Malware Analysis Report

2024-11-13 18:00

Sample ID 241110-b1431szkbn
Target a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N
SHA256 a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46
Tags
discovery upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46

Threat Level: Shows suspicious behavior

The file a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery upx

ACProtect 1.3x - 1.4x DLL software

Loads dropped DLL

UPX packed file

Suspicious use of SetThreadContext

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Modifies registry class

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 01:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 01:37

Reported

2024-11-10 01:39

Platform

win7-20240903-en

Max time kernel

119s

Max time network

17s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID\ = "a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32 C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid\ = "{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\ = "DynamicNS" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80} C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ = "DynamicNS" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 1664 wrote to memory of 2528 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe

"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"

C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe

"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"

Network

N/A

Files

memory/1664-0-0x00000000001E0000-0x00000000001E1000-memory.dmp

memory/2528-6-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-7-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-20-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-21-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/1664-22-0x0000000000400000-0x00000000007F0000-memory.dmp

memory/2528-19-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-23-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-18-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-17-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2528-13-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-11-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-3-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-9-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-1-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-113-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-112-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-111-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-110-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-109-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-108-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-107-0x0000000003F60000-0x0000000003FBB000-memory.dmp

\Users\Admin\AppData\Local\Temp\{0EA92B5B-70BF-45FB-95D0-1A43F007C70E}.dll

MD5 c9f333d1ff898672a34805f94a265329
SHA1 2deaac66698fb2e9b3868d23034c3211c508b739
SHA256 07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b
SHA512 048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

memory/2528-96-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-83-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-79-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-75-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-71-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-70-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-67-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-57-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-55-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-49-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-47-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-41-0x0000000003F60000-0x0000000003FBB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\isDB23.tmp

MD5 778ec2605d321a00f97abe22b2c543c9
SHA1 9755525dc45b0f68cf8927b455105fd4021f31c3
SHA256 be44028a67f9186034a7753e23087cae8b619af7d86bb4d43e84904a17d235cd
SHA512 b6135a31a3e8d92e9ca04540055fab00fb9e086cbca6a1b423a62a464eb0cf8f73205115c05ab64c7ad5379391e987cf88a65954e199a0ab7b20e665fd35c3b3

memory/2528-36-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-32-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-123-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-172-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-203-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-201-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-198-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-196-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-193-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-189-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-186-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-184-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-180-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-176-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-168-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-167-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-163-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-159-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-152-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-151-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-147-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-143-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-139-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-136-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-131-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-216-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-215-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-214-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-217-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-218-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-219-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-220-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-221-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-222-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-223-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-224-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-225-0x0000000003F60000-0x0000000003FBB000-memory.dmp

memory/2528-226-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-227-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-228-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-233-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-264-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-263-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-262-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-261-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-260-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-258-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-254-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-250-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-247-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-245-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-241-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-237-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-308-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-309-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-310-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-311-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-312-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-314-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-313-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-315-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-316-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-317-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-318-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-319-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-320-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-321-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-322-0x0000000005940000-0x000000000599B000-memory.dmp

memory/2528-344-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-341-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-338-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-335-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-333-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-330-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-326-0x0000000005990000-0x00000000059EB000-memory.dmp

memory/2528-407-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-568-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-647-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-804-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-877-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-1036-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-1148-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-1212-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-1305-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/2528-1398-0x0000000000400000-0x00000000005BE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 01:37

Reported

2024-11-10 01:39

Platform

win10v2004-20241007-en

Max time kernel

113s

Max time network

98s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ = "DynamicNS" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid\ = "{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80} C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32 C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\ = "DynamicNS" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS\Clsid C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID\ = "a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.DynamicNS" C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe
PID 4548 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe

"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"

C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe

"C:\Users\Admin\AppData\Local\Temp\a7b7c1789d3a73583e9455e44a568105d5301c5a7b48f0b05469ca989246bd46N.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

memory/4548-0-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

memory/1104-2-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/1104-1-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/1104-3-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/1104-4-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/1104-5-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/4548-6-0x0000000000400000-0x00000000007F0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\{A9489A60-59D2-4699-AB5A-F2F76CF5FDD8}.dll

MD5 c9f333d1ff898672a34805f94a265329
SHA1 2deaac66698fb2e9b3868d23034c3211c508b739
SHA256 07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b
SHA512 048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

memory/1104-15-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-14-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-57-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-139-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-91-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-85-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-79-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-74-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-72-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-67-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-65-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-59-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-52-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-138-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-47-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-45-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-39-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-34-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-32-0x0000000005510000-0x000000000556B000-memory.dmp

memory/1104-27-0x0000000005510000-0x000000000556B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\isB834.tmp

MD5 778ec2605d321a00f97abe22b2c543c9
SHA1 9755525dc45b0f68cf8927b455105fd4021f31c3
SHA256 be44028a67f9186034a7753e23087cae8b619af7d86bb4d43e84904a17d235cd
SHA512 b6135a31a3e8d92e9ca04540055fab00fb9e086cbca6a1b423a62a464eb0cf8f73205115c05ab64c7ad5379391e987cf88a65954e199a0ab7b20e665fd35c3b3

memory/1104-140-0x0000000000400000-0x00000000005BE000-memory.dmp

memory/1104-141-0x0000000000400000-0x00000000005BE000-memory.dmp