Malware Analysis Report

2024-11-13 16:51

Sample ID 241109-l3mlvssdqq
Target f403e5db7055c16c5608a7c5c5e8d72541f88a83720b84f6ee2a8ed7212f75a8
SHA256 f403e5db7055c16c5608a7c5c5e8d72541f88a83720b84f6ee2a8ed7212f75a8
Tags
redline v2user1 discovery infostealer gcleaner onlylogger loader media17223 smokeloader pub3 backdoor trojan socelars spyware stealer pub5 upx aspackv2 privateloader fabookie nullmixer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral27

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral28

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral31

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral30

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral29

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral24

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral26

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral25

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral32

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral23

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f403e5db7055c16c5608a7c5c5e8d72541f88a83720b84f6ee2a8ed7212f75a8

Threat Level: Known bad

The file f403e5db7055c16c5608a7c5c5e8d72541f88a83720b84f6ee2a8ed7212f75a8 was found to be: Known bad.

Malicious Activity Summary

redline v2user1 discovery infostealer gcleaner onlylogger loader media17223 smokeloader pub3 backdoor trojan socelars spyware stealer pub5 upx aspackv2 privateloader fabookie nullmixer

GCleaner

Onlylogger family

Smokeloader family

RedLine payload

Socelars family

Socelars

RedLine

SmokeLoader

Gcleaner family

Socelars payload

Privateloader family

Nullmixer family

Redline family

Fabookie family

OnlyLogger

Detect Fabookie payload

OnlyLogger payload

Detected Nirsoft tools

NirSoft WebBrowserPassView

Blocklisted process makes network request

Reads user/profile data of web browsers

Deletes itself

Executes dropped EXE

Checks computer location settings

ASPack v2.12-2.42

Loads dropped DLL

Checks installed software on the system

Looks up geolocation information via web service

Looks up external IP address via web service

Drops Chrome extension

Legitimate hosting services abused for malware hosting/C2

UPX packed file

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Program crash

Browser Information Discovery

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

Checks SCSI registry key(s)

Kills process with taskkill

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Modifies data under HKEY_USERS

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 10:03

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie family

fabookie

Nullmixer family

nullmixer

Privateloader family

privateloader

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral20

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

135s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2808 set thread context of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2808 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 226.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 67.208.201.84.in-addr.arpa udp
DE 88.99.35.59:63020 tcp
US 8.8.8.8:53 201.108.222.173.in-addr.arpa udp
DE 88.99.35.59:63020 tcp
US 8.8.8.8:53 195.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp

Files

memory/2808-0-0x0000000074CFE000-0x0000000074CFF000-memory.dmp

memory/2808-1-0x0000000000BA0000-0x0000000000C2A000-memory.dmp

memory/2808-2-0x0000000005480000-0x00000000054F6000-memory.dmp

memory/2808-3-0x0000000074CF0000-0x00000000754A0000-memory.dmp

memory/2808-5-0x0000000074CF0000-0x00000000754A0000-memory.dmp

memory/2808-4-0x0000000005460000-0x000000000547E000-memory.dmp

memory/2808-6-0x0000000005DD0000-0x0000000006374000-memory.dmp

memory/4924-7-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\61e7501c830d6_Tue23bdf4712a32.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/2808-10-0x0000000074CF0000-0x00000000754A0000-memory.dmp

memory/4924-12-0x0000000005720000-0x0000000005732000-memory.dmp

memory/4924-11-0x0000000005BA0000-0x00000000061B8000-memory.dmp

memory/4924-13-0x0000000074CF0000-0x00000000754A0000-memory.dmp

memory/4924-14-0x0000000005850000-0x000000000595A000-memory.dmp

memory/4924-15-0x0000000005780000-0x00000000057BC000-memory.dmp

memory/4924-16-0x00000000057C0000-0x000000000580C000-memory.dmp

memory/4924-17-0x0000000074CF0000-0x00000000754A0000-memory.dmp

memory/4924-18-0x0000000074CF0000-0x00000000754A0000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-VA4JD.tmp\61e74fd3252fe_Tue23df2ad021a.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4432 wrote to memory of 212 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 4432 wrote to memory of 212 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 4432 wrote to memory of 212 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 212 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 212 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 212 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2636 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-VA4JD.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 2636 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-VA4JD.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 2636 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-VA4JD.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"

C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

"C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$9029C,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT

C:\Users\Admin\AppData\Local\Temp\is-VA4JD.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

"C:\Users\Admin\AppData\Local\Temp\is-VA4JD.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$B01CC,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 noplayboy.com udp
US 8.8.8.8:53 100.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 67.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

memory/4432-0-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4432-2-0x0000000000401000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-O9JHI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/212-7-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-44JSI.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/2636-20-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2636-22-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4432-29-0x0000000000400000-0x0000000000414000-memory.dmp

memory/212-27-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/4908-32-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-BSOMI.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/2636-40-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4908-42-0x0000000000400000-0x00000000004BD000-memory.dmp

Analysis: behavioral8

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 226.108.222.173.in-addr.arpa udp
FR 212.193.30.45:80 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 45.144.225.57:80 tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 74.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 172.67.19.24:443 pastebin.com tcp
US 8.8.8.8:53 24.19.67.172.in-addr.arpa udp
US 8.8.8.8:53 201.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 195.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral15

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20241010-en

Max time kernel

22s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "61e7501ab629f_Tue23c4645058.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe" & exit

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "61e7501ab629f_Tue23c4645058.exe" /f

Network

N/A

Files

memory/2060-0-0x0000000000220000-0x000000000024A000-memory.dmp

memory/2060-1-0x0000000000250000-0x000000000029C000-memory.dmp

memory/2060-2-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2060-4-0x0000000000250000-0x000000000029C000-memory.dmp

memory/2060-6-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2060-5-0x0000000000220000-0x000000000024A000-memory.dmp

memory/2060-3-0x0000000000400000-0x000000000046C000-memory.dmp

Analysis: behavioral17

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

134s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1292 set thread context of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 1292 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

Network

Country Destination Domain Proto
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp

Files

memory/1292-0-0x00000000740CE000-0x00000000740CF000-memory.dmp

memory/1292-1-0x00000000011E0000-0x000000000126A000-memory.dmp

memory/1292-2-0x00000000740C0000-0x00000000747AE000-memory.dmp

memory/1292-3-0x00000000740C0000-0x00000000747AE000-memory.dmp

memory/2708-4-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2708-7-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2708-10-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2708-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2708-6-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2708-5-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2708-12-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1292-16-0x00000000740C0000-0x00000000747AE000-memory.dmp

memory/2708-15-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2708-17-0x00000000740C0000-0x00000000747AE000-memory.dmp

memory/2708-18-0x00000000740C0000-0x00000000747AE000-memory.dmp

memory/2708-19-0x00000000740C0000-0x00000000747AE000-memory.dmp

Analysis: behavioral27

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20241010-en

Max time kernel

120s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 1456

Network

Country Destination Domain Proto
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 signaturebusinesspark.com udp
US 8.8.8.8:53 signaturebusinesspark.com udp

Files

N/A

Analysis: behavioral28

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502f007f3_Tue23d6fecf8c.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4872 -ip 4872

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 1840

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 iplogger.org udp
US 172.67.74.161:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 signaturebusinesspark.com udp
US 8.8.8.8:53 signaturebusinesspark.com udp
US 8.8.8.8:53 161.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 243.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 147.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 107.116.69.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral31

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240729-en

Max time kernel

16s

Max time network

17s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurlpp.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurlpp.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurlpp.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 260

Network

N/A

Files

memory/1628-1-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1628-3-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1628-6-0x000000006494A000-0x000000006494F000-memory.dmp

memory/1628-11-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1628-9-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1628-4-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1628-8-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1628-7-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1628-5-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1628-13-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1628-12-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1628-10-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1628-2-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1628-0-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1628-14-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1628-19-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1628-16-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/1628-15-0x000000006B440000-0x000000006B4CF000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

122s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Smokeloader family

smokeloader

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2808 set thread context of 2176 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe"

Network

N/A

Files

memory/2808-1-0x0000000000030000-0x0000000000039000-memory.dmp

memory/2808-0-0x0000000000020000-0x0000000000029000-memory.dmp

memory/2176-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2808-5-0x0000000000020000-0x0000000000029000-memory.dmp

memory/2176-4-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2176-6-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2176-7-0x0000000000400000-0x0000000000409000-memory.dmp

Analysis: behavioral9

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20241010-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe"

Signatures

Socelars

stealer socelars

Socelars family

socelars

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.listincode.com udp
US 54.205.158.59:443 www.listincode.com tcp
US 52.203.72.196:443 www.listincode.com tcp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

142s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1924 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe C:\Windows\SysWOW64\control.exe
PID 1924 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe C:\Windows\SysWOW64\control.exe
PID 1924 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe C:\Windows\SysWOW64\control.exe
PID 1924 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe C:\Windows\SysWOW64\control.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2372 wrote to memory of 2408 N/A C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\rundll32.exe
PID 2408 wrote to memory of 2804 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\RunDll32.exe
PID 2408 wrote to memory of 2804 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\RunDll32.exe
PID 2408 wrote to memory of 2804 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\RunDll32.exe
PID 2408 wrote to memory of 2804 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\system32\RunDll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2804 wrote to memory of 2608 N/A C:\Windows\system32\RunDll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" .\G1V6MSEY.nr

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\G1V6MSEY.nr

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\G1V6MSEY.nr

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\G1V6MSEY.nr

Network

Country Destination Domain Proto
FR 78.112.80.48:8080 tcp
FR 78.112.80.48:8080 tcp

Files

memory/2408-6-0x00000000026F0000-0x00000000036F0000-memory.dmp

memory/2408-7-0x00000000026F0000-0x00000000036F0000-memory.dmp

memory/2408-8-0x000000002D490000-0x000000002D541000-memory.dmp

memory/2408-9-0x0000000000270000-0x000000000030D000-memory.dmp

memory/2408-10-0x0000000000270000-0x000000000030D000-memory.dmp

memory/2408-12-0x0000000000270000-0x000000000030D000-memory.dmp

memory/2408-16-0x0000000000270000-0x000000000030D000-memory.dmp

memory/2408-17-0x000000002D550000-0x000000002F342000-memory.dmp

memory/2408-18-0x0000000000390000-0x0000000000426000-memory.dmp

memory/2408-19-0x0000000000B20000-0x0000000000BB0000-memory.dmp

memory/2608-25-0x0000000002920000-0x0000000003920000-memory.dmp

memory/2608-27-0x0000000002920000-0x0000000003920000-memory.dmp

memory/2608-28-0x0000000002500000-0x00000000025B1000-memory.dmp

memory/2608-30-0x000000002D370000-0x000000002D40D000-memory.dmp

memory/2608-32-0x000000002D370000-0x000000002D40D000-memory.dmp

memory/2608-42-0x000000002D370000-0x000000002D40D000-memory.dmp

memory/2608-44-0x000000002F210000-0x000000002F2A6000-memory.dmp

memory/2608-43-0x000000002D410000-0x000000002F202000-memory.dmp

memory/2608-45-0x000000002F2B0000-0x000000002F340000-memory.dmp

memory/2608-48-0x000000002F2B0000-0x000000002F340000-memory.dmp

memory/2608-49-0x0000000000130000-0x0000000000133000-memory.dmp

memory/2608-50-0x0000000000140000-0x0000000000145000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3844 set thread context of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe
PID 3844 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501b7eabe_Tue2344597f.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 243.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
RU 92.255.57.115:59426 tcp
US 8.8.8.8:53 147.108.222.173.in-addr.arpa udp
RU 92.255.57.115:59426 tcp
US 8.8.8.8:53 195.108.222.173.in-addr.arpa udp
RU 92.255.57.115:59426 tcp
RU 92.255.57.115:59426 tcp

Files

memory/3844-0-0x000000007509E000-0x000000007509F000-memory.dmp

memory/3844-1-0x0000000000E10000-0x0000000000E9A000-memory.dmp

memory/3844-3-0x0000000075090000-0x0000000075840000-memory.dmp

memory/3844-2-0x0000000005880000-0x00000000058F6000-memory.dmp

memory/3844-4-0x00000000032C0000-0x00000000032DE000-memory.dmp

memory/3844-5-0x0000000075090000-0x0000000075840000-memory.dmp

memory/3844-6-0x0000000006190000-0x0000000006734000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\61e7501b7eabe_Tue2344597f.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/3340-12-0x0000000002CB0000-0x0000000002CC2000-memory.dmp

memory/3340-14-0x0000000005290000-0x000000000539A000-memory.dmp

memory/3340-16-0x00000000051C0000-0x00000000051FC000-memory.dmp

memory/3340-15-0x0000000075090000-0x0000000075840000-memory.dmp

memory/3340-17-0x0000000005200000-0x000000000524C000-memory.dmp

memory/3340-13-0x0000000075090000-0x0000000075840000-memory.dmp

memory/3844-10-0x0000000075090000-0x0000000075840000-memory.dmp

memory/3340-11-0x0000000005760000-0x0000000005D78000-memory.dmp

memory/3340-7-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3340-18-0x0000000075090000-0x0000000075840000-memory.dmp

Analysis: behavioral30

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

136s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurl.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2108 wrote to memory of 1736 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2108 wrote to memory of 1736 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2108 wrote to memory of 1736 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurl.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurl.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1736 -ip 1736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 652

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 99.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 193.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

memory/1736-0-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1736-2-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1736-1-0x0000000064941000-0x000000006494F000-memory.dmp

memory/1736-3-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1736-5-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1736-4-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1736-9-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1736-7-0x000000006EB40000-0x000000006EB63000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Smokeloader family

smokeloader

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4824 set thread context of 400 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd41f841_Tue2365aa82b7.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 100.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 193.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/400-5-0x0000000000400000-0x0000000000409000-memory.dmp

memory/400-4-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4824-3-0x0000000000560000-0x0000000000569000-memory.dmp

memory/400-2-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4824-1-0x0000000000570000-0x0000000000579000-memory.dmp

memory/4824-0-0x0000000000560000-0x0000000000569000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20241023-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Smokeloader family

smokeloader

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 136

Network

N/A

Files

memory/2604-1-0x0000000000030000-0x0000000000039000-memory.dmp

memory/2604-0-0x0000000000020000-0x0000000000028000-memory.dmp

memory/2604-2-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2604-3-0x0000000000400000-0x000000000044A000-memory.dmp

memory/2604-7-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2604-6-0x0000000000020000-0x0000000000028000-memory.dmp

memory/2604-5-0x0000000000030000-0x0000000000039000-memory.dmp

Analysis: behavioral14

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Smokeloader family

smokeloader

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fda51500_Tue23260baecb.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1968 -ip 1968

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 352

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 226.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 201.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/1968-0-0x00000000001D0000-0x00000000001D8000-memory.dmp

memory/1968-1-0x00000000001E0000-0x00000000001E9000-memory.dmp

memory/1968-2-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1968-6-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1968-5-0x00000000001E0000-0x00000000001E9000-memory.dmp

memory/1968-3-0x0000000000400000-0x000000000044A000-memory.dmp

memory/1968-4-0x00000000001D0000-0x00000000001D8000-memory.dmp

Analysis: behavioral29

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

122s

Max time network

123s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurl.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurl.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurl.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 248

Network

N/A

Files

memory/2380-0-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2380-5-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2380-4-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2380-3-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2380-2-0x000000006494A000-0x000000006494F000-memory.dmp

memory/2380-1-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2380-6-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2380-8-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2380-7-0x000000006B440000-0x000000006B4CF000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe" -a

Network

Country Destination Domain Proto
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 74.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 201.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp
US 8.8.8.8:53 v.xyzgamev.com udp

Files

N/A

Analysis: behavioral24

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "61e7502b8389b_Tue233252e9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4608 -ip 4608

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "61e7502b8389b_Tue233252e9.exe" /f

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 1744

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 195.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 myvideodonwload.com udp
US 8.8.8.8:53 iplogger.org udp
US 172.67.74.161:80 iplogger.org tcp
US 172.67.74.161:443 iplogger.org tcp
RU 91.241.19.125:80 tcp
US 8.8.8.8:53 161.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
RU 91.241.19.125:80 tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 71.209.201.84.in-addr.arpa udp
US 172.67.74.161:80 iplogger.org tcp
US 8.8.8.8:53 myvideodonwload.com udp
US 172.67.74.161:80 iplogger.org tcp
US 8.8.8.8:53 youtube4kdowloader.club udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 104.209.201.84.in-addr.arpa udp

Files

memory/4608-0-0x00000000008B0000-0x00000000008D0000-memory.dmp

memory/4608-1-0x00000000008D0000-0x0000000000908000-memory.dmp

memory/4608-2-0x0000000000400000-0x000000000043B000-memory.dmp

memory/4608-3-0x00000000008B0000-0x00000000008D0000-memory.dmp

memory/4608-4-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4608-5-0x00000000008D0000-0x0000000000908000-memory.dmp

memory/4608-9-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4608-10-0x0000000000400000-0x000000000043B000-memory.dmp

Analysis: behavioral26

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 dpcapps.me udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 249.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 103.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

memory/2248-0-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/2248-2-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/2248-1-0x00000000001C0000-0x00000000001FB000-memory.dmp

memory/2248-5-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/2248-4-0x0000000000401000-0x0000000000444000-memory.dmp

memory/2248-3-0x00000000001A0000-0x00000000001A1000-memory.dmp

memory/2248-6-0x00000000007F0000-0x0000000000808000-memory.dmp

memory/2248-13-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/2248-14-0x00000000025C0000-0x00000000025CA000-memory.dmp

memory/2248-15-0x0000000005280000-0x0000000005824000-memory.dmp

memory/2248-16-0x0000000002B20000-0x0000000002BB2000-memory.dmp

memory/2248-18-0x00000000007F0000-0x0000000000808000-memory.dmp

memory/2248-20-0x00000000001C0000-0x00000000001FB000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe"

Network

Country Destination Domain Proto
FR 212.193.30.45:80 tcp
US 45.144.225.57:80 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.3.235:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 172.67.133.215:80 wfsdragon.ru tcp
SG 2.56.59.42:80 tcp

Files

N/A

Analysis: behavioral25

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502c4cff3_Tue232cba58c.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 dpcapps.me udp

Files

memory/828-0-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/828-2-0x00000000002C0000-0x00000000002C1000-memory.dmp

memory/828-1-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/828-6-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/828-5-0x0000000000400000-0x00000000004F4000-memory.dmp

memory/828-4-0x0000000000401000-0x0000000000444000-memory.dmp

memory/828-3-0x00000000002E0000-0x000000000031B000-memory.dmp

memory/828-7-0x00000000003C0000-0x00000000003D8000-memory.dmp

memory/828-14-0x00000000003E0000-0x00000000003EA000-memory.dmp

memory/828-15-0x00000000002E0000-0x000000000031B000-memory.dmp

memory/828-16-0x00000000003C0000-0x00000000003D8000-memory.dmp

Analysis: behavioral16

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 732

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 792

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 728

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 728

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 968

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "61e7501ab629f_Tue23c4645058.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501ab629f_Tue23c4645058.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1048 -ip 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 960

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "61e7501ab629f_Tue23c4645058.exe" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 193.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 71.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 201.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 169.253.116.51.in-addr.arpa udp

Files

memory/1048-0-0x0000000000580000-0x00000000005AA000-memory.dmp

memory/1048-1-0x00000000006F0000-0x000000000073C000-memory.dmp

memory/1048-2-0x0000000000400000-0x0000000000450000-memory.dmp

memory/1048-5-0x00000000006F0000-0x000000000073C000-memory.dmp

memory/1048-6-0x0000000000400000-0x0000000000450000-memory.dmp

memory/1048-4-0x0000000000580000-0x00000000005AA000-memory.dmp

memory/1048-3-0x0000000000400000-0x000000000046C000-memory.dmp

Analysis: behavioral32

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurlpp.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2500 wrote to memory of 3716 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2500 wrote to memory of 3716 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2500 wrote to memory of 3716 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurlpp.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\libcurlpp.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3716 -ip 3716

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 664

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 68.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 195.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

memory/3716-0-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/3716-1-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/3716-2-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/3716-3-0x0000000064941000-0x000000006494F000-memory.dmp

memory/3716-4-0x0000000064940000-0x0000000064959000-memory.dmp

memory/3716-7-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/3716-11-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/3716-6-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/3716-12-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/3716-10-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/3716-8-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/3716-9-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/3716-13-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/3716-5-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/3716-14-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/3716-17-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/3716-16-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/3716-15-0x000000006B440000-0x000000006B4CF000-memory.dmp

Analysis: behavioral21

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

122s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe"

Signatures

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1628 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 1900 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Users\Admin\AppData\Local\Temp\11111.exe
PID 1628 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Windows\system32\WerFault.exe
PID 1628 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Windows\system32\WerFault.exe
PID 1628 wrote to memory of 2692 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe C:\Windows\system32\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe"

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 1628 -s 476

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 www.hhiuew33.com udp

Files

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 94989927a6611e1919f84e1871922b63
SHA1 b602e4c47c9c42c273b68a1ce85f0814c0e05deb
SHA256 6abf00e8457005606b0286fba4abc75bdb5d8d8267b17678d719122946db5c17
SHA512 ce69c1597f759efdb61ba441a5c16b587b77e3780e134c312dc832a502a1933b04f6b981e0e4b5c998c38d77b25763d2c2875cb790b142f44a416dcf75880b6e

memory/2500-6-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2500-9-0x0000000000400000-0x0000000000480000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 b7161c0845a64ff6d7345b67ff97f3b0
SHA1 d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256 fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA512 98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 d0527733abcc5c58735e11d43061b431
SHA1 28de9d191826192721e325787b8a50a84328cffd
SHA256 b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA512 7704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5

memory/1900-18-0x0000000000400000-0x0000000000483000-memory.dmp

memory/1900-24-0x0000000000400000-0x0000000000483000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 46183ada973d3bfaab7be726c800e96e
SHA1 7fcb7272b04d8b1caaf1343ec720461ca79f45c2
SHA256 0cba483c4b5eeb5d275d2a54db9f7c3c213615628b4ac79044980347930e7a1f
SHA512 338c4ccf7cde74e3aa5c9bb27672797ab8b4c8aa6e99fbcf61a2dc8caecdd871b747e4bcc654391479bc4df5a1e72257da9957f9768c67b2846dd9435b950926

Analysis: behavioral22

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe"

Signatures

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe"

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 226.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 www.hhiuew33.com udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 147.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 94989927a6611e1919f84e1871922b63
SHA1 b602e4c47c9c42c273b68a1ce85f0814c0e05deb
SHA256 6abf00e8457005606b0286fba4abc75bdb5d8d8267b17678d719122946db5c17
SHA512 ce69c1597f759efdb61ba441a5c16b587b77e3780e134c312dc832a502a1933b04f6b981e0e4b5c998c38d77b25763d2c2875cb790b142f44a416dcf75880b6e

memory/2688-3-0x0000000000400000-0x0000000000480000-memory.dmp

memory/2688-6-0x0000000000400000-0x0000000000480000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 b7161c0845a64ff6d7345b67ff97f3b0
SHA1 d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256 fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA512 98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 d0527733abcc5c58735e11d43061b431
SHA1 28de9d191826192721e325787b8a50a84328cffd
SHA256 b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA512 7704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5

memory/4488-11-0x0000000000400000-0x0000000000483000-memory.dmp

memory/4488-17-0x0000000000400000-0x0000000000483000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 30188d66149fba77523414f45f7b03ff
SHA1 6c7be340f942984c5003bc37aaf64925a6f4fc3f
SHA256 b2229fb8531832fe5cf163921798e3828f07ef77f26d372a594254c9651c2929
SHA512 3ab25089b7a65c55b6f674d637731d180d55209b0246d385c79fde511572e6c06a834b2d0fbd12cc9cfd4a29264f374f23e0396c47eeb51128c5d5d8def73e85

Analysis: behavioral23

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240708-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "61e7502b8389b_Tue233252e9.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7502b8389b_Tue233252e9.exe" & exit

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "61e7502b8389b_Tue233252e9.exe" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 myvideodonwload.com udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:443 iplogger.org tcp
RU 91.241.19.125:80 tcp
RU 91.241.19.125:80 tcp
RU 91.241.19.125:80 tcp
RU 91.241.19.125:80 tcp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:443 iplogger.org tcp
US 104.26.3.46:80 iplogger.org tcp
US 8.8.8.8:53 youtube4kdowloader.club udp

Files

memory/2220-0-0x0000000000020000-0x0000000000040000-memory.dmp

memory/2220-1-0x0000000000220000-0x0000000000258000-memory.dmp

memory/2220-2-0x0000000000400000-0x000000000043B000-memory.dmp

memory/2220-3-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2220-4-0x0000000000020000-0x0000000000040000-memory.dmp

memory/2220-5-0x0000000000220000-0x0000000000258000-memory.dmp

memory/2220-6-0x0000000000400000-0x000000000043B000-memory.dmp

memory/2220-16-0x0000000000400000-0x000000000043B000-memory.dmp

memory/2220-15-0x0000000000400000-0x0000000000462000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20241010-en

Max time kernel

150s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd2175cb_Tue23956aa60ed.exe" -a

Network

Country Destination Domain Proto
US 8.8.8.8:53 v.xyzgamev.com udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20240903-en

Max time kernel

141s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 876 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 2096 wrote to memory of 1424 N/A C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp
PID 1424 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"

C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

"C:\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$400EE,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT

C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

"C:\Users\Admin\AppData\Local\Temp\is-2P9RR.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$500EE,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT

Network

Country Destination Domain Proto
US 8.8.8.8:53 noplayboy.com udp

Files

memory/876-0-0x0000000000400000-0x0000000000414000-memory.dmp

memory/876-2-0x0000000000401000-0x000000000040B000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-3ROK3.tmp\61e74fd3252fe_Tue23df2ad021a.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/2096-10-0x0000000000400000-0x00000000004BD000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-68PSM.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

\Users\Admin\AppData\Local\Temp\is-68PSM.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/2096-22-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/876-24-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1424-27-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1424-43-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2664-44-0x0000000000400000-0x00000000004BD000-memory.dmp

Analysis: behavioral12

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

143s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" .\G1V6MSEY.nr

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\G1V6MSEY.nr

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 226.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 114.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 249.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

memory/800-5-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-6-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-7-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-8-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-9-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-10-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-11-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-12-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-13-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-14-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-15-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-16-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-17-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-18-0x0000000002F60000-0x0000000003F60000-memory.dmp

memory/800-19-0x000000002DFB0000-0x000000002E061000-memory.dmp

memory/800-20-0x000000002E070000-0x000000002E10D000-memory.dmp

memory/800-21-0x000000002E070000-0x000000002E10D000-memory.dmp

memory/800-23-0x000000002E070000-0x000000002E10D000-memory.dmp

memory/800-24-0x0000000002F60000-0x0000000003F60000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe"

Signatures

Socelars

stealer socelars

Socelars family

socelars

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133756202365054872" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3520 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe C:\Windows\SysWOW64\cmd.exe
PID 3520 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe C:\Windows\SysWOW64\cmd.exe
PID 3520 wrote to memory of 2292 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe C:\Windows\SysWOW64\cmd.exe
PID 2292 wrote to memory of 1736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2292 wrote to memory of 1736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2292 wrote to memory of 1736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 3520 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3520 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 1280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 1280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4448 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4448 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4612 wrote to memory of 4992 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd6e97cc40,0x7ffd6e97cc4c,0x7ffd6e97cc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2024,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1572 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3828,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3836 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4676,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4672,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3836,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5268,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5248 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5244,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 www.listincode.com udp
US 52.203.72.196:443 www.listincode.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 243.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 54.205.158.59:443 www.listincode.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 iplogger.org udp
US 172.67.74.161:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 161.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 216.58.201.100:443 www.google.com tcp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 106.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 100.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
GB 142.250.180.10:443 ogads-pa.googleapis.com tcp
GB 216.58.201.110:443 apis.google.com tcp
GB 142.250.180.10:443 ogads-pa.googleapis.com udp
US 8.8.8.8:53 10.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 172.217.16.238:443 play.google.com tcp
US 8.8.8.8:53 clients2.google.com udp
N/A 224.0.0.251:5353 udp
GB 216.58.204.78:443 clients2.google.com tcp
US 8.8.8.8:53 clients2.googleusercontent.com udp
US 8.8.8.8:53 238.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 78.204.58.216.in-addr.arpa udp
GB 216.58.213.1:443 clients2.googleusercontent.com tcp
US 8.8.8.8:53 1.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 201.108.222.173.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 323a8aecb373992550d8f1fcadb6ce9d
SHA1 075e3542af7dbcb0df5d1ff1c9a21298f1348124
SHA256 decf401a1aaf084846d7e352992ae4440a4d98bce047d6acada838b15ff8d103
SHA512 34581cb860a13b40514cf265af4f03c2c0d751ed6486b473ad22a0d770f1442211b4a675b50e0eb154c95da3d5440fd11c10689d04eef19ece6ef88cf526db1f

\??\pipe\crashpad_4612_QFLEPWWFYQKBZAAW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Temp\scoped_dir4612_389456065\296146fa-902b-4ed9-b078-78f919f5a405.tmp

MD5 da75bb05d10acc967eecaac040d3d733
SHA1 95c08e067df713af8992db113f7e9aec84f17181
SHA256 33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA512 56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

C:\Users\Admin\AppData\Local\Temp\scoped_dir4612_389456065\CRX_INSTALL\_locales\en_CA\messages.json

MD5 558659936250e03cc14b60ebf648aa09
SHA1 32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA256 2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA512 1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

MD5 4ec1df2da46182103d2ffc3b92d20ca5
SHA1 fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA256 6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512 939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en\messages.json

MD5 07ffbe5f24ca348723ff8c6c488abfb8
SHA1 6dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA256 6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA512 7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 28b478ae5da83bfed3db4e95b302558d
SHA1 04fa54f86613fff91dc7aa15747248103e170309
SHA256 dd63bb4071675a631e3553cfa6726558857709826d13c5d90847dfb736fe3297
SHA512 7cc636fd63cefd349eb63079bc8aaa66d1062f5d62811f7d0de2690573f826fcd3d2ae09779562a62f621deb01709b02975c9747f125cb66d468a9a997583595

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 875cfa38bba00cc49f78b177c7aded1d
SHA1 cb21ea095f744a2241a5b3755c47519437ac4349
SHA256 82ddb7275241f43277a2aab8f5f9ebe8d4f965570f5f2afb077a895d39c3fc55
SHA512 c71ed0b5fa0a429203b46c5a7c4b714bc9fdf03c0c5c00c89a95c2e1ea32b52c5188551476661f0f5b9ddee6c10ea8688939d662e473ba1a6ee908aadd3242bb

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 1c3197c221078e0d4c490d2df156d3d9
SHA1 31e5036956e4db971bde99364b685a228db349f3
SHA256 321328d425166d7541464b30a5f234678b50ff1bbd77fa7aa302eda5b6b0f903
SHA512 862eabdb8f0a5878c6a073b5ecd624e180a2c0f25edbde617d75795a40d4baebaaf0950499f3d1accdad601abd176db1475c47d592b031f8d950aaf4add90693

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f29f2cf9498df577efc28fc0a25c7ddc
SHA1 c85599cdf338a0e4786a0fe357040e3da99b8ed7
SHA256 d357273ad6858693edc29f9f6ba24eec7fd8a2f170bb92e64a6260e9d9b5a086
SHA512 184371e1e22b358ee36cc1f0f93637d0d352b63f746ebac1bd4655e52854be99db0d260799e4fdd51452eb84ab49d84e89d1ba79f73d1a39748599212f0d5df0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 daffdacf31ff77ed98ce49ed2820fe3e
SHA1 2284c00bc406dc7d0b670ffc940828885d962d9b
SHA256 4ef82a05c55612e2713d8e2f0e4c633865efdb3edce3bcc29fdf003f4b09de80
SHA512 1ef211ad03923c944ce9edeb78ba2c518a1a58079ef1f582802e9ffbf25cfa6d32601ec342261e16888cb86092b2138dc209986b16c39b2c24371173eccc8c75

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 85d1533e42da2be95b1e9e5102831a65
SHA1 2efdde8284352659bb7441408f8f3303724d350d
SHA256 2df89e2c9d8a4d048fadcdf6564e4d5b339391e1b0220eb549330b113515ae55
SHA512 61c4b9cc226156959eb9488725d5aafdbd2c42532083ddabdea2101921c46f8b8bf14e0b4c1cf4aed13ec402967c2551553cfdd906bff5ab232d6e19fb939861

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 9dc718de61b6a5046c2e16dc89ff1aa4
SHA1 5877c1afff7b7fbdb760fef81df5b730b84b6785
SHA256 88b4ab8fc637a4b39203979c387b0e32c4e5faf675b6d3bc22fe208e9a9d826a
SHA512 821350b4a0b870b306266d42d1f9c8a3251f22644337f13a8b9b479816aec71f1ff029bd53160541e686bbedde50899d7d91fb0597d2019d83dc76d8a498253a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 87c4329622ee6300a9639739ace09a4a
SHA1 abe797fbf979b0a029c5511bbc082545d959175c
SHA256 1e37a6d9df07138276c1625c02c261bb79beea4ad3ae8f025b0da0c3a21cb845
SHA512 0cd2f53706f8258b7cc1d5c5400d10fdcdab722c8031f20a78b73df3103a2ea34888117de9f59a9659d33bdb7af5dec2e49bc83b14ee807192fb8a34639b7eaf

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 c9a7348c43dbf9500976d37d83178c5a
SHA1 9cae4d7d67edb500e0fdf591d3ed2a978d3fd0eb
SHA256 22319db9cf1f3edf78b68ab43b3e0b29180c9acc203faf2e062b7015e5275542
SHA512 9ace993004268981f656cf80306f08595e2355ea82d79c23d617ca53218e29fd0c2c9b48bad1f080acf88d16a527449c5a319290fcc4a5889a6b4de7f650f808

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 88aa5fed559cd8a81ecd748481fe4e69
SHA1 6563e17689aee42ed92e357bbcb1789289635a50
SHA256 e9443abbe78b32696f7ac9b288abacdd3bd5f5cfcc28154a22b8ff7cbfa00474
SHA512 14efd420c6770d43149aa0352bc7bc0398728dfe06e1d65b1e92502693a3c0ce79869c3bac23cbebe7526b9ba0f16afdf91448b81cd07a99d534b72cdf842b45

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 704485fce09fe6e9fa500e61ceeec464
SHA1 beab04901b8fdf4e62927e6998572d131f3cf065
SHA256 44109abd94ca1e2ac8209aeaba63cc11d6e653dd55352f6c63620f322c9338e0
SHA512 44accac82b13b360cbf6caced815f7fca932c7deae1948647216c4ccd206df8768e3100656f5a87291e0297b00f2ca75e7cb0eb087e62a85fbf6a8e2665a6ec4

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 601870b27ae5e3a81b69e1bf0cf494ac
SHA1 90493dc6a0f4d5e07ad6466b755ec536205e60ef
SHA256 cd92722849963eb9845e3d6dc8d90bacc24a055914f002cbe88918e22c2603bb
SHA512 747810f3cdeb60c94f1c3b67d733468ec6a4a277aae582f6b5bf2682ff076d94473ad7e9765edc6939394c60a6f5dee536de2b04042f8d18251efa1a5cc28a7f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 614463b4fed0f8daa0517a1567cee2d3
SHA1 8fdb8d8031ea7e70b509e74140c43452a0091132
SHA256 b9c0b62394136f764c7b502e3ceb91d565ba56aeeecc545157f05a6459a22101
SHA512 9bf95bf8c3d1284862ae6c09ba3bd8b1b6b7ac10c09e4d18d6536d52e154f01b4d19d75fde2caec650d07b1f094fbad024afa452bef6097bf5782b8fa0a3238b

Analysis: behavioral19

Detonation Overview

Submitted

2024-11-09 10:03

Reported

2024-11-09 10:06

Platform

win7-20241023-en

Max time kernel

138s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2020 set thread context of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2020 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe
PID 2020 wrote to memory of 1716 N/A C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe"

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501c830d6_Tue23bdf4712a32.exe

Network

Country Destination Domain Proto
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp
DE 88.99.35.59:63020 tcp

Files

memory/2020-0-0x000000007440E000-0x000000007440F000-memory.dmp

memory/2020-1-0x0000000000A40000-0x0000000000ACA000-memory.dmp

memory/2020-2-0x0000000074400000-0x0000000074AEE000-memory.dmp

memory/2020-3-0x0000000074400000-0x0000000074AEE000-memory.dmp

memory/1716-4-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1716-7-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1716-6-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1716-5-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1716-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1716-10-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1716-12-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-16-0x0000000074400000-0x0000000074AEE000-memory.dmp

memory/1716-15-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1716-17-0x0000000074400000-0x0000000074AEE000-memory.dmp

memory/1716-18-0x0000000074400000-0x0000000074AEE000-memory.dmp

memory/1716-19-0x0000000074400000-0x0000000074AEE000-memory.dmp