Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe
Resource
win10v2004-20241007-en
General
-
Target
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe
-
Size
9.6MB
-
MD5
c869a2a9d6adbde8402790f7a884d8c9
-
SHA1
d5452604cb3819e95fd5b29361305ef2357079a2
-
SHA256
06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497
-
SHA512
81e64fa0b7115c5e296cb2bb3d68142f16b9be5956bb5e3fa7c7264c0160e5b54c92d7c8ec9832cf69d82f7738eca52d756d46cd97fac99faa706db538cef700
-
SSDEEP
196608:xouA78MTdWfPVzDVk2YMENpDTnnYyZ7Ww5kK+sBdGZzKnWthSiDSTD:x/A7hTYfPVzBwpPnAw5gmnWtACI
Malware Config
Extracted
nullmixer
http://6245c31e064c3.com/
Extracted
smokeloader
pub3
Extracted
gcleaner
appwebstat.biz
ads-memory.biz
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral1/memory/2588-181-0x0000000140000000-0x00000001406C5000-memory.dmp family_fabookie -
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Onlylogger family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Socelars family
-
OnlyLogger payload 2 IoCs
resource yara_rule behavioral1/memory/1628-297-0x0000000000400000-0x00000000004B7000-memory.dmp family_onlylogger behavioral1/memory/1628-312-0x0000000000400000-0x00000000004B7000-memory.dmp family_onlylogger -
pid Process 1544 powershell.exe 2084 powershell.exe -
resource yara_rule behavioral1/files/0x0005000000019c3c-51.dat aspack_v212_v242 behavioral1/files/0x0005000000019c34-53.dat aspack_v212_v242 behavioral1/files/0x0005000000019c57-59.dat aspack_v212_v242 behavioral1/files/0x00070000000186d9-78.dat aspack_v212_v242 -
Executes dropped EXE 21 IoCs
pid Process 2744 setup_install.exe 484 6245c31ebdd0b_Thu15d959d040b6.exe 2864 6245c3207f379_Thu1524a3226.exe 2476 6245c31f93e89_Thu15560c45cf.exe 1148 6245c3229eba4_Thu15d9e345.exe 2832 6245c3207f379_Thu1524a3226.exe 2872 6245c3229eba4_Thu15d9e345.tmp 1972 6245c3229eba4_Thu15d9e345.exe 2436 6245c3274f0aa_Thu15441bedbf.exe 2264 6245c3229eba4_Thu15d9e345.tmp 2060 6245c3248e39e_Thu1534f190e7.exe 2116 6245c34b9f494_Thu15ea5844304.exe 1368 6245c34ef3f57_Thu156ce9254b.exe 2588 6245c348c796a_Thu154afc51393.exe 1628 6245c346cf143_Thu1567f6f9975.exe 2300 6245c34b9f494_Thu15ea5844304.tmp 1448 6245c34a47bbe_Thu159cbada39f2.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1720 6245c34cc3939_Thu15177f426.exe 888 6245c34a47bbe_Thu159cbada39f2.exe 568 DB640FA9296DGH2.exe -
Loads dropped DLL 64 IoCs
pid Process 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 2744 setup_install.exe 2744 setup_install.exe 2744 setup_install.exe 2744 setup_install.exe 2744 setup_install.exe 2744 setup_install.exe 2744 setup_install.exe 2744 setup_install.exe 2716 cmd.exe 2716 cmd.exe 484 6245c31ebdd0b_Thu15d959d040b6.exe 484 6245c31ebdd0b_Thu15d959d040b6.exe 484 6245c31ebdd0b_Thu15d959d040b6.exe 784 cmd.exe 784 cmd.exe 484 6245c31ebdd0b_Thu15d959d040b6.exe 484 6245c31ebdd0b_Thu15d959d040b6.exe 1748 cmd.exe 2864 6245c3207f379_Thu1524a3226.exe 2864 6245c3207f379_Thu1524a3226.exe 2864 6245c3207f379_Thu1524a3226.exe 2176 cmd.exe 2832 6245c3207f379_Thu1524a3226.exe 2832 6245c3207f379_Thu1524a3226.exe 1148 6245c3229eba4_Thu15d9e345.exe 1148 6245c3229eba4_Thu15d9e345.exe 1148 6245c3229eba4_Thu15d9e345.exe 2872 6245c3229eba4_Thu15d9e345.tmp 2872 6245c3229eba4_Thu15d9e345.tmp 1972 6245c3229eba4_Thu15d9e345.exe 1972 6245c3229eba4_Thu15d9e345.exe 1308 cmd.exe 2436 6245c3274f0aa_Thu15441bedbf.exe 1972 6245c3229eba4_Thu15d9e345.exe 2436 6245c3274f0aa_Thu15441bedbf.exe 380 cmd.exe 380 cmd.exe 2264 6245c3229eba4_Thu15d9e345.tmp 2060 6245c3248e39e_Thu1534f190e7.exe 2060 6245c3248e39e_Thu1534f190e7.exe 2232 cmd.exe 2116 6245c34b9f494_Thu15ea5844304.exe 2116 6245c34b9f494_Thu15ea5844304.exe 2620 cmd.exe 2620 cmd.exe 788 cmd.exe 1368 6245c34ef3f57_Thu156ce9254b.exe 1368 6245c34ef3f57_Thu156ce9254b.exe 2116 6245c34b9f494_Thu15ea5844304.exe 1540 cmd.exe 1628 6245c346cf143_Thu1567f6f9975.exe 1628 6245c346cf143_Thu1567f6f9975.exe 2248 cmd.exe 2248 cmd.exe 2992 cmd.exe 1448 6245c34a47bbe_Thu159cbada39f2.exe 1448 6245c34a47bbe_Thu159cbada39f2.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 560 cmd.exe 2300 6245c34b9f494_Thu15ea5844304.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2588-181-0x0000000140000000-0x00000001406C5000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 iplogger.org 23 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1720 6245c34cc3939_Thu15177f426.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 888 1448 6245c34a47bbe_Thu159cbada39f2.exe 66 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1568 1628 WerFault.exe 59 -
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3229eba4_Thu15d9e345.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c34ef3f57_Thu156ce9254b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3229eba4_Thu15d9e345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3248e39e_Thu1534f190e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3229eba4_Thu15d9e345.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c34a47bbe_Thu159cbada39f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c31ebdd0b_Thu15d959d040b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c34a47bbe_Thu159cbada39f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3503cd72_Thu15a259f014c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3207f379_Thu1524a3226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c34b9f494_Thu15ea5844304.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c34cc3939_Thu15177f426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3207f379_Thu1524a3226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3229eba4_Thu15d9e345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c3274f0aa_Thu15441bedbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c34b9f494_Thu15ea5844304.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6245c346cf143_Thu1567f6f9975.exe -
Kills process with taskkill 1 IoCs
pid Process 2876 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1544 powershell.exe 2084 powershell.exe 1720 6245c34cc3939_Thu15177f426.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2264 6245c3229eba4_Thu15d9e345.tmp -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 1544 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeCreateTokenPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeAssignPrimaryTokenPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeLockMemoryPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeIncreaseQuotaPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeMachineAccountPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeTcbPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeSecurityPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeTakeOwnershipPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeLoadDriverPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeSystemProfilePrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeSystemtimePrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeProfSingleProcessPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeIncBasePriorityPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeCreatePagefilePrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeCreatePermanentPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeBackupPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeRestorePrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeShutdownPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeDebugPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeAuditPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeSystemEnvironmentPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeChangeNotifyPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeRemoteShutdownPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeUndockPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeSyncAgentPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeEnableDelegationPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeManageVolumePrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeImpersonatePrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeCreateGlobalPrivilege 1368 6245c34ef3f57_Thu156ce9254b.exe Token: 31 1368 6245c34ef3f57_Thu156ce9254b.exe Token: 32 1368 6245c34ef3f57_Thu156ce9254b.exe Token: 33 1368 6245c34ef3f57_Thu156ce9254b.exe Token: 34 1368 6245c34ef3f57_Thu156ce9254b.exe Token: 35 1368 6245c34ef3f57_Thu156ce9254b.exe Token: SeDebugPrivilege 2476 6245c31f93e89_Thu15560c45cf.exe Token: SeDebugPrivilege 2876 taskkill.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe 1684 6245c3503cd72_Thu15a259f014c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 6245c3207f379_Thu1524a3226.exe 2864 6245c3207f379_Thu1524a3226.exe 2832 6245c3207f379_Thu1524a3226.exe 2832 6245c3207f379_Thu1524a3226.exe 568 DB640FA9296DGH2.exe 568 DB640FA9296DGH2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2380 wrote to memory of 2744 2380 06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe 29 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2692 2744 setup_install.exe 31 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 2716 2744 setup_install.exe 32 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 1748 2744 setup_install.exe 33 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 784 2744 setup_install.exe 34 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2744 wrote to memory of 2176 2744 setup_install.exe 35 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 2716 wrote to memory of 484 2716 cmd.exe 37 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 784 wrote to memory of 2864 784 cmd.exe 38 PID 1748 wrote to memory of 2476 1748 cmd.exe 40 PID 1748 wrote to memory of 2476 1748 cmd.exe 40 PID 1748 wrote to memory of 2476 1748 cmd.exe 40 PID 1748 wrote to memory of 2476 1748 cmd.exe 40 PID 484 wrote to memory of 1320 484 6245c31ebdd0b_Thu15d959d040b6.exe 39 PID 484 wrote to memory of 1320 484 6245c31ebdd0b_Thu15d959d040b6.exe 39 PID 484 wrote to memory of 1320 484 6245c31ebdd0b_Thu15d959d040b6.exe 39 PID 484 wrote to memory of 1320 484 6245c31ebdd0b_Thu15d959d040b6.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe"C:\Users\Admin\AppData\Local\Temp\06863cb5bb52bd84799a527045ab9e296882c2f04e462c5c297da8dc3dadd497.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c31ebdd0b_Thu15d959d040b6.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c31ebdd0b_Thu15d959d040b6.exe6245c31ebdd0b_Thu15d959d040b6.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c31f93e89_Thu15560c45cf.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c31f93e89_Thu15560c45cf.exe6245c31f93e89_Thu15560c45cf.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c3207f379_Thu1524a3226.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3207f379_Thu1524a3226.exe6245c3207f379_Thu1524a3226.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3207f379_Thu1524a3226.exe"C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3207f379_Thu1524a3226.exe" -h5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c3229eba4_Thu15d9e345.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3229eba4_Thu15d9e345.exe6245c3229eba4_Thu15d9e345.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\is-4D9VU.tmp\6245c3229eba4_Thu15d9e345.tmp"C:\Users\Admin\AppData\Local\Temp\is-4D9VU.tmp\6245c3229eba4_Thu15d9e345.tmp" /SL5="$6015E,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3229eba4_Thu15d9e345.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3229eba4_Thu15d9e345.exe"C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3229eba4_Thu15d9e345.exe" /SILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\is-JCJR7.tmp\6245c3229eba4_Thu15d9e345.tmp"C:\Users\Admin\AppData\Local\Temp\is-JCJR7.tmp\6245c3229eba4_Thu15d9e345.tmp" /SL5="$4018E,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3229eba4_Thu15d9e345.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2264
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c3248e39e_Thu1534f190e7.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:380 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3248e39e_Thu1534f190e7.exe6245c3248e39e_Thu1534f190e7.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c3274f0aa_Thu15441bedbf.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3274f0aa_Thu15441bedbf.exe6245c3274f0aa_Thu15441bedbf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SXGY.Cpl",5⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SXGY.Cpl",6⤵
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SXGY.Cpl",7⤵PID:1360
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SXGY.Cpl",8⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c346cf143_Thu1567f6f9975.exe /mixtwo3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c346cf143_Thu1567f6f9975.exe6245c346cf143_Thu1567f6f9975.exe /mixtwo4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 4685⤵
- Program crash
PID:1568
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c348c796a_Thu154afc51393.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c348c796a_Thu154afc51393.exe6245c348c796a_Thu154afc51393.exe4⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2588 -s 4805⤵PID:2820
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c34a47bbe_Thu159cbada39f2.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c34a47bbe_Thu159cbada39f2.exe6245c34a47bbe_Thu159cbada39f2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c34a47bbe_Thu159cbada39f2.exe6245c34a47bbe_Thu159cbada39f2.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c34b9f494_Thu15ea5844304.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c34b9f494_Thu15ea5844304.exe6245c34b9f494_Thu15ea5844304.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\is-N85JK.tmp\6245c34b9f494_Thu15ea5844304.tmp"C:\Users\Admin\AppData\Local\Temp\is-N85JK.tmp\6245c34b9f494_Thu15ea5844304.tmp" /SL5="$301E8,140006,56320,C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c34b9f494_Thu15ea5844304.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c34cc3939_Thu15177f426.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:560 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c34cc3939_Thu15177f426.exe6245c34cc3939_Thu15177f426.exe4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\DB640FA9296DGH2.exe
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:568
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c34ef3f57_Thu156ce9254b.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:788 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c34ef3f57_Thu156ce9254b.exe6245c34ef3f57_Thu156ce9254b.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 6245c3503cd72_Thu15a259f014c.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\7zSC49930F7\6245c3503cd72_Thu15a259f014c.exe6245c3503cd72_Thu15a259f014c.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD598c3385d313ae6d4cf1f192830f6b555
SHA131c572430094e9adbf5b7647c3621b2e8dfa7fe8
SHA2564b2e2adafc390f535254a650a90e6a559fb3613a9f13ce648a024c078fcf40be
SHA512fdd0406ef1abee43877c2ab2be9879e7232e773f7dac48f38a883b14306907c82110c712065a290bafac3cc8b0f4c0a13694847ad60a50a2b87e6aed2fd73aff
-
Filesize
150KB
MD5f09b6a2775c38f9abac30e4a4ef06d1e
SHA199fa00c105d0d43e275e654946353629cf30d68d
SHA2560d641319e1dd70771a3619a15141b6adc91e853650b9703f0339f05e62065858
SHA5122a306d1ab83ddb1980854418ebefe15d00d4c7a7d76fdcc51cd35a70bbcc9a71c1b42436fac752d7f02b5f57e93f6ef8d5b111cb4f7ff41ef031b2b0f8cc4c88
-
Filesize
312KB
MD5479ba7ea1f2fa2cd51a3ca59a9638010
SHA18992de6c918131fbe8821dd16cc0277951cd362c
SHA256d66c7fb807beccc1fa5a7d4162d3e8e2d553ba560653a404e1ce6de68ba8c801
SHA51270be353017f77f5b4fd82738700843bdc5848f175a39d07626dd9f4cb59b4d685dadf69de156f00c62dcc76f8fba233656df258ea103e1000ff038305580179f
-
Filesize
1.5MB
MD5aa1a33a40570d4fd2f17c569f4ab1170
SHA1fc9b9b6ef3235ea76c3b5fd5ded6b4554eaa01c2
SHA256e97a44529a5f1e223d471f68a1fe6bddb0754b4a4880067b6872154a781fd6a5
SHA512a1335b6b2c07ff9543634ffc3162facd8bac8d1bf24ed0a2a36246981994785838b5b1343c44bcf55ce771dfe5bcda44a18fc0bdd9cdee5f7f652065642bf115
-
Filesize
299KB
MD547b88acabe2a7a92b8cc4b8b865a039b
SHA1377428dba2d3fb8e803f47a323057122e6a2856a
SHA256df7dcdb83fe57b0bc371dd5af6ca039a183e6c82b5dfbcf01d349776b792095d
SHA512a212e473898984c2c37c56298fc2a37a18a11d0ccc805d6931e547a298cc1e0aaa7028e892019403442b9b83ba6ef6bfee405f17342c0d843e2251d77410cbaf
-
Filesize
2.1MB
MD530d5916030276e16cba64b68f3516762
SHA12f384210eba109052f2eb08e27d864187e6d32ed
SHA256ea15c6a2d756b734c350b8c38461be6b631c4a73c7ea3f98bb3da17f5c76f4dc
SHA5123cb2114ba9a35c83256b13c10fc2383e60e67d12602893145e0ebc844dc3d2bdf546f4128c28294c2d06d7003cb294da95ff969c008c47ed281ada1f2061aac7
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD544fef0e2c71b61844278d8fc5082fc64
SHA128d7af4694d0dd19c2339b97c3c975e32ee7d581
SHA2568753047dab96429ed05e2f3ec195b7c87a130fdeb4cb68cf5dd8a110552ec5d3
SHA512194fbdc2b16e00f2d154ae158c43ba46400925c468da8df58238fb15dd8e0d549b04142734b7dc384c6c2d51acf2e9f4115487e4867cae09efc1a196ac813b94
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
2.1MB
MD51706b94599e0dd25e7a80abfb4f73b60
SHA1383c9ddcbf572ef874fe8f4841cee53aa4d139c5
SHA2562b0a342791c4ea3abc2af27d032c9841cbb27f63371d11ac10f92650967e554e
SHA51287d86b46579dce0a9b155c9e4f09a5879d9ed34d38f6dbf88b6bfce9ec28135e4ea1b72de0c67ef0739948eab37a8d5147fe3e131cb1d15fcf45266b708eef87
-
Filesize
2.5MB
MD5a0d156617392c5ad8c0673afc03919f9
SHA175a242000e4508f5174fded8117581236ed6612d
SHA25672da1d7ee300dfaf11bc8ee74e776067bfabaf52881fe39c2463bb495665abcd
SHA512ca10443a1f6f304cc4805cd988156f187ce974cce8e9ac6715b2ca10dddabfbd80736a1222ee43618968c849d719f9577c73be124fc7d0669f390aefb424a539