Malware Analysis Report

2025-04-03 14:15

Sample ID 241114-t5n7ga1jds
Target EXBRRVQT.exe
SHA256 baa56e574d8deed445d0e58487add9d429d60bbb1b39943c581bcf50e9bd91d6
Tags
discovery collection spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

baa56e574d8deed445d0e58487add9d429d60bbb1b39943c581bcf50e9bd91d6

Threat Level: Shows suspicious behavior

The file EXBRRVQT.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery collection spyware stealer

Reads WinSCP keys stored on the system

Reads user/profile data of web browsers

Loads dropped DLL

Executes dropped EXE

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Unsigned PE

Browser Information Discovery

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

outlook_office_path

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-14 16:38

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-14 16:38

Reported

2024-11-14 16:41

Platform

win7-20241010-en

Max time kernel

122s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe N/A
N/A N/A C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe N/A
N/A N/A C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2648 set thread context of 1604 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 1832 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe
PID 2584 wrote to memory of 2248 N/A C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe
PID 2584 wrote to memory of 2248 N/A C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe
PID 2584 wrote to memory of 2248 N/A C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe
PID 2584 wrote to memory of 2248 N/A C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe
PID 2248 wrote to memory of 2648 N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
PID 2248 wrote to memory of 2648 N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
PID 2248 wrote to memory of 2648 N/A C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
PID 2648 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 2648 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 2648 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 2648 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 2648 wrote to memory of 1604 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 1604 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 1604 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 1604 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 1604 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 1604 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 1604 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

Processes

C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe

"C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe"

C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe

"C:\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe

"C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe"

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\SysWOW64\cmd.exe

C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

Network

N/A

Files

\Windows\Temp\{317CBD32-0DC9-45F1-9F26-E664D69044E6}\.cr\EXBRRVQT.exe

MD5 eb26dfa5e4e3170d90b5629df0715aa9
SHA1 bbc10367aa29aa36a6e53c63b60a6936bc6f1720
SHA256 70721a20760818839c7ef0ce2d684666bd07bbb79b87415944c6efbce58f7906
SHA512 11e2683c8f47c62548050f863386e62908c5dd7e456ca13c22644ecb984533d3abdd72d1fd5a3ac53c1b2734e5999554d383f3f5c615d4c94c4c169664787bf9

\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\Helicoid.dll

MD5 a9c5977784daf8cebe8408a8b6db3fbe
SHA1 8ae8d67007cdca9acf96681ffa6200e5847972de
SHA256 63f5a34563b62de3dffa57401d7225f4687933cef250b78b995eee813c862fad
SHA512 886fbea2c959ce4245185d1dcec3efcfbb50a71840c964d4fd8e0a46f7fbf8afbf7445bc2d892789f25124b862912fb0c3556c5004a7e6ddb4ee13b87cf58a65

\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\ActiveISO.exe

MD5 b84dfabe933d1160f624693d94779ce5
SHA1 ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f
SHA256 588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd
SHA512 eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\Qt5PrintSupport.dll

MD5 d0634933db2745397a603d5976bee8e7
SHA1 ddec98433bcfec1d9e38557d803bc73e1ff883b6
SHA256 7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1
SHA512 9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\StarBurn.dll

MD5 41e19ba2364f2c834b2487e1d02bb99a
SHA1 6c61d603dddfe384a93ad33775b70681d0a396d9
SHA256 c040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340
SHA512 6ebf4a9e80f16c6a03ff357d2da9a34a4227bfd65eb66d1d335349a77ba066d069ba0d47d46229b3c77b59052c42d388678662f970b418d8cc3cfb1223427d8c

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\Qt5Widgets.dll

MD5 c502bb8a4a7dc3724ab09292cd3c70d6
SHA1 ff44fddeec2d335ec0eaa861714b561f899675fd
SHA256 4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d
SHA512 73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\Qt5Gui.dll

MD5 34893cb3d9a2250f0edecd68aedb72c7
SHA1 37161412df2c1313a54749fe6f33e4dbf41d128a
SHA256 ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34
SHA512 484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\Qt5Core.dll

MD5 8c735052a2d4e9b01b0e028f0c20f67c
SHA1 b72bde11de3310a495dd16520362f4adbf21717a
SHA256 d751ab0357f71586b1793ce4166295aba085334647d6e3ffcd49287a801273e7
SHA512 0bbd920e1b48361c7f3e1540ddb12fa6c9146bfe36e13eba2b2e6ca8bf3ad961d88121c6f70eca6d9ea413900455e696f7233c5bb54415ca7d2c9c1c0d4c1fb3

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\MSVCP140.dll

MD5 7db24201efea565d930b7ec3306f4308
SHA1 880c8034b1655597d0eebe056719a6f79b60e03c
SHA256 72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e
SHA512 bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\VCRUNTIME140_1.dll

MD5 75e78e4bf561031d39f86143753400ff
SHA1 324c2a99e39f8992459495182677e91656a05206
SHA256 1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512 ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\Qt5Network.dll

MD5 fe5ed4c5da03077f98c3efa91ecefd81
SHA1 e23e839ec0602662788f761ebe7dd4b39c018a7f
SHA256 d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b
SHA512 22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

memory/2248-42-0x000007FEF6320000-0x000007FEF686E000-memory.dmp

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\vechpt

MD5 dd899ca13e5bef55bcea07e167da891b
SHA1 e883f0240f127520486f063b033fb34fa2dfe5c1
SHA256 a818d6fa8caddaa608345ea40b75073a7c98637161794918566e2ddeeede47e7
SHA512 e38437899fcc433ef89a04c6a68684ea5110181af48a4699836939cf167d0c1fe7932432518445e90acbcbc151ee324d77de064147d97fdedf6ecabaac788c06

C:\Windows\Temp\{06D9D017-5839-4A23-9A5D-23596E542CBA}\.ba\dcfa

MD5 456596683dad1217c76d8c0f47b5cfbc
SHA1 001ae3f937aa75ad2175289c6e8f09561a1cbb35
SHA256 a7e578d0f7a5d522e4b4e62864f77cbb1830dc7e7026c9ee0b5f6fa7156c727f
SHA512 537420007a4985f2deb4b2a48af1ba61cf8cc112359ec1cdbd02dfb8e958ab5ab4ec302cd0698a14d4560afe6c23627d1d4d080eac9daa7cb5edc7259cb73591

memory/2648-79-0x000007FEF6320000-0x000007FEF686E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\240e078a

MD5 01fac66126c3f819f371126b5d1cd705
SHA1 5220071b3a45f14f59d3b4f12b58fb3132d631e0
SHA256 a7603d1533668dcd8f1bcee34e51ecb603c9d170c4f580017e022a3d03d117d3
SHA512 7f68e0410549f2ea2f10570f655f3774831a5ef9bdcf34d66fc4a125e5cc9be3d73a60319f6d7146153ca0dc214f4313e3715177e59045db8438e7e12876f2fb

memory/1604-86-0x0000000077820000-0x00000000779C9000-memory.dmp

\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

MD5 967f4470627f823f4d7981e511c9824f
SHA1 416501b096df80ddc49f4144c3832cf2cadb9cb2
SHA256 b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91
SHA512 8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

memory/1604-134-0x0000000074F60000-0x00000000750D4000-memory.dmp

memory/3032-139-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmp

memory/3032-138-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmp

memory/3032-141-0x0000000000160000-0x0000000000446000-memory.dmp

memory/3032-142-0x0000000000160000-0x0000000000446000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-14 16:38

Reported

2024-11-14 16:41

Platform

win10v2004-20241007-en

Max time kernel

114s

Max time network

116s

Command Line

"C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1092 set thread context of 868 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4504 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe
PID 4504 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe
PID 4504 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe
PID 2876 wrote to memory of 3664 N/A C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe
PID 2876 wrote to memory of 3664 N/A C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe
PID 3664 wrote to memory of 1092 N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
PID 3664 wrote to memory of 1092 N/A C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
PID 1092 wrote to memory of 868 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 1092 wrote to memory of 868 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 1092 wrote to memory of 868 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 1092 wrote to memory of 868 N/A C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe C:\Windows\SysWOW64\cmd.exe
PID 868 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 868 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 868 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
PID 868 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe

"C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe"

C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe

"C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\EXBRRVQT.exe" -burn.filehandle.attached=536 -burn.filehandle.self=532

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe

"C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe"

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\SysWOW64\cmd.exe

C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 22.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 101.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 sirnisirlo.online udp
US 172.67.214.86:443 sirnisirlo.online tcp
US 8.8.8.8:53 86.214.67.172.in-addr.arpa udp

Files

C:\Windows\Temp\{2920B4CB-CF0B-4976-94AC-343CF54303C5}\.cr\EXBRRVQT.exe

MD5 eb26dfa5e4e3170d90b5629df0715aa9
SHA1 bbc10367aa29aa36a6e53c63b60a6936bc6f1720
SHA256 70721a20760818839c7ef0ce2d684666bd07bbb79b87415944c6efbce58f7906
SHA512 11e2683c8f47c62548050f863386e62908c5dd7e456ca13c22644ecb984533d3abdd72d1fd5a3ac53c1b2734e5999554d383f3f5c615d4c94c4c169664787bf9

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\Helicoid.dll

MD5 a9c5977784daf8cebe8408a8b6db3fbe
SHA1 8ae8d67007cdca9acf96681ffa6200e5847972de
SHA256 63f5a34563b62de3dffa57401d7225f4687933cef250b78b995eee813c862fad
SHA512 886fbea2c959ce4245185d1dcec3efcfbb50a71840c964d4fd8e0a46f7fbf8afbf7445bc2d892789f25124b862912fb0c3556c5004a7e6ddb4ee13b87cf58a65

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\ActiveISO.exe

MD5 b84dfabe933d1160f624693d94779ce5
SHA1 ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f
SHA256 588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd
SHA512 eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\StarBurn.dll

MD5 41e19ba2364f2c834b2487e1d02bb99a
SHA1 6c61d603dddfe384a93ad33775b70681d0a396d9
SHA256 c040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340
SHA512 6ebf4a9e80f16c6a03ff357d2da9a34a4227bfd65eb66d1d335349a77ba066d069ba0d47d46229b3c77b59052c42d388678662f970b418d8cc3cfb1223427d8c

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\vcruntime140_1.dll

MD5 75e78e4bf561031d39f86143753400ff
SHA1 324c2a99e39f8992459495182677e91656a05206
SHA256 1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512 ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\vcruntime140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\Qt5Core.dll

MD5 8c735052a2d4e9b01b0e028f0c20f67c
SHA1 b72bde11de3310a495dd16520362f4adbf21717a
SHA256 d751ab0357f71586b1793ce4166295aba085334647d6e3ffcd49287a801273e7
SHA512 0bbd920e1b48361c7f3e1540ddb12fa6c9146bfe36e13eba2b2e6ca8bf3ad961d88121c6f70eca6d9ea413900455e696f7233c5bb54415ca7d2c9c1c0d4c1fb3

memory/1092-79-0x00007FF972AA0000-0x00007FF972FEE000-memory.dmp

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\msvcp140.dll

MD5 7db24201efea565d930b7ec3306f4308
SHA1 880c8034b1655597d0eebe056719a6f79b60e03c
SHA256 72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e
SHA512 bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\Qt5Network.dll

MD5 fe5ed4c5da03077f98c3efa91ecefd81
SHA1 e23e839ec0602662788f761ebe7dd4b39c018a7f
SHA256 d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b
SHA512 22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\Qt5Gui.dll

MD5 34893cb3d9a2250f0edecd68aedb72c7
SHA1 37161412df2c1313a54749fe6f33e4dbf41d128a
SHA256 ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34
SHA512 484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\Qt5Widgets.dll

MD5 c502bb8a4a7dc3724ab09292cd3c70d6
SHA1 ff44fddeec2d335ec0eaa861714b561f899675fd
SHA256 4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d
SHA512 73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

C:\Users\Admin\AppData\Roaming\MonitorBrowser2\Qt5PrintSupport.dll

MD5 d0634933db2745397a603d5976bee8e7
SHA1 ddec98433bcfec1d9e38557d803bc73e1ff883b6
SHA256 7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1
SHA512 9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

memory/3664-45-0x00007FF973180000-0x00007FF9732F2000-memory.dmp

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\dcfa

MD5 456596683dad1217c76d8c0f47b5cfbc
SHA1 001ae3f937aa75ad2175289c6e8f09561a1cbb35
SHA256 a7e578d0f7a5d522e4b4e62864f77cbb1830dc7e7026c9ee0b5f6fa7156c727f
SHA512 537420007a4985f2deb4b2a48af1ba61cf8cc112359ec1cdbd02dfb8e958ab5ab4ec302cd0698a14d4560afe6c23627d1d4d080eac9daa7cb5edc7259cb73591

C:\Windows\Temp\{7027CDB9-ED3C-4A88-B278-9584EFD98E8B}\.ba\vechpt

MD5 dd899ca13e5bef55bcea07e167da891b
SHA1 e883f0240f127520486f063b033fb34fa2dfe5c1
SHA256 a818d6fa8caddaa608345ea40b75073a7c98637161794918566e2ddeeede47e7
SHA512 e38437899fcc433ef89a04c6a68684ea5110181af48a4699836939cf167d0c1fe7932432518445e90acbcbc151ee324d77de064147d97fdedf6ecabaac788c06

memory/3664-42-0x00007FF974080000-0x00007FF9745CE000-memory.dmp

memory/1092-83-0x00007FF9745E0000-0x00007FF974752000-memory.dmp

memory/1092-84-0x00007FF9745E0000-0x00007FF974752000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\df3d4df

MD5 9e401f6aadc18ea5d01f08fa98f94c06
SHA1 50adda0a23b883339613860691f5a65ef1775c7e
SHA256 d1c12ae482354076eabf31e96eb2e1ea66b2bf53dd657f0e43daabba92caec1b
SHA512 a1e07a318a23d9d3c6d10e9d775bd76bd3ca6a3fed7467901ca117641bf490769a197eb1e5a6dbeca0d6ee14270b15668a056bc1983b1208ecab2b69167746bc

memory/868-87-0x00007FF992C70000-0x00007FF992E65000-memory.dmp

memory/868-90-0x0000000075480000-0x00000000755FB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

MD5 967f4470627f823f4d7981e511c9824f
SHA1 416501b096df80ddc49f4144c3832cf2cadb9cb2
SHA256 b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91
SHA512 8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

memory/4916-97-0x00007FF7280B0000-0x00007FF728396000-memory.dmp

memory/4916-98-0x00007FF7280B0000-0x00007FF728396000-memory.dmp

memory/4916-101-0x00007FF7280B0000-0x00007FF728396000-memory.dmp

memory/4916-106-0x00007FF7280B0000-0x00007FF728396000-memory.dmp

memory/4916-108-0x00007FF7280B0000-0x00007FF728396000-memory.dmp

memory/4916-111-0x00007FF7280B0000-0x00007FF728396000-memory.dmp