Malware Analysis Report

2025-08-10 16:41

Sample ID 241030-q6dkksvejm
Target FormulariomillasbonusLATAM_22247.zip
SHA256 2b73eefd560c148fa9b70c1869434973505a60179e2a4164c822fcd650f63603
Tags
discovery spyware stealer upx defense_evasion
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

2b73eefd560c148fa9b70c1869434973505a60179e2a4164c822fcd650f63603

Threat Level: Likely malicious

The file FormulariomillasbonusLATAM_22247.zip was found to be: Likely malicious.

Malicious Activity Summary

discovery spyware stealer upx defense_evasion

Downloads MZ/PE file

Blocklisted process makes network request

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Looks up external IP address via web service

System Binary Proxy Execution: Verclsid

UPX packed file

Drops file in Program Files directory

Program crash

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Modifies Internet Explorer settings

Modifies system certificate store

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-30 13:52

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-30 13:52

Reported

2024-10-30 13:54

Platform

win10v2004-20241007-es

Max time kernel

135s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\-.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Mozilla Firefox\nsdF52F.tmp C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nsdF530.tmp C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nsdF52F.tmp\ C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nsdF531.tmp C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nsdF532.tmp C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nsdF531.tmp\ C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\-.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\-.exe

"C:\Users\Admin\AppData\Local\Temp\-.exe"

C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe

.\setup-stub.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4960 -ip 4960

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 2672

Network

Country Destination Domain Proto
US 8.8.8.8:53 product-details.mozilla.org udp
NL 18.239.94.78:443 product-details.mozilla.org tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 78.94.239.18.in-addr.arpa udp
US 8.8.8.8:53 104.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 download.mozilla.org udp
US 54.86.121.111:443 download.mozilla.org tcp
US 8.8.8.8:53 14.15.239.18.in-addr.arpa udp
US 8.8.8.8:53 80.41.65.18.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 111.121.86.54.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

memory/1944-0-0x0000000000400000-0x0000000000446000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS89779DC7\setup-stub.exe

MD5 32b1aed8cda8677b31c3cec33b982462
SHA1 5966299d342e5c0a123551c49f97324494cd48ea
SHA256 d7840eea40a5a88af824f24473e95d0227e69c4439d6ea791d50cb94bf0cfb2a
SHA512 b9b33072350eff2f90e8e5bb84af9c78592c39bebeb8abc5775eb4f2cf87de2873e42d2ed3124772ead4b18a5618bf4a519bf334de0d07f2e87f5862c55454c7

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\System.dll

MD5 17ed1c86bd67e78ade4712be48a7d2bd
SHA1 1cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256 bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA512 0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\UAC.dll

MD5 113c5f02686d865bc9e8332350274fd1
SHA1 4fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA256 0d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512 e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\UserInfo.dll

MD5 1b446b36f5b4022d50ffdc0cf567b24a
SHA1 d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA256 2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA512 04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\CityHash.dll

MD5 737379945745bb94f8a0dadcc18cad8d
SHA1 6a1f497b4dc007f5935b66ec83b00e5a394332c6
SHA256 d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a
SHA512 c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

memory/4960-34-0x00000000023F0000-0x00000000023FF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\InetBgDL.dll

MD5 d4f7b4f9c296308e03a55cb0896a92fc
SHA1 63065bed300926a5b39eabf6efdf9296ed46e0cc
SHA256 6b553f94ac133d8e70fac0fcaa01217fae24f85d134d3964c1beea278191cf83
SHA512 d4acc719ae29c53845ccf4778e1d7ed67f30358af30545fc744facdb9f4e3b05d8cb7dc5e72c93895259e9882471c056395ab2e6f238310841b767d6acbcd6c1

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\WebBrowser.dll

MD5 dfe24aa39f009e9d98b20b7c9cc070b1
SHA1 f48e4923c95466f689e8c5408265b52437ed2701
SHA256 8ec65a3d8ae8a290a6066773e49387fd368f5697392dfb58eac1b63640e30444
SHA512 665ce32d3776b1b41f95ed685054a796d0c1938dbc237619fa6309d1b52ae3bd44e3cf0a1f53ebf88556f7603111cca6dff1bfc917a911e0a9ce04affd0d5261

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\installing.html

MD5 32de55f44c497811dd7ed7f227f5c28d
SHA1 c111be08e7f3d268e7a2ed160d0c30833f25ae4a
SHA256 6259f3a41a703f13466503e6fbd37ca40e94f565a2f4b4087fbcd87a13bf3ee1
SHA512 48bb6f24b3ee2f4b7052205a3843ea34f917ee192b70261d2438c037b0e17d48bce8beb4c31be4141e9618922a45b6b47745b797e5618f18fe00bfc1625309ef

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\stub_common.js

MD5 58b8ac894c64370cfa137f5848aeb88d
SHA1 6a1ac1f88a918a232b79fe798b2de69cf433945f
SHA256 0e28aa770b0afade30be85c6dc1e50344db8f8cdd3fa01989d81a9e20a4990bd
SHA512 ae309518e0f926021e4d9378950c1a375263247d4f79d8a8cc09464cd01653ae5e707d52a4b0c36d532e649c246f4be6b5ba8648f58fb0e3e40c495ae63180ab

C:\Users\Admin\AppData\Local\Temp\nsjF500.tmp\installing.js

MD5 dfa7861bca754036ab853b3bb02b194d
SHA1 46d7c5ba614b39caa4857fcba4bdedbabb2c67c0
SHA256 2c286b6eefd38f032a385f3ac6a1f794deab3bac0fbff71bd0ba21453f477878
SHA512 c58d96fb2496a84261a5e4b18cf4156a30f9ad161bbabc3652b6b5c24976f1ac432dced31927a9443260cdca0292524d1f691766b7c0731f926d37be11fe0c64

memory/1944-85-0x0000000000400000-0x0000000000446000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-10-30 13:52

Reported

2024-10-30 13:54

Platform

win7-20240903-es

Max time kernel

121s

Max time network

123s

Command Line

cmd /c "C:\Users\Admin\AppData\Local\Temp\FormulariomillasbonusLATAM_ZmRftcN8bM1W0r.cmd"

Signatures

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A

System Binary Proxy Execution: Verclsid

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\verclsid.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 920 wrote to memory of 1416 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 920 wrote to memory of 1416 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 920 wrote to memory of 1416 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 920 wrote to memory of 2512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 920 wrote to memory of 2512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 920 wrote to memory of 2512 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2512 wrote to memory of 2368 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2512 wrote to memory of 2368 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2512 wrote to memory of 2368 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2776 wrote to memory of 548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
PID 2776 wrote to memory of 548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
PID 2776 wrote to memory of 548 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
PID 2776 wrote to memory of 2036 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
PID 2776 wrote to memory of 2036 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
PID 2776 wrote to memory of 2036 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
PID 2036 wrote to memory of 792 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2036 wrote to memory of 792 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2036 wrote to memory of 792 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Windows\system32\cmd.exe

cmd /c "C:\Users\Admin\AppData\Local\Temp\FormulariomillasbonusLATAM_ZmRftcN8bM1W0r.cmd"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo %DL1H1T6DTG5P% "

C:\Windows\system32\cmd.exe

cmd.exe /c powershell.exe -exec bypass -nop -win 1 -

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -exec bypass -nop -win 1 -

C:\Windows\system32\verclsid.exe

"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FormulariomillasbonusLATAM_ZmRftcN8bM1W0r.cmd"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo %DL1H1T6DTG5P% "

C:\Windows\system32\cmd.exe

cmd.exe /c powershell.exe -exec bypass -nop -win 1 -

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -exec bypass -nop -win 1 -

Network

Country Destination Domain Proto
DE 172.104.150.66:80 172.104.150.66 tcp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:80 ipinfo.io tcp
DE 172.104.150.66:8901 tcp
DE 172.104.150.66:80 172.104.150.66 tcp

Files

memory/2368-4-0x000007FEF657E000-0x000007FEF657F000-memory.dmp

memory/2368-5-0x000000001B670000-0x000000001B952000-memory.dmp

memory/2368-7-0x000007FEF62C0000-0x000007FEF6C5D000-memory.dmp

memory/2368-6-0x00000000026C0000-0x00000000026C8000-memory.dmp

memory/2368-12-0x0000000002A40000-0x0000000002A4A000-memory.dmp

memory/2368-13-0x000007FEF62C0000-0x000007FEF6C5D000-memory.dmp

memory/2368-11-0x000007FEF62C0000-0x000007FEF6C5D000-memory.dmp

memory/2368-10-0x000000001B960000-0x000000001B9A6000-memory.dmp

memory/2368-14-0x0000000002D10000-0x0000000002D18000-memory.dmp

memory/2368-9-0x000007FEF62C0000-0x000007FEF6C5D000-memory.dmp

memory/2368-8-0x00000000028B0000-0x00000000028BE000-memory.dmp

memory/2368-15-0x000007FEF62C0000-0x000007FEF6C5D000-memory.dmp

memory/2368-16-0x000000001BE20000-0x000000001BE6E000-memory.dmp

memory/2368-17-0x000000001BEA0000-0x000000001BEAC000-memory.dmp

memory/2368-19-0x000000001BEB0000-0x000000001BEC0000-memory.dmp

memory/2368-21-0x000007FEF62C0000-0x000007FEF6C5D000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c62d774a6e52696a3995cf08f6ca2277
SHA1 51553e45e03fe53a29d895dcc9b805ef8c8f6bdd
SHA256 cf636c36bade577a75fe0a7d30bc62587c999f180668b927ba30edcc5e4f712c
SHA512 6af99678a33585187221c0aedd3c81b052e5699a601ba0ebc8ebdd24621038cea70f62a2a66a8f1d47e5f34402b133570fab1bebf8e410c9679167c8c26619c4

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FB9BVWVQ43ZL6S6I9MA7.temp

MD5 c5a0a905734d4ff0debfd8cc276a4343
SHA1 bce6fa8a609bb156f6452862bb76cd726b7749c1
SHA256 9d896c97fd9a92f469c77a5aa80701ad8e4ed877ffe5851cbd006534dabc8aa0
SHA512 8f6e0cc124434251e452698c8045917141c305961a1fa39c208cd3777dc8cad79ee205c535db59d9cffd9f858fe7359d8a2d27155c84794881ad1901a9e897e0

memory/792-27-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

memory/792-28-0x0000000002890000-0x0000000002898000-memory.dmp

memory/792-29-0x00000000028B0000-0x00000000028BE000-memory.dmp

memory/792-30-0x0000000002DF0000-0x0000000002E36000-memory.dmp

memory/792-32-0x0000000002AA0000-0x0000000002AA8000-memory.dmp

memory/792-31-0x00000000028D0000-0x00000000028DA000-memory.dmp

memory/792-33-0x000000001B5D0000-0x000000001B61E000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-10-30 13:52

Reported

2024-10-30 13:54

Platform

win10v2004-20241007-es

Max time kernel

105s

Max time network

115s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FormulariomillasbonusLATAM_ZmRftcN8bM1W0r.cmd"

Signatures

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1448 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 1448 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 1448 wrote to memory of 5116 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 1448 wrote to memory of 5116 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 5116 wrote to memory of 2084 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5116 wrote to memory of 2084 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FormulariomillasbonusLATAM_ZmRftcN8bM1W0r.cmd"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo %DL1H1T6DTG5P% "

C:\Windows\system32\cmd.exe

cmd.exe /c powershell.exe -exec bypass -nop -win 1 -

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -exec bypass -nop -win 1 -

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
DE 172.104.150.66:80 172.104.150.66 tcp
US 8.8.8.8:53 ipinfo.io udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 66.150.104.172.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 34.117.59.81:80 ipinfo.io tcp
DE 172.104.150.66:8901 tcp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

memory/2084-0-0x00007FF9D3C93000-0x00007FF9D3C95000-memory.dmp

memory/2084-1-0x00000136B2460000-0x00000136B24E2000-memory.dmp

memory/2084-2-0x0000013698050000-0x0000013698072000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_34sukrow.adf.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2084-12-0x0000013698080000-0x0000013698090000-memory.dmp

memory/2084-13-0x00000136B2700000-0x00000136B2802000-memory.dmp

memory/2084-14-0x00007FF9D3C90000-0x00007FF9D4751000-memory.dmp

memory/2084-15-0x00007FF9D3C90000-0x00007FF9D4751000-memory.dmp

memory/2084-16-0x00000136B25F0000-0x00000136B2634000-memory.dmp

memory/2084-17-0x00000136B2B80000-0x00000136B2BF6000-memory.dmp

memory/2084-18-0x00000136B2660000-0x00000136B267E000-memory.dmp

memory/2084-21-0x00007FF9D3C90000-0x00007FF9D4751000-memory.dmp

memory/2084-22-0x00007FF9D3C90000-0x00007FF9D4751000-memory.dmp

memory/2084-25-0x00007FF9D3C90000-0x00007FF9D4751000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-30 13:52

Reported

2024-10-30 13:54

Platform

win7-20241023-es

Max time kernel

150s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\-.exe"

Signatures

Downloads MZ/PE file

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Mozilla Firefox\defaultagent.ini C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-locale-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-runtime-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\ucrtbase.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\softokn3.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\mozglue.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\defaultagent_localized.ini C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\AccessibleHandler.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\libEGL.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-string-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\dependentlibs.list C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\features\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-math-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-timezone-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-synch-l1-2-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\tobedeleted\nsoC562.tmp C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nss3.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nsd9542.tmp C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\nssckbi.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.ini C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-private-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\uninstall\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\updater.ini C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\lgpllibs.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l1-2-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-processthreads-l1-1-1.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\defaults\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\vcruntime140.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-conio-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\qipcap64.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-filesystem-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\fonts\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\xul.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-environment-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\omni.ja C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\mozavcodec.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-convert-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\ C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe.sig C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\notificationserver.dll C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\-.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54362000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 2396 wrote to memory of 1092 N/A C:\Users\Admin\AppData\Local\Temp\-.exe C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe
PID 1092 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe
PID 1092 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe
PID 1092 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe
PID 1092 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe
PID 1504 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe

Processes

C:\Users\Admin\AppData\Local\Temp\-.exe

"C:\Users\Admin\AppData\Local\Temp\-.exe"

C:\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe

.\setup-stub.exe

C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe

"C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\download.exe" /LaunchedFromStub /INI=C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\config.ini

C:\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe

.\setup.exe /LaunchedFromStub /INI=C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\config.ini

Network

Country Destination Domain Proto
US 8.8.8.8:53 download.mozilla.org udp
US 54.86.121.111:443 download.mozilla.org tcp
US 8.8.8.8:53 download-installer.cdn.mozilla.net udp
US 34.117.35.28:443 download-installer.cdn.mozilla.net tcp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 2.18.190.73:80 r11.o.lencr.org tcp

Files

memory/2396-0-0x0000000000400000-0x0000000000446000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zSC59494B6\setup-stub.exe

MD5 32b1aed8cda8677b31c3cec33b982462
SHA1 5966299d342e5c0a123551c49f97324494cd48ea
SHA256 d7840eea40a5a88af824f24473e95d0227e69c4439d6ea791d50cb94bf0cfb2a
SHA512 b9b33072350eff2f90e8e5bb84af9c78592c39bebeb8abc5775eb4f2cf87de2873e42d2ed3124772ead4b18a5618bf4a519bf334de0d07f2e87f5862c55454c7

\Users\Admin\AppData\Local\Temp\nst9500.tmp\System.dll

MD5 17ed1c86bd67e78ade4712be48a7d2bd
SHA1 1cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256 bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA512 0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

\Users\Admin\AppData\Local\Temp\nst9500.tmp\UAC.dll

MD5 113c5f02686d865bc9e8332350274fd1
SHA1 4fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA256 0d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512 e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284

\Users\Admin\AppData\Local\Temp\nst9500.tmp\UserInfo.dll

MD5 1b446b36f5b4022d50ffdc0cf567b24a
SHA1 d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA256 2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA512 04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

memory/1092-33-0x00000000003E0000-0x00000000003EF000-memory.dmp

\Users\Admin\AppData\Local\Temp\nst9500.tmp\CityHash.dll

MD5 737379945745bb94f8a0dadcc18cad8d
SHA1 6a1f497b4dc007f5935b66ec83b00e5a394332c6
SHA256 d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a
SHA512 c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22

\Users\Admin\AppData\Local\Temp\nst9500.tmp\WebBrowser.dll

MD5 dfe24aa39f009e9d98b20b7c9cc070b1
SHA1 f48e4923c95466f689e8c5408265b52437ed2701
SHA256 8ec65a3d8ae8a290a6066773e49387fd368f5697392dfb58eac1b63640e30444
SHA512 665ce32d3776b1b41f95ed685054a796d0c1938dbc237619fa6309d1b52ae3bd44e3cf0a1f53ebf88556f7603111cca6dff1bfc917a911e0a9ce04affd0d5261

C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\installing.html

MD5 32de55f44c497811dd7ed7f227f5c28d
SHA1 c111be08e7f3d268e7a2ed160d0c30833f25ae4a
SHA256 6259f3a41a703f13466503e6fbd37ca40e94f565a2f4b4087fbcd87a13bf3ee1
SHA512 48bb6f24b3ee2f4b7052205a3843ea34f917ee192b70261d2438c037b0e17d48bce8beb4c31be4141e9618922a45b6b47745b797e5618f18fe00bfc1625309ef

C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\stub_common.js

MD5 58b8ac894c64370cfa137f5848aeb88d
SHA1 6a1ac1f88a918a232b79fe798b2de69cf433945f
SHA256 0e28aa770b0afade30be85c6dc1e50344db8f8cdd3fa01989d81a9e20a4990bd
SHA512 ae309518e0f926021e4d9378950c1a375263247d4f79d8a8cc09464cd01653ae5e707d52a4b0c36d532e649c246f4be6b5ba8648f58fb0e3e40c495ae63180ab

C:\Users\Admin\AppData\Local\Temp\nst9500.tmp\installing.js

MD5 dfa7861bca754036ab853b3bb02b194d
SHA1 46d7c5ba614b39caa4857fcba4bdedbabb2c67c0
SHA256 2c286b6eefd38f032a385f3ac6a1f794deab3bac0fbff71bd0ba21453f477878
SHA512 c58d96fb2496a84261a5e4b18cf4156a30f9ad161bbabc3652b6b5c24976f1ac432dced31927a9443260cdca0292524d1f691766b7c0731f926d37be11fe0c64

\Users\Admin\AppData\Local\Temp\nst9500.tmp\InetBgDL.dll

MD5 d4f7b4f9c296308e03a55cb0896a92fc
SHA1 63065bed300926a5b39eabf6efdf9296ed46e0cc
SHA256 6b553f94ac133d8e70fac0fcaa01217fae24f85d134d3964c1beea278191cf83
SHA512 d4acc719ae29c53845ccf4778e1d7ed67f30358af30545fc744facdb9f4e3b05d8cb7dc5e72c93895259e9882471c056395ab2e6f238310841b767d6acbcd6c1

C:\Users\Admin\AppData\Local\Temp\CabA4FE.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarA61A.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

memory/2396-122-0x0000000000400000-0x0000000000446000-memory.dmp

\Users\Admin\AppData\Local\Temp\nst9500.tmp\CertCheck.dll

MD5 2979f933cbbac19cfe35b1fa02cc95a4
SHA1 4f208c9c12199491d7ba3c1ee640fca615e11e92
SHA256 bcb6572fcb846d5b4459459a2ef9bde97628782b983eb23fadacbaec76528e6f
SHA512 61f07c54e0aaa59e23e244f3a7fd5e6a6c6a00730d55add8af338e33431ed166d156a66455a4f9321cafbce297e770abc1cb65f7410923cb2b5e5067d1768096

memory/1092-166-0x0000000005940000-0x0000000005986000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS0E5CE5E6\setup.exe

MD5 6e3a28d05ee41af8249955a225c10d56
SHA1 9c76a6a650644800724326d0114e6e2603a09bcd
SHA256 358a7531ad0ba8da5b81df5e9a4188a4c5ab3cc7b9aebf2aa89e44f1487a1278
SHA512 7479daf7bf66196768bad1597454732c109b8df3b2a83e0da6315b4b2028fb2011befd6abc7dc3ebf8b245993c794df161594047243142e3dfca56cb1032eea5

\Users\Admin\AppData\Local\Temp\nstD4AE.tmp\System.dll

MD5 b361682fa5e6a1906e754cfa08aa8d90
SHA1 c6701aee0c866565de1b7c1f81fd88da56b395d3
SHA256 b711c4f17690421c9dc8ddb9ed5a9ddc539b3a28f11e19c851e25dcfc7701c04
SHA512 2778f91c9bcf83277d26c71118a1ccb0fb3ce50e89729f14f4915bc65dd48503a77b1e5118ce774dea72f5ce3cc8681eb9ca3c55cf90e9f61a177101ba192ae9

memory/1504-308-0x0000000000400000-0x0000000000446000-memory.dmp