Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2024 19:18
Behavioral task
behavioral1
Sample
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
Resource
win7-20241023-en
General
-
Target
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe
-
Size
2.4MB
-
MD5
5f4e35a011f3717d5ada9865d8867fb0
-
SHA1
cae012e3dcffac07162c72d48f32b62db71b8759
-
SHA256
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
-
SHA512
7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e
-
SSDEEP
49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds policy Run key to start application 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Deletes itself 1 IoCs
pid Process 2616 explorer.exe -
Executes dropped EXE 14 IoCs
pid Process 4320 vmvctr3.exe 4872 vmvctr3.exe 1492 vmvctr3.exe 5080 vmvctr3.exe 3528 vmvctr3.exe 3948 vmvctr3.exe 5000 vmvctr3.exe 4732 vmvctr3.exe 2220 vmvctr3.exe 1684 vmvctr3.exe 400 vmvctr3.exe 900 vmvctr3.exe 3036 vmvctr3.exe 1872 vmvctr3.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4744 set thread context of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4320 set thread context of 3948 4320 vmvctr3.exe 144 PID 4872 set thread context of 5000 4872 vmvctr3.exe 146 PID 1492 set thread context of 4732 1492 vmvctr3.exe 148 PID 5080 set thread context of 2220 5080 vmvctr3.exe 149 PID 3528 set thread context of 1684 3528 vmvctr3.exe 150 PID 3948 set thread context of 1500 3948 vmvctr3.exe 152 PID 400 set thread context of 900 400 vmvctr3.exe 160 PID 3036 set thread context of 1872 3036 vmvctr3.exe 190 -
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4744-2-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4744-6-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/files/0x0007000000023cac-19.dat upx behavioral2/memory/4320-34-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4872-36-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1492-41-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4320-42-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4872-46-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/5080-47-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1492-50-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3528-51-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4320-56-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/4872-65-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/5080-71-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3528-74-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1492-79-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/5080-92-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3528-102-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/400-133-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/400-139-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3036-151-0x0000000000400000-0x0000000000B28000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 explorer.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1500 explorer.exe 1500 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 1500 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 4744 wrote to memory of 1628 4744 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 87 PID 1628 wrote to memory of 3836 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 100 PID 1628 wrote to memory of 3836 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 100 PID 1628 wrote to memory of 3836 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 100 PID 1628 wrote to memory of 3836 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 100 PID 1628 wrote to memory of 4488 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 101 PID 1628 wrote to memory of 4488 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 101 PID 1628 wrote to memory of 3840 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 1628 wrote to memory of 3840 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 1628 wrote to memory of 3840 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 102 PID 1628 wrote to memory of 2616 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 103 PID 1628 wrote to memory of 2616 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 103 PID 1628 wrote to memory of 2616 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 103 PID 1628 wrote to memory of 2616 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 103 PID 1628 wrote to memory of 1392 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 106 PID 1628 wrote to memory of 1392 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 106 PID 1628 wrote to memory of 3320 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 107 PID 1628 wrote to memory of 3320 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 107 PID 1628 wrote to memory of 3320 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 107 PID 1628 wrote to memory of 3932 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 108 PID 1628 wrote to memory of 3932 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 108 PID 1628 wrote to memory of 2988 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 109 PID 1628 wrote to memory of 2988 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 109 PID 1628 wrote to memory of 2988 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 109 PID 1628 wrote to memory of 2904 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 110 PID 1628 wrote to memory of 2904 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 110 PID 1628 wrote to memory of 4368 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 111 PID 1628 wrote to memory of 4368 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 111 PID 1628 wrote to memory of 4368 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 111 PID 1628 wrote to memory of 3940 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 112 PID 1628 wrote to memory of 3940 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 112 PID 1628 wrote to memory of 2372 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 113 PID 1628 wrote to memory of 2372 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 113 PID 1628 wrote to memory of 2372 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 113 PID 1628 wrote to memory of 4380 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 114 PID 1628 wrote to memory of 4380 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 114 PID 1628 wrote to memory of 3972 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 115 PID 1628 wrote to memory of 3972 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 115 PID 1628 wrote to memory of 3972 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 115 PID 1628 wrote to memory of 2608 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 116 PID 1628 wrote to memory of 2608 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 116 PID 1628 wrote to memory of 2288 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 117 PID 1628 wrote to memory of 2288 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 117 PID 1628 wrote to memory of 2288 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 117 PID 1628 wrote to memory of 4356 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 118 PID 1628 wrote to memory of 4356 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 118 PID 1628 wrote to memory of 4364 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 119 PID 1628 wrote to memory of 4364 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 119 PID 1628 wrote to memory of 4364 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 119 PID 1628 wrote to memory of 4412 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 120 PID 1628 wrote to memory of 4412 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 120 PID 1628 wrote to memory of 4324 1628 0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"C:\Users\Admin\AppData\Local\Temp\0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3836 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:5000
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:4732
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5080 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:2220
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3528 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:1684
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4368
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2488
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4500
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3972
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2196
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2532
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2948
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:920
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4940
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1944
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3724
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1476
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4416
-
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:1872
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4488
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3840
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1392
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3932
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2904
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3940
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4380
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2608
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4356
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4412
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4448
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1448
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4756
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4268
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3100
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:5008
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1412
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2948
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2280
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:4360
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD514bae2561a767133725257c6ef55c89e
SHA127f7d1009dcf7205e1709146bede191632374ddf
SHA256af93288f4018559643aef401759c059fa53f05be73568eda783092e9d2aed73a
SHA512f7c3ccad371b08105d286521808e2159320b40afdfee957ba2031264d11ba165aef3f71d814534c42c0d00f5823cd2166101b61b85fb62f21a55785cac70a66e
-
Filesize
1018KB
MD5bc9b20d15be56588dc1716ce4b0aedee
SHA1054a2970bc0c453b656d0ef2bd1a4f4c97707145
SHA25635b282de1c0bd77fac64a1b1f692f521a37a706d9f110a696d428a81e3035120
SHA5120620e13687e7d3441ad0c11f30e5d2345b26da00f38ef299eb624f338f900b24b403600c2b153faa6e22d98a2ca0e2cd1307997e62052f04d2fa2176fe5648cb
-
Filesize
2.4MB
MD55f4e35a011f3717d5ada9865d8867fb0
SHA1cae012e3dcffac07162c72d48f32b62db71b8759
SHA2560f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
SHA5127ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e