Overview
overview
10Static
static
3Chams Sudd...rs.exe
windows7-x64
10Chams Sudd...rs.exe
windows10-2004-x64
10Chams Sudd...no.dll
windows7-x64
3Chams Sudd...no.dll
windows10-2004-x64
3Perx Wall ...ed.exe
windows7-x64
3Perx Wall ...ed.exe
windows10-2004-x64
3Perx Wall ...no.dll
windows7-x64
3Perx Wall ...no.dll
windows10-2004-x64
3Siyanur la...ck.exe
windows7-x64
7Siyanur la...ck.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
Chams Sudden + Mado,s Injectors/Mado,s Injectors.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chams Sudden + Mado,s Injectors/Mado,s Injectors.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Chams Sudden + Mado_s Injectors/UPDATE Chams Sudden Latino.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Chams Sudden + Mado_s Injectors/UPDATE Chams Sudden Latino.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Perx Wall hack S.ALatino/Perx Updated.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Perx Wall hack S.ALatino/Perx Updated.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Perx Wall hack S.ALatino/UPDATE Chams Sudden Latino.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Perx Wall hack S.ALatino/UPDATE Chams Sudden Latino.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Siyanur lag hack- S.A latino/siyanur - Lag Hack.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Siyanur lag hack- S.A latino/siyanur - Lag Hack.exe
Resource
win10v2004-20241007-en
General
-
Target
Chams Sudden + Mado,s Injectors/Mado,s Injectors.exe
-
Size
199KB
-
MD5
6f04b35e2ab8ef9b793aa3b6b21bd3f3
-
SHA1
456d2013c9c9558153a073bff5666225cb2957e2
-
SHA256
1829c3afcad6a480a1dccf4b33b4728cc731a2d2ad1a59b23566dd3497c80564
-
SHA512
b03d28859a743a2ba45c26091b480c0d7784e41aa44d23751bcfccc0c2afeda6e520d485e692708ce3016a542a79c97f8b08994dbcbd1f7d8da195f45b1930a6
-
SSDEEP
6144:QjbeiZ/rVBPKs27FbbMlIRf20vrtSQPUgXc:Qu8/QgIh/kQPUYc
Malware Config
Extracted
xtremerat
cutosky.dyndns.org
Signatures
-
Detect XtremeRAT payload 3 IoCs
resource yara_rule behavioral1/memory/2744-38-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/1860-47-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2020-68-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\igfxex.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\igfxex.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\igfxex.exe" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\igfxex.exe" Loader.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds policy Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe" igfxex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run igfxex.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run igfxex.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run igfxex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Windows\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Windows\\system32\\igfxex.exe" Loader.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Windows\\system32\\igfxex.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Windows\\system32\\igfxex.exe" Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Loader.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Windows\\system32\\igfxex.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\igxpers = "C:\\Windows\\system32\\igfxex.exe" igfxex.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe restart" igfxex.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q} igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q}\StubPath = "C:\\Windows\\system32\\igfxex.exe restart" igfxex.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q} Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q}\StubPath = "C:\\Windows\\system32\\igfxex.exe restart" Loader.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q}\StubPath = "C:\\Windows\\system32\\igfxex.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4408I5R-TEVI-6M47-6JKR-GTWF030F0F7Q} igfxex.exe -
Executes dropped EXE 13 IoCs
pid Process 1632 MADO_S~1.EXE 2716 Loader.exe 2744 Loader.exe 2916 igfxex.exe 2020 igfxex.exe 664 igfxex.exe 2968 igfxex.exe 668 igfxex.exe 1620 igfxex.exe 2452 igfxex.exe 2272 igfxex.exe 2376 igfxex.exe 1772 igfxex.exe -
Loads dropped DLL 32 IoCs
pid Process 2544 Mado,s Injectors.exe 1632 MADO_S~1.EXE 2544 Mado,s Injectors.exe 2544 Mado,s Injectors.exe 2716 Loader.exe 2716 Loader.exe 2744 Loader.exe 2744 Loader.exe 2744 Loader.exe 2916 igfxex.exe 2916 igfxex.exe 2020 igfxex.exe 2020 igfxex.exe 2020 igfxex.exe 664 igfxex.exe 664 igfxex.exe 1860 svchost.exe 1860 svchost.exe 2968 igfxex.exe 668 igfxex.exe 668 igfxex.exe 1620 igfxex.exe 1860 svchost.exe 1860 svchost.exe 2452 igfxex.exe 2452 igfxex.exe 2272 igfxex.exe 2968 igfxex.exe 2968 igfxex.exe 2376 igfxex.exe 2376 igfxex.exe 1772 igfxex.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Windows\\system32\\igfxex.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Windows\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mado,s Injectors.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Windows\\system32\\igfxex.exe" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Windows\\system32\\igfxex.exe" igfxex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Windows\\system32\\igfxex.exe" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\igxpers = "C:\\Windows\\system32\\igfxex.exe" svchost.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxex.exe igfxex.exe File opened for modification C:\Windows\SysWOW64\igfxex.exe igfxex.exe File opened for modification C:\Windows\SysWOW64\igfxex.exe igfxex.exe File opened for modification C:\Windows\SysWOW64\igfxex.exe igfxex.exe File created C:\Windows\SysWOW64\igfxex.exe Loader.exe File opened for modification C:\Windows\SysWOW64\ Loader.exe File created C:\Windows\SysWOW64\igfxex.exe igfxex.exe File opened for modification C:\Windows\SysWOW64\igfxex.exe igfxex.exe File opened for modification C:\Windows\SysWOW64\igfxex.exe igfxex.exe File opened for modification C:\Windows\SysWOW64\ igfxex.exe File opened for modification C:\Windows\SysWOW64\igfxex.exe Loader.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2716 set thread context of 2744 2716 Loader.exe 33 PID 2916 set thread context of 2020 2916 igfxex.exe 44 PID 664 set thread context of 2968 664 igfxex.exe 54 PID 668 set thread context of 1620 668 igfxex.exe 56 PID 2452 set thread context of 2272 2452 igfxex.exe 66 PID 2376 set thread context of 1772 2376 igfxex.exe 68 -
resource yara_rule behavioral1/memory/2744-28-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2744-33-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2744-30-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2744-38-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2744-37-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2744-35-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1860-47-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2020-68-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mado,s Injectors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MADO_S~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 Loader.exe 2916 igfxex.exe 664 igfxex.exe 668 igfxex.exe 2452 igfxex.exe 2376 igfxex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 1632 2544 Mado,s Injectors.exe 30 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2544 wrote to memory of 2716 2544 Mado,s Injectors.exe 32 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2716 wrote to memory of 2744 2716 Loader.exe 33 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 1860 2744 Loader.exe 34 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 2228 2744 Loader.exe 35 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 584 2744 Loader.exe 36 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 1636 2744 Loader.exe 37 PID 2744 wrote to memory of 2628 2744 Loader.exe 38 PID 2744 wrote to memory of 2628 2744 Loader.exe 38 PID 2744 wrote to memory of 2628 2744 Loader.exe 38 PID 2744 wrote to memory of 2628 2744 Loader.exe 38 PID 2744 wrote to memory of 2628 2744 Loader.exe 38 PID 2744 wrote to memory of 2628 2744 Loader.exe 38 PID 2744 wrote to memory of 2628 2744 Loader.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chams Sudden + Mado,s Injectors\Mado,s Injectors.exe"C:\Users\Admin\AppData\Local\Temp\Chams Sudden + Mado,s Injectors\Mado,s Injectors.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MADO_S~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MADO_S~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Loader.exe"3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\system32\igfxex.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\SysWOW64\igfxex.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1620
-
-
-
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\system32\igfxex.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\SysWOW64\igfxex.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2228
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:584
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2628
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2108
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2340
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1688
-
-
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\system32\igfxex.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\SysWOW64\igfxex.exe"5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2980
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2268
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2176
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2216
-
-
C:\Users\Admin\AppData\Roaming\system32\igfxex.exe"C:\Users\Admin\AppData\Roaming\system32\igfxex.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Users\Admin\AppData\Roaming\system32\igfxex.exe"C:\Users\Admin\AppData\Roaming\system32\igfxex.exe"7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:352
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1284
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2448
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1660
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2464
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:3012
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:324
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:888
-
-
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\system32\igfxex.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Windows\SysWOW64\igfxex.exe"C:\Windows\SysWOW64\igfxex.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5514468d945ec5abfc0f92cc933b8eb12
SHA15c82a888e771ebdf168bd78a1e99b6fbbae8e3eb
SHA256292056d2a81831a7159dd9b61d87232df8f3de5b0150bf48890b5e13db36944b
SHA5123da97b90763a038e0a192a0fefb35eedd8f601689974d23e1ec7f1ded2ebaa7f4fd34d1d2c839f18b770a8e920e00062f04566d016eef628386de331cdaa5a74
-
Filesize
77KB
MD5cb275238e6c08192075e261eecdbc0c8
SHA1d1d7a89ae800bede57ef509de76dce39aff5f84d
SHA2562dce79436d9b5235d04c6e1d0318d2deb2dca03d1decc704cf58fabdff171578
SHA51237940f1f3e8f9f3b7969b9c3410a53102255b6f227ea0ab94d6d7aef541509025c5bdfd0948334fa471a07e7e11a4a57b2f8e7b1191a7113f87ccdd9b00e36de
-
Filesize
420KB
MD52efd4a79ced9c8760b7341199b306e43
SHA1d4addcbb0b769ceb93fb8bd6a0d806137f3e3e05
SHA25664d4c916b2f76cb14c481f8656d04d175fe4520632a97509de1ad320e95f8216
SHA5126e0421c6f298a6ed0182f982ae634eca2b6ace5aae47bf97a626a9dde6ae7db613791a7b0d503334738456dc4ad718eaf21d9b9e69c0a5ee414a75aec372c74f