Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
x.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
x.exe
Resource
win10v2004-20241007-en
General
-
Target
x.exe
-
Size
1.0MB
-
MD5
31bc6907d6097a76bb1dd891cfc09b7a
-
SHA1
97340ca203a1207e492135d580c6860a724a227f
-
SHA256
f711703c8ba66dcedb8e4b83f21a0425c528e278242c852fd5cf54bb43e30454
-
SHA512
6c217fa37cc4c655cda0a2a491e49ac736e4940027178b3c7d6488d296923d40cc26a4d0142052b94b58491fa90f17ab3f4115cb0c75efe09175e732d62dbbf5
-
SSDEEP
24576:BJSK4Kavab3wMeAOr6ZFlR+gKT44VoIOL7zk:7K1WYL6L
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/1092-3-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-7-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-8-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-12-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-11-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-17-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-25-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-39-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-55-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-54-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-81-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-80-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-44-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-79-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-78-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-43-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-76-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-73-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-42-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-74-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-71-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-70-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-40-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-64-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-62-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-36-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-60-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-61-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-59-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-57-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-33-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-31-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-30-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-29-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-28-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-77-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-75-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-41-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-65-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-24-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-38-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-37-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-35-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-23-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-56-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-22-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-32-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-52-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-21-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-20-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-19-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-18-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-27-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-26-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-16-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-34-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-15-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-14-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-13-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-9-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 behavioral2/memory/1092-10-0x0000000002E90000-0x0000000003E90000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1904 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation lxsyrsiW.pif Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation server_BTC.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 13 IoCs
pid Process 2124 alpha.pif 4048 alpha.pif 4868 alpha.pif 4204 xpha.pif 4996 lxsyrsiW.pif 4664 alg.exe 468 neworigin.exe 1144 server_BTC.exe 3008 elevation_service.exe 3452 elevation_service.exe 2344 maintenanceservice.exe 2320 OSE.EXE 5056 TrojanAIbot.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wisrysxl = "C:\\Users\\Public\\Wisrysxl.url" x.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 api.ipify.org 48 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\1f347626db05c3ba.bin alg.exe File opened for modification C:\Windows\System32\alg.exe lxsyrsiW.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1092 set thread context of 4996 1092 x.exe 111 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{8A1C963D-7054-4DC6-AA98-9FBFCE5E4C3B}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_79171\javaws.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxsyrsiW.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1544 esentutl.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 816 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1248 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5056 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 468 neworigin.exe 468 neworigin.exe 468 neworigin.exe 1904 powershell.exe 1904 powershell.exe 1904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4996 lxsyrsiW.pif Token: SeDebugPrivilege 468 neworigin.exe Token: SeDebugPrivilege 1144 server_BTC.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 5056 TrojanAIbot.exe Token: SeDebugPrivilege 4664 alg.exe Token: SeDebugPrivilege 4664 alg.exe Token: SeDebugPrivilege 4664 alg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 468 neworigin.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4012 1092 x.exe 100 PID 1092 wrote to memory of 4012 1092 x.exe 100 PID 1092 wrote to memory of 4012 1092 x.exe 100 PID 4012 wrote to memory of 3428 4012 cmd.exe 104 PID 4012 wrote to memory of 3428 4012 cmd.exe 104 PID 4012 wrote to memory of 3428 4012 cmd.exe 104 PID 4012 wrote to memory of 1544 4012 cmd.exe 105 PID 4012 wrote to memory of 1544 4012 cmd.exe 105 PID 4012 wrote to memory of 1544 4012 cmd.exe 105 PID 4012 wrote to memory of 2124 4012 cmd.exe 106 PID 4012 wrote to memory of 2124 4012 cmd.exe 106 PID 4012 wrote to memory of 2124 4012 cmd.exe 106 PID 4012 wrote to memory of 4048 4012 cmd.exe 107 PID 4012 wrote to memory of 4048 4012 cmd.exe 107 PID 4012 wrote to memory of 4048 4012 cmd.exe 107 PID 4012 wrote to memory of 4868 4012 cmd.exe 108 PID 4012 wrote to memory of 4868 4012 cmd.exe 108 PID 4012 wrote to memory of 4868 4012 cmd.exe 108 PID 4868 wrote to memory of 4204 4868 alpha.pif 109 PID 4868 wrote to memory of 4204 4868 alpha.pif 109 PID 4868 wrote to memory of 4204 4868 alpha.pif 109 PID 1092 wrote to memory of 4176 1092 x.exe 110 PID 1092 wrote to memory of 4176 1092 x.exe 110 PID 1092 wrote to memory of 4176 1092 x.exe 110 PID 1092 wrote to memory of 4996 1092 x.exe 111 PID 1092 wrote to memory of 4996 1092 x.exe 111 PID 1092 wrote to memory of 4996 1092 x.exe 111 PID 1092 wrote to memory of 4996 1092 x.exe 111 PID 1092 wrote to memory of 4996 1092 x.exe 111 PID 4996 wrote to memory of 468 4996 lxsyrsiW.pif 116 PID 4996 wrote to memory of 468 4996 lxsyrsiW.pif 116 PID 4996 wrote to memory of 468 4996 lxsyrsiW.pif 116 PID 4996 wrote to memory of 1144 4996 lxsyrsiW.pif 117 PID 4996 wrote to memory of 1144 4996 lxsyrsiW.pif 117 PID 4996 wrote to memory of 1144 4996 lxsyrsiW.pif 117 PID 1144 wrote to memory of 1904 1144 server_BTC.exe 122 PID 1144 wrote to memory of 1904 1144 server_BTC.exe 122 PID 1144 wrote to memory of 1904 1144 server_BTC.exe 122 PID 1144 wrote to memory of 1248 1144 server_BTC.exe 123 PID 1144 wrote to memory of 1248 1144 server_BTC.exe 123 PID 1144 wrote to memory of 1248 1144 server_BTC.exe 123 PID 1144 wrote to memory of 5056 1144 server_BTC.exe 126 PID 1144 wrote to memory of 5056 1144 server_BTC.exe 126 PID 1144 wrote to memory of 5056 1144 server_BTC.exe 126 PID 1144 wrote to memory of 3588 1144 server_BTC.exe 127 PID 1144 wrote to memory of 3588 1144 server_BTC.exe 127 PID 1144 wrote to memory of 3588 1144 server_BTC.exe 127 PID 3588 wrote to memory of 816 3588 cmd.exe 129 PID 3588 wrote to memory of 816 3588 cmd.exe 129 PID 3588 wrote to memory of 816 3588 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\x.exe"C:\Users\Admin\AppData\Local\Temp\x.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:3428
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1544
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4204
-
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\x.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o2⤵PID:4176
-
-
C:\Users\Public\Libraries\lxsyrsiW.pifC:\Users\Public\Libraries\lxsyrsiW.pif2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 15:00 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1248
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp35.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:816
-
-
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3008
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3452
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2344
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2320
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD544e734c72202f69d75e6eba9dde9479d
SHA140e727f5145b4af9664bf8b36320c03c3d08074d
SHA256403388c51ac994dc4d631ef843eaac34ae21ac76f7340ab80bc5e27a947d5f21
SHA5125a74bb60daaa1e24c44b7cc0ea6910493fe25be9efb58c24753c78d2fc1f7624126741d561dec7427e78cb5a26d65549e64486d9bfa9f13dd4e7654d97660e38
-
Filesize
1.3MB
MD5584124db16f7f7c318335a7c641311a4
SHA1de8ff93c9b26aabd1a6ec12d1ae490962cc4a708
SHA25627bbf4864714b3519b83c33556c74ef3a9bcccf6981035104bc22d828e994271
SHA512b5dfe8ee21381a649a65ec6ce95b5fc1144793e7f396210090f5abcc309437af0059664741521bc082196a35692b4a4da640093bf23929e3a3794e69cca8cead
-
Filesize
1.3MB
MD55e498d9ba969f3e96a1451fd326ad873
SHA1ec6b3a40da3da98c914d381711cbfcb06f594dc8
SHA256677c203e21b8a746d2bbf8194e83dd2d18ef912866c1b42e48245e41bf456192
SHA512afa90a3c8baf873bb5df498d2b6fe735bdd491310b1f97543c0077f6a0f9c22e8c4e07bc80d351734dcc00a5684e3d2b9adf8157ad14bba69ffbd3794781cfc1
-
Filesize
2.1MB
MD5f904a2182def6d0210f6078d1424f53f
SHA108b5101588c1df8ac76f5ec6b17cfc1419557cb0
SHA2567aa7147370a90cb76962f279562cbabd9c224b85f385c7901771b8b390d1ad16
SHA512f51e436f1170fe5c356e0eed8d88a58bdecc61f7c310d7403edef9aba616418e49ef934c6ebea8583ab5f9d4aa1836660f47019a3c723234cb565b9b76f993e1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
160B
MD505b2409a6b611cf0466ebd56eba5ff6e
SHA109c3e67f190a2d0ae6d80981934f291a68d630e2
SHA256e2eed44ef6c02d61060cbbd409ac564b0112b608ac29e27c5a12c55b40d86b29
SHA5127b6750473679af960e773d1a565078726d62111f929b584d299b0a2df0367d7bf6e55c097f496c97fd46f0005ce61213860ba93a1637a3d043566d44d0dd9538
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
1.2MB
MD50f7283661a233ca22908a8fe50e64f32
SHA1750b1812987af91cc9067c5b5aebc734eaed21b1
SHA256bb6f60807180e34a3f8393bb903dc16dc7bac66bece36dee5df30c762e5577c7
SHA512a9a4f6cedadea2e1b169f270520243b30e3191e85e36566d8ec5f1fb4307e447ada0d7ff4f5cdb2469b15f35f9951a80d41212c872ca9be8905f2e3154e929e8