Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
361s -
max time network
354s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/11/2024, 01:34
Behavioral task
behavioral1
Sample
temp.rar
Resource
win10ltsc2021-20241023-en
General
-
Target
temp.rar
-
Size
1.3MB
-
MD5
45817b3b5dbd2b3f0f4b5716651e5781
-
SHA1
283757c4bbc4c1202234d1999f024adab8e2c2a7
-
SHA256
0d9cad0c0e4b58ef3cf1537b5888071e4e7a90091da2848745559605fcbcefc2
-
SHA512
227ca7fbe2b3b502c9ef13e501184300ff0940c616c326d78968d056b7d6c9a77e99b3e2da9a0be32dc1ceb988c49610f7273bfee520cd1734e29ecd3f9d0e36
-
SSDEEP
24576:y1KK6ImbokiLRq3dieSQiua9oxaAPaNTEoBFgPeO6Uid27ku2GPxn9O/H52:ycCoo5L4Nn/s+xRPal7Sj6Uid27kuBxR
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ddLCicslsuisueKHitygAsoUxg\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\ddLCicslsuisueKHitygAsoUxg" mapper.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoDFbfyfoZRovSccOWL\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\DoDFbfyfoZRovSccOWL" mapper.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fWPPagQAYkjWoelOQ\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\fWPPagQAYkjWoelOQ" mapper.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\OoiBPqZDAOItURqbEICELIFRTMsG\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\OoiBPqZDAOItURqbEICELIFRTMsG" mapper.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\RCCHIIJIVIhoRXa\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\RCCHIIJIVIhoRXa" mapper.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation Plasma Temp.exe Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation ._cache_Plasma Temp.exe -
Executes dropped EXE 8 IoCs
pid Process 1108 Plasma Temp.exe 64 ._cache_Plasma Temp.exe 2236 Synaptics.exe 3676 mapper.exe 4676 mapper.exe 3832 mapper.exe 2708 mapper.exe 3120 mapper.exe -
Loads dropped DLL 6 IoCs
pid Process 2236 Synaptics.exe 2236 Synaptics.exe 64 ._cache_Plasma Temp.exe 64 ._cache_Plasma Temp.exe 64 ._cache_Plasma Temp.exe 64 ._cache_Plasma Temp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Plasma Temp.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb mapper.exe File created C:\Program Files\Snippingtool\plasmasetup.bat ._cache_Plasma Temp.exe File created C:\Program Files\Snippingtool\mapper.exe ._cache_Plasma Temp.exe File created C:\Program Files\Snippingtool\spoof.sys ._cache_Plasma Temp.exe File created C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb mapper.exe File opened for modification C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb mapper.exe File created C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb.md5 mapper.exe File opened for modification C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb mapper.exe File opened for modification C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb mapper.exe File opened for modification C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb mapper.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\erigu.7z.tmp 7zG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Plasma Temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plasma Temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2472 cmd.exe 3392 cmd.exe 4868 cmd.exe 4592 cmd.exe 3340 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Plasma Temp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Plasma Temp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Plasma Temp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Plasma Temp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3392 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2732 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3676 mapper.exe 3676 mapper.exe 4676 mapper.exe 4676 mapper.exe 3832 mapper.exe 3832 mapper.exe 2708 mapper.exe 2708 mapper.exe 3120 mapper.exe 3120 mapper.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4216 7zFM.exe 4652 7zFM.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 3676 mapper.exe 4676 mapper.exe 3832 mapper.exe 2708 mapper.exe 3120 mapper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4216 7zFM.exe Token: 35 4216 7zFM.exe Token: SeSecurityPrivilege 4216 7zFM.exe Token: SeDebugPrivilege 64 ._cache_Plasma Temp.exe Token: SeLoadDriverPrivilege 3676 mapper.exe Token: SeLoadDriverPrivilege 4676 mapper.exe Token: SeAssignPrimaryTokenPrivilege 3848 svchost.exe Token: SeIncreaseQuotaPrivilege 3848 svchost.exe Token: SeSecurityPrivilege 3848 svchost.exe Token: SeTakeOwnershipPrivilege 3848 svchost.exe Token: SeLoadDriverPrivilege 3848 svchost.exe Token: SeSystemtimePrivilege 3848 svchost.exe Token: SeBackupPrivilege 3848 svchost.exe Token: SeRestorePrivilege 3848 svchost.exe Token: SeShutdownPrivilege 3848 svchost.exe Token: SeSystemEnvironmentPrivilege 3848 svchost.exe Token: SeUndockPrivilege 3848 svchost.exe Token: SeManageVolumePrivilege 3848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3848 svchost.exe Token: SeIncreaseQuotaPrivilege 3848 svchost.exe Token: SeSecurityPrivilege 3848 svchost.exe Token: SeTakeOwnershipPrivilege 3848 svchost.exe Token: SeLoadDriverPrivilege 3848 svchost.exe Token: SeSystemtimePrivilege 3848 svchost.exe Token: SeBackupPrivilege 3848 svchost.exe Token: SeRestorePrivilege 3848 svchost.exe Token: SeShutdownPrivilege 3848 svchost.exe Token: SeSystemEnvironmentPrivilege 3848 svchost.exe Token: SeUndockPrivilege 3848 svchost.exe Token: SeManageVolumePrivilege 3848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3848 svchost.exe Token: SeIncreaseQuotaPrivilege 3848 svchost.exe Token: SeSecurityPrivilege 3848 svchost.exe Token: SeTakeOwnershipPrivilege 3848 svchost.exe Token: SeLoadDriverPrivilege 3848 svchost.exe Token: SeSystemtimePrivilege 3848 svchost.exe Token: SeBackupPrivilege 3848 svchost.exe Token: SeRestorePrivilege 3848 svchost.exe Token: SeShutdownPrivilege 3848 svchost.exe Token: SeSystemEnvironmentPrivilege 3848 svchost.exe Token: SeUndockPrivilege 3848 svchost.exe Token: SeManageVolumePrivilege 3848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3848 svchost.exe Token: SeIncreaseQuotaPrivilege 3848 svchost.exe Token: SeSecurityPrivilege 3848 svchost.exe Token: SeTakeOwnershipPrivilege 3848 svchost.exe Token: SeLoadDriverPrivilege 3848 svchost.exe Token: SeSystemtimePrivilege 3848 svchost.exe Token: SeBackupPrivilege 3848 svchost.exe Token: SeRestorePrivilege 3848 svchost.exe Token: SeShutdownPrivilege 3848 svchost.exe Token: SeSystemEnvironmentPrivilege 3848 svchost.exe Token: SeUndockPrivilege 3848 svchost.exe Token: SeManageVolumePrivilege 3848 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3848 svchost.exe Token: SeIncreaseQuotaPrivilege 3848 svchost.exe Token: SeSecurityPrivilege 3848 svchost.exe Token: SeTakeOwnershipPrivilege 3848 svchost.exe Token: SeLoadDriverPrivilege 3848 svchost.exe Token: SeSystemtimePrivilege 3848 svchost.exe Token: SeBackupPrivilege 3848 svchost.exe Token: SeRestorePrivilege 3848 svchost.exe Token: SeShutdownPrivilege 3848 svchost.exe Token: SeSystemEnvironmentPrivilege 3848 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4216 7zFM.exe 4216 7zFM.exe 1836 7zG.exe 4652 7zFM.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2688 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1108 wrote to memory of 64 1108 Plasma Temp.exe 96 PID 1108 wrote to memory of 64 1108 Plasma Temp.exe 96 PID 1108 wrote to memory of 64 1108 Plasma Temp.exe 96 PID 1108 wrote to memory of 2236 1108 Plasma Temp.exe 97 PID 1108 wrote to memory of 2236 1108 Plasma Temp.exe 97 PID 1108 wrote to memory of 2236 1108 Plasma Temp.exe 97 PID 64 wrote to memory of 3268 64 ._cache_Plasma Temp.exe 104 PID 64 wrote to memory of 3268 64 ._cache_Plasma Temp.exe 104 PID 64 wrote to memory of 3268 64 ._cache_Plasma Temp.exe 104 PID 64 wrote to memory of 2472 64 ._cache_Plasma Temp.exe 107 PID 64 wrote to memory of 2472 64 ._cache_Plasma Temp.exe 107 PID 64 wrote to memory of 2472 64 ._cache_Plasma Temp.exe 107 PID 2472 wrote to memory of 3528 2472 cmd.exe 110 PID 2472 wrote to memory of 3528 2472 cmd.exe 110 PID 2472 wrote to memory of 3528 2472 cmd.exe 110 PID 3528 wrote to memory of 3576 3528 net.exe 112 PID 3528 wrote to memory of 3576 3528 net.exe 112 PID 3528 wrote to memory of 3576 3528 net.exe 112 PID 2472 wrote to memory of 3676 2472 cmd.exe 113 PID 2472 wrote to memory of 3676 2472 cmd.exe 113 PID 64 wrote to memory of 3392 64 ._cache_Plasma Temp.exe 116 PID 64 wrote to memory of 3392 64 ._cache_Plasma Temp.exe 116 PID 64 wrote to memory of 3392 64 ._cache_Plasma Temp.exe 116 PID 3392 wrote to memory of 716 3392 cmd.exe 118 PID 3392 wrote to memory of 716 3392 cmd.exe 118 PID 3392 wrote to memory of 716 3392 cmd.exe 118 PID 716 wrote to memory of 3296 716 net.exe 119 PID 716 wrote to memory of 3296 716 net.exe 119 PID 716 wrote to memory of 3296 716 net.exe 119 PID 3392 wrote to memory of 4676 3392 cmd.exe 120 PID 3392 wrote to memory of 4676 3392 cmd.exe 120 PID 64 wrote to memory of 3828 64 ._cache_Plasma Temp.exe 123 PID 64 wrote to memory of 3828 64 ._cache_Plasma Temp.exe 123 PID 64 wrote to memory of 3828 64 ._cache_Plasma Temp.exe 123 PID 64 wrote to memory of 4868 64 ._cache_Plasma Temp.exe 126 PID 64 wrote to memory of 4868 64 ._cache_Plasma Temp.exe 126 PID 64 wrote to memory of 4868 64 ._cache_Plasma Temp.exe 126 PID 4868 wrote to memory of 444 4868 cmd.exe 128 PID 4868 wrote to memory of 444 4868 cmd.exe 128 PID 4868 wrote to memory of 444 4868 cmd.exe 128 PID 444 wrote to memory of 2524 444 net.exe 129 PID 444 wrote to memory of 2524 444 net.exe 129 PID 444 wrote to memory of 2524 444 net.exe 129 PID 4868 wrote to memory of 3832 4868 cmd.exe 130 PID 4868 wrote to memory of 3832 4868 cmd.exe 130 PID 64 wrote to memory of 1140 64 ._cache_Plasma Temp.exe 133 PID 64 wrote to memory of 1140 64 ._cache_Plasma Temp.exe 133 PID 64 wrote to memory of 1140 64 ._cache_Plasma Temp.exe 133 PID 64 wrote to memory of 4592 64 ._cache_Plasma Temp.exe 137 PID 64 wrote to memory of 4592 64 ._cache_Plasma Temp.exe 137 PID 64 wrote to memory of 4592 64 ._cache_Plasma Temp.exe 137 PID 4592 wrote to memory of 2844 4592 cmd.exe 139 PID 4592 wrote to memory of 2844 4592 cmd.exe 139 PID 4592 wrote to memory of 2844 4592 cmd.exe 139 PID 2844 wrote to memory of 416 2844 net.exe 140 PID 2844 wrote to memory of 416 2844 net.exe 140 PID 2844 wrote to memory of 416 2844 net.exe 140 PID 4592 wrote to memory of 2708 4592 cmd.exe 141 PID 4592 wrote to memory of 2708 4592 cmd.exe 141 PID 64 wrote to memory of 3340 64 ._cache_Plasma Temp.exe 142 PID 64 wrote to memory of 3340 64 ._cache_Plasma Temp.exe 142 PID 64 wrote to memory of 3340 64 ._cache_Plasma Temp.exe 142 PID 3340 wrote to memory of 3808 3340 cmd.exe 144 PID 3340 wrote to memory of 3808 3340 cmd.exe 144
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\temp.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4216
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2940
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\temp\X0f4dXjaxXHoWyCqkmhXv.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3392
-
C:\Users\Admin\Desktop\temp\Plasma Temp.exe"C:\Users\Admin\Desktop\temp\Plasma Temp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\Desktop\temp\._cache_Plasma Temp.exe"C:\Users\Admin\Desktop\temp\._cache_Plasma Temp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\getmac.exe"getmac"3⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\net.exenet stop winmgmt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt5⤵
- System Location Discovery: System Language Discovery
PID:3576
-
-
-
C:\Program Files\Snippingtool\mapper.exe"C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data4⤵
- Sets service image path in registry
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\net.exenet stop winmgmt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt5⤵
- System Location Discovery: System Language Discovery
PID:3296
-
-
-
C:\Program Files\Snippingtool\mapper.exe"C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data4⤵
- Sets service image path in registry
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Windows\SysWOW64\getmac.exe"getmac"3⤵
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\net.exenet stop winmgmt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt5⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
C:\Program Files\Snippingtool\mapper.exe"C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data4⤵
- Sets service image path in registry
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:3832
-
-
-
C:\Windows\SysWOW64\getmac.exe"getmac"3⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\net.exenet stop winmgmt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt5⤵
- System Location Discovery: System Language Discovery
PID:416
-
-
-
C:\Program Files\Snippingtool\mapper.exe"C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data4⤵
- Sets service image path in registry
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\net.exenet stop winmgmt4⤵
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt5⤵
- System Location Discovery: System Language Discovery
PID:3356
-
-
-
C:\Program Files\Snippingtool\mapper.exe"C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data4⤵
- Sets service image path in registry
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:3120
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2732
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:1032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
PID:4620
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap11135:36:7zEvent27309 -ad -saa -- "C:\Windows\Fonts"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:1836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2688
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\erigu.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4652
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5e3bf7e9eae9469ecea8e908c5acdd9f4
SHA16524e87ef540ed86de0ec862fd5952525e3c2bd1
SHA256c15ac8da60074efc3df172060997e7a6962cb49e4a13460adb1d3b7bdda2ff9d
SHA512c3fd98b6c301e0f5280d4583344cc2f49fc92095258d85e71bb30fba3814cc269ddb84ff8e769f1dc3c7d6c660b6437c30c1e698b8a7bc9026720e4c55cfb1d8
-
Filesize
610B
MD5c8dd3213843acb63eb3c5059878f5edb
SHA138d9e307625a0ae8f369cc72e3629db791e56a76
SHA256a12ba7960473414dbb5ed71d333d53b8867f73cdfcfbc18bd88ad68c7ea31b39
SHA5123e05a27d578827f73e908d1521ffc8fc6bacdad9cfb3887125b4f456c9fb4e6c59bf954cbf5bd01d56347fe69ca31dd3f7e7d0d17c6128689623e09c69635116
-
Filesize
24KB
MD52f4e8e112f4ba3a590b7d82ae1560408
SHA11147d3e95752a48e5d9c48fb9f2da818acbe93a5
SHA256938737343419255ebcf31b29a33e9af083535c0b12f72ab7eeafc6d63dd6ab8b
SHA5123dcf49d4cd2b2f3ef5e95eb795aa9dd740f424b0e2789d7fe35b0cd2f7f9db37f3ebcdc7ae8a9f22071d5119cc2a6b6c8df35f9c6fffd38d72abddf6355de0ad
-
Filesize
907KB
MD534a108d0ba2d7c6b1d72b69fe8861891
SHA167edc61c4c71c4ed43835f7173c6f9c4a70e61ac
SHA25694ae9a107b118bfa3f734c73d8d270562d16c5d9d6c23d8831561a24bd77aaf6
SHA51246a82cdd2d8019d09c4913f1929b438108f09ec07adc684196810386769f5d181b06ebdb4bbec4ce8785e34f6f75398a85779b4bce210d8284eb5e8a5b453440
-
Filesize
32B
MD5022320318ace6cfa12f139874dad086c
SHA1b330f387cf3844997fe314949ccb54b735eb01a9
SHA2560d912c3170bcc85fcca9349b572027691cb05bb51901645da05c0aed8a3e36a9
SHA51233706e4f5e5993f3b65f7d1a1b1e22a58f424281a59cf15cf13d3ffbe3e5fb305a24ca601259ff33e4004b6ab2aca93dcac536e9b3dd8f9e92751dfa194e6ea4
-
Filesize
753KB
MD5b753207b14c635f29b2abf64f603570a
SHA18a40e828224f22361b09494a556a20db82fc97b9
SHA2567f16106f3354a65fc749737905b77df7bbefa28bf8bbc966dc1f8c53fa4660f2
SHA5120dd32803b95d53badd33c0c84df1002451090ff5f74736680e3a53a0bfc0e723eee7d795626bc10a1fb431de7e6e276c5a66349ef385a8b92b48425b0bdd036f
-
Filesize
22KB
MD5bca47f278dfd145c2898b1df5de77ea9
SHA16293a0967b0053f5917b8731396e2a530d425dde
SHA256e9e3c9175ec6f13c82d38ef475e36b757c660eaca53ae1498cbee1c81c3cf3cc
SHA5126ef4c2978fec121c308443337f607272fd60131a3d29d7c361af46d5397dd7510ec7d2fd2eda41d3c07fbeb97f698a998e71b055afaee2a1ca03b1a91c60959a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
13KB
MD52d8e4f38b36c334d0a32a7324832501d
SHA1f6f11ad2cd2b0cf95ed42324876bee1d83e01775
SHA25601aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd
SHA512b0329590d2402ddb6dc98553be3cdc48e0e70cd9797a44b6448b97ca31754b999beeebf593225a6254fdddaa9453920431dd8eae894732b6e6438e5b2d8a72fd
-
Filesize
124KB
MD5a73e87a0ad626312ace6eb56fd8f4133
SHA1e2e803af903fd1f0863952be481106d5a6993646
SHA2561017b3d548aadc0fe735460d50424f2f4d7ac70b506ed8c55d6857a62d83dd9c
SHA5128b5093f20443a730cc51a4d247a5594bd91305ba81ebd9d3f860b49c770c03adb1665e9123e939f1cce4ba8f4d639009c356d6ff98def3ec501459136fc950ad
-
Filesize
2.1MB
MD5c19e9e6a4bc1b668d19505a0437e7f7e
SHA173be712aef4baa6e9dabfc237b5c039f62a847fa
SHA2569ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82
SHA512b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
877KB
MD544b1e07558fac9c7d26e5d3347afaee7
SHA1220280fee94e17188d027a46b3047b0f8a73a722
SHA256a7db46b0ee6fa42808f35ebc28d8bbeaff7f3f665bec867e8bc9e6916af6e0c6
SHA512df4aa702858deb3fadfecedf0185049bfdd8f66d13ff7e86bd00b111660cf3976b157208e61a71f07dd6cf8dd357ac32364993c86dea6ab9c9f157771a6660c5
-
Filesize
21B
MD55b26046b29818176c57f76ba2edd216f
SHA1ce41038570883814eded7c4beaf03f37faaf942c
SHA2566f5f8ca9a11ff0119784386b0626d03bdfe099dbd5d9235ed6b9b0863d9cfc75
SHA512cdd900d514ac5b26791930f974301079de7aaa7003062a649cc96adf0d279afeafbefd992c7280ae9b7827ae38bee546feaa878e17d8caf7f1eca9d386827fb9
-
Filesize
207KB
MD52c67be2ac50e4dd8683ad9640eb61477
SHA1456ceabe88844627c28d22bf04b66d6f5f57bb15
SHA2560f559b4d1e2db8c16f1a037fe790be2fa13d07f642176a76c93cd12349330b76
SHA512004364f18d410d63fdfa907768a85c65e74049e23428d78bad2bf36dff9648d519b2aca155261567ba5f19d3a40d0e5f98eb2a34891e53e1af7217b7ddde9db8