Overview
overview
10Static
static
10keygen-pr.exe
windows7-x64
3keygen-pr.exe
windows10-2004-x64
3keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
7keygen-step-4.exe
windows7-x64
10keygen-step-4.exe
windows10-2004-x64
10keygen-step-6.exe
windows7-x64
7keygen-step-6.exe
windows10-2004-x64
7keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10Analysis
-
max time kernel
85s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 22:25
Behavioral task
behavioral1
Sample
keygen-pr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
keygen-pr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
keygen-step-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
keygen-step-1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
keygen-step-3.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
keygen-step-3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
keygen-step-4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
keygen-step-4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen-step-6.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
keygen-step-6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
keygen.bat
Resource
win7-20240903-en
General
-
Target
keygen-step-4.exe
-
Size
3.4MB
-
MD5
6fc4f2d665aa1aae0a56ebd4cc6227a7
-
SHA1
1b998ceba86cd9b87dbbf464fca3008bc5c725ea
-
SHA256
77acd936a5bd8eb9ae70ca4ac75e5159df48324273baae60854b6fbc412d36d7
-
SHA512
67048ad418bd35e30671b76951f149e81be58d94e6cbcff4cdc01f19b3bf0ca64103c59451efbf5e519e95a9a126df561ff559f7ee4cc263bfc501e6d0fa5f4e
-
SSDEEP
98304:SKqyUiTtG/saMpSQwnQXl8LSZ8Z56DXXuDUVJqDI6AHZQTg9:S8usaMpuQXl8LSk5mX4iJBfQs9
Malware Config
Extracted
ffdroider
http://186.2.171.3
Extracted
gcleaner
194.145.227.161
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
31.210.20.251
Signatures
-
Detect Fabookie payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\jhuuee.exe family_fabookie -
FFDroider payload 2 IoCs
Processes:
resource yara_rule behavioral7/memory/3008-120-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider behavioral7/memory/3008-133-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider -
Fabookie family
-
Ffdroider family
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
OnlyLogger payload 1 IoCs
Processes:
resource yara_rule behavioral7/memory/528-119-0x0000000000400000-0x0000000002B59000-memory.dmp family_onlylogger -
Executes dropped EXE 14 IoCs
Processes:
Crack.exeCrack.exePBrowFile28.exechrome3.exePublicDwlBrowser188.exe2.exesetup.exejhuuee.exemd1_1eaf.exeservices64.exef2217e5f.exess.exeSetup.exesihost64.exepid process 2456 Crack.exe 2080 Crack.exe 2804 PBrowFile28.exe 2504 chrome3.exe 2992 PublicDwlBrowser188.exe 2152 2.exe 528 setup.exe 2736 jhuuee.exe 3008 md1_1eaf.exe 2056 services64.exe 2032 f2217e5f.exe 2408 ss.exe 2772 Setup.exe 1480 sihost64.exe -
Loads dropped DLL 40 IoCs
Processes:
keygen-step-4.exeCrack.exePBrowFile28.exesetup.exechrome3.exeWerFault.exeservices64.exepid process 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 2456 Crack.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 2804 PBrowFile28.exe 2804 PBrowFile28.exe 2804 PBrowFile28.exe 2804 PBrowFile28.exe 2804 PBrowFile28.exe 528 setup.exe 528 setup.exe 528 setup.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 2504 chrome3.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 800 keygen-step-4.exe 2056 services64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 38 raw.githubusercontent.com 39 raw.githubusercontent.com 40 pastebin.com 41 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1504 2032 WerFault.exe f2217e5f.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Crack.exePBrowFile28.exesetup.exemd1_1eaf.exef2217e5f.exeSetup.exekeygen-step-4.exeCrack.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PBrowFile28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language md1_1eaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2217e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe -
Processes:
services64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 services64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e services64.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1328 schtasks.exe 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome3.exeservices64.exepid process 2504 chrome3.exe 2056 services64.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
2.exePublicDwlBrowser188.exechrome3.exess.exeservices64.exedescription pid process Token: SeDebugPrivilege 2152 2.exe Token: SeDebugPrivilege 2992 PublicDwlBrowser188.exe Token: SeDebugPrivilege 2504 chrome3.exe Token: SeDebugPrivilege 2408 ss.exe Token: SeDebugPrivilege 2056 services64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
keygen-step-4.exeCrack.exePBrowFile28.exechrome3.execmd.exef2217e5f.exedescription pid process target process PID 800 wrote to memory of 2456 800 keygen-step-4.exe Crack.exe PID 800 wrote to memory of 2456 800 keygen-step-4.exe Crack.exe PID 800 wrote to memory of 2456 800 keygen-step-4.exe Crack.exe PID 800 wrote to memory of 2456 800 keygen-step-4.exe Crack.exe PID 2456 wrote to memory of 2080 2456 Crack.exe Crack.exe PID 2456 wrote to memory of 2080 2456 Crack.exe Crack.exe PID 2456 wrote to memory of 2080 2456 Crack.exe Crack.exe PID 2456 wrote to memory of 2080 2456 Crack.exe Crack.exe PID 800 wrote to memory of 2804 800 keygen-step-4.exe PBrowFile28.exe PID 800 wrote to memory of 2804 800 keygen-step-4.exe PBrowFile28.exe PID 800 wrote to memory of 2804 800 keygen-step-4.exe PBrowFile28.exe PID 800 wrote to memory of 2804 800 keygen-step-4.exe PBrowFile28.exe PID 2804 wrote to memory of 2504 2804 PBrowFile28.exe chrome3.exe PID 2804 wrote to memory of 2504 2804 PBrowFile28.exe chrome3.exe PID 2804 wrote to memory of 2504 2804 PBrowFile28.exe chrome3.exe PID 2804 wrote to memory of 2504 2804 PBrowFile28.exe chrome3.exe PID 2804 wrote to memory of 2992 2804 PBrowFile28.exe PublicDwlBrowser188.exe PID 2804 wrote to memory of 2992 2804 PBrowFile28.exe PublicDwlBrowser188.exe PID 2804 wrote to memory of 2992 2804 PBrowFile28.exe PublicDwlBrowser188.exe PID 2804 wrote to memory of 2992 2804 PBrowFile28.exe PublicDwlBrowser188.exe PID 2804 wrote to memory of 2152 2804 PBrowFile28.exe 2.exe PID 2804 wrote to memory of 2152 2804 PBrowFile28.exe 2.exe PID 2804 wrote to memory of 2152 2804 PBrowFile28.exe 2.exe PID 2804 wrote to memory of 2152 2804 PBrowFile28.exe 2.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 528 2804 PBrowFile28.exe setup.exe PID 2804 wrote to memory of 2736 2804 PBrowFile28.exe jhuuee.exe PID 2804 wrote to memory of 2736 2804 PBrowFile28.exe jhuuee.exe PID 2804 wrote to memory of 2736 2804 PBrowFile28.exe jhuuee.exe PID 2804 wrote to memory of 2736 2804 PBrowFile28.exe jhuuee.exe PID 800 wrote to memory of 3008 800 keygen-step-4.exe md1_1eaf.exe PID 800 wrote to memory of 3008 800 keygen-step-4.exe md1_1eaf.exe PID 800 wrote to memory of 3008 800 keygen-step-4.exe md1_1eaf.exe PID 800 wrote to memory of 3008 800 keygen-step-4.exe md1_1eaf.exe PID 2504 wrote to memory of 2752 2504 chrome3.exe cmd.exe PID 2504 wrote to memory of 2752 2504 chrome3.exe cmd.exe PID 2504 wrote to memory of 2752 2504 chrome3.exe cmd.exe PID 2752 wrote to memory of 1328 2752 cmd.exe schtasks.exe PID 2752 wrote to memory of 1328 2752 cmd.exe schtasks.exe PID 2752 wrote to memory of 1328 2752 cmd.exe schtasks.exe PID 2504 wrote to memory of 2056 2504 chrome3.exe services64.exe PID 2504 wrote to memory of 2056 2504 chrome3.exe services64.exe PID 2504 wrote to memory of 2056 2504 chrome3.exe services64.exe PID 800 wrote to memory of 2032 800 keygen-step-4.exe f2217e5f.exe PID 800 wrote to memory of 2032 800 keygen-step-4.exe f2217e5f.exe PID 800 wrote to memory of 2032 800 keygen-step-4.exe f2217e5f.exe PID 800 wrote to memory of 2032 800 keygen-step-4.exe f2217e5f.exe PID 2032 wrote to memory of 1504 2032 f2217e5f.exe WerFault.exe PID 2032 wrote to memory of 1504 2032 f2217e5f.exe WerFault.exe PID 2032 wrote to memory of 1504 2032 f2217e5f.exe WerFault.exe PID 2032 wrote to memory of 1504 2032 f2217e5f.exe WerFault.exe PID 800 wrote to memory of 2408 800 keygen-step-4.exe ss.exe PID 800 wrote to memory of 2408 800 keygen-step-4.exe ss.exe PID 800 wrote to memory of 2408 800 keygen-step-4.exe ss.exe PID 800 wrote to memory of 2408 800 keygen-step-4.exe ss.exe PID 800 wrote to memory of 2772 800 keygen-step-4.exe Setup.exe PID 800 wrote to memory of 2772 800 keygen-step-4.exe Setup.exe PID 800 wrote to memory of 2772 800 keygen-step-4.exe Setup.exe PID 800 wrote to memory of 2772 800 keygen-step-4.exe Setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:1328
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit5⤵PID:592
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵
- Executes dropped EXE
PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"3⤵
- Executes dropped EXE
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1363⤵
- Loads dropped DLL
- Program crash
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1ae69f33f753697474e8076e7477cb
SHA1355bda4e65533627397e5dc3ae1a95260c2eb0be
SHA256e7117af0feb90088913065fd4173a4424bae3faca9ab339094660192f14f46d7
SHA512ceafdd223859eabe215f2d773ac0305265151a66d267514476d7cef07b6e0002e48c76360e40bb2339648bc2cb263fa24aa2e70bbaa87ba62dbeff7841049fbb
-
Filesize
8KB
MD5a5bace3c3c2fa1cb766775746a046594
SHA19998cad5ba39e0be94347fcd2a2affd0c0a25930
SHA256617de4cdc27fb67b299a0d95ff2129d0ea2488040bcfd5f64868a0fab33af7a6
SHA51266f0cb5b820014a8d73bab706de8138d22a4d690d77726ac53b785daf99ed45646c8b0236bf10e209039f78324a63c3ee1c2f7ccf852fa7d579753cb9f659184
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
101KB
MD513e802bd360e44591d7d23036ce1fd33
SHA1091a58503734848a4716382862526859299ef345
SHA256e24c3eda7673062c9b243a09bc91e608f4d9dcc5de27db025b5ad150ae014f2b
SHA5128bb52a3b0852cc345be7d4b50b19c3778bcae5cb7ee654aced93772bee6fd22d1e87c484d91afb10af040d7c52b0f1e0b60de47a28d8eeea5e3c6afcead6163b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
43KB
MD54b0d49f7c8712d7a0d44306309f2e962
SHA15f0a2536f215babccf860c7ccdeaf7055bb59cad
SHA256f996915ce7203dc3661afa686637426fab14c91682ada02054d2f64ce245af60
SHA51250dc00bebdafdc2cc1792a45cab5f13773ff0026c20618eec29f50000261afba65f58cec5d30be0fd5aaea17cac30b97b16be70c6f430987cd10a8488948ee2b
-
Filesize
56KB
MD57126148bfe5ca4bf7e098d794122a9a3
SHA13fe6be3ee8bf1a0c99139b146913c8c6acd7dd64
SHA256f8c0350d71e5dd14438d477f73915c4845290c7f0620656624722183b76013f5
SHA5120bec6450d1be17489436de7a5186dbcb88089edd4227c3b5484460c9368e5ca0a2d88c385d31989f449a5d8cc347057c80a997682d6c0ed1b9cfcb85c677eb48
-
Filesize
1.8MB
MD58902f8193024fa4187ca1aad97675960
SHA137a4840c9657205544790c437698b54ca33bfd9d
SHA25695de484851569f225488320d573e398ebc2312b2d85b6c2b255b63b21aebb82f
SHA512c351204604cb24c45ddb26847a22f5487a2942ad2b2361dbd31ce0a308c281be91658907d7fe04b483f053b7f9b0c680cae11361709ba7552f7921e727241938
-
Filesize
1.6MB
MD57009fb80a52366b6c2cd8ec052a65791
SHA1db0894463edf3ac11e5ca4b4584e8f10d75810f6
SHA256767c546decf6f669263e4a0a87a0f5d92234e031e9a0de3733fa954a8f3e0255
SHA51226e50e4b3d0b5fe866423b9ae0c02f61882f632fe4a16c05da117c02fae9aea26a6c81458e4b0bc2bda8acd0407565132f8bd6b7d3e828dd90fc280b1f15f079
-
Filesize
270KB
MD50388a1ce1bb8c076387b69ffcb3b40ec
SHA13ec08a53ec024d9be6346440848c37d0e0d7bb80
SHA256448febc4311881856de2c237285907fe9470818e169946b0dbf1362f332e070a
SHA512ea5af764d0373c8b9a5faf6d7094c76c9c321e227713bceecd49df50fa888e8fd04b1dfe16c4b75a8727717582b06383825e5d4317db1b875951ee240edd71d5
-
Filesize
991KB
MD5f250a9c692088cce4253332a205b1649
SHA1109c79124ce2bda06cab50ea5d97294d13d42b20
SHA2560a6c3a23510f93fcdcb6d5acc53ccccbcc51c68f14b1bcbd758ffbf135f8e882
SHA51280553664f188ae35cef1f89d188fb17df8a490367f8d6fa5f9897115bacf776373905bccd599353add684c7fa6c2554d04cbf1a7f6cc87b299d6c51da33c1b5e
-
Filesize
100KB
MD59a6071c1a67be3fb247f857fe5903bbf
SHA14a2e14763c51537e8695014007eceaf391a3f600
SHA25601a9cb71df1d038bbec243ec7f2c1dd12d65a735297469c7f72be80886842e3c
SHA512c862ed8670b48e23b081e1c91280599ffdd963e714665b80553b41540cb3584c823a25f05c75e47eaea1473c687a9ef7c9a219d724d059e5bd77ac6d127f5e68
-
Filesize
1.3MB
MD5f9be28007149d38c6ccb7a7ab1fcf7e5
SHA1eba6ac68efa579c97da96494cde7ce063579d168
SHA2565f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914
SHA5128806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171
-
Filesize
314KB
MD50ebb4afbb726f3ca17896a0274b78290
SHA1b543a593cfa0cc84b6af0457ccdc27c1b42ea622
SHA2562fd099e9c096efb59756565d50243387d7669d60c2088e842f1f5d9ef297b6d2
SHA512284063f08667af11bc593dcb88f19d2bc6b9fd1e2edf368fdc78f07c9956fa3078673ee7dd7ca349e32cb1f848edfeab3b6a758eac5e5c3d36dc1a8764353d11
-
Filesize
7KB
MD59910203407b2605107587e954081c575
SHA18037bfb3b779fbbb3273df4f5c63d15b9589ce95
SHA25607b00c604d6473439dcd16b47cbefa450aad400871cb2215f0814547aca81b49
SHA512ba2c532d16eb259ae1621ac6ab668b4da28b2a842cb7320eee11982e2b835979c1ec6c566e3207e798fd2d0767070a568d2cd32dbb19200572afb2c7b32a68be