faa6e22d98a2ca0e2cd1307997e62052f04d2fa2176fe5648cb
-
Filesize
2.4MB
MD55f4e35a011f3717d5ada9865d8867fb0
SHA1cae012e3dcffac07162c72d48f32b62db71b8759
SHA2560f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
SHA5127ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e