Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe
Resource
win10v2004-20241007-en
General
-
Target
a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe
-
Size
355KB
-
MD5
d80e625211db0a05bb8346f1fc2551f9
-
SHA1
2eab153918e144c22eb00d2f47e8757f21b39211
-
SHA256
a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f
-
SHA512
69261b12ffa2568f20752dab17cc48fe97598f4f640eba4d0dd54b0ab44ff6be529a97eadc1ef23d8758fd70d53c54fa9a764b9f4de86465e4004dffafd461cd
-
SSDEEP
6144:JnYGYzfdtj1alRL2ERw4UAJrx2A41E7vc7YI6Na2UX:JnYGYj/j428rx2ApvcUPbU
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Extracted
C:\Users\Admin\Documents\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/3244-46-0x0000000000CA0000-0x0000000000CA9000-memory.dmp family_bdaejec_backdoor -
Contacts a large (7711) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
resource yara_rule behavioral2/files/0x0008000000023c8f-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation zvweqmo.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Rj3fNWF3.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation zvweqmo.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation zvweqmo.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation zvweqmo.exe -
Deletes itself 1 IoCs
pid Process 4848 WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 3244 zvweqmo.exe 708 zvweqmo.exe 3916 Rj3fNWF3.exe 2380 zvweqmo.exe 1480 Rj3fNWF3.exe 3884 zvweqmo.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Rj3fNWF3.exe File opened (read-only) \??\J: Rj3fNWF3.exe File opened (read-only) \??\M: Rj3fNWF3.exe File opened (read-only) \??\P: Rj3fNWF3.exe File opened (read-only) \??\Q: Rj3fNWF3.exe File opened (read-only) \??\U: Rj3fNWF3.exe File opened (read-only) \??\L: Rj3fNWF3.exe File opened (read-only) \??\S: Rj3fNWF3.exe File opened (read-only) \??\T: Rj3fNWF3.exe File opened (read-only) \??\V: Rj3fNWF3.exe File opened (read-only) \??\X: Rj3fNWF3.exe File opened (read-only) \??\Z: Rj3fNWF3.exe File opened (read-only) \??\I: Rj3fNWF3.exe File opened (read-only) \??\K: Rj3fNWF3.exe File opened (read-only) \??\O: Rj3fNWF3.exe File opened (read-only) \??\R: Rj3fNWF3.exe File opened (read-only) \??\Y: Rj3fNWF3.exe File opened (read-only) \??\E: Rj3fNWF3.exe File opened (read-only) \??\G: Rj3fNWF3.exe File opened (read-only) \??\N: Rj3fNWF3.exe File opened (read-only) \??\W: Rj3fNWF3.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DDx.bmp" Rj3fNWF3.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe zvweqmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe zvweqmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe zvweqmo.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe zvweqmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe zvweqmo.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe zvweqmo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe zvweqmo.exe File opened for modification C:\Program Files\7-Zip\7zG.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE zvweqmo.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe zvweqmo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe zvweqmo.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe zvweqmo.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE zvweqmo.exe File opened for modification C:\Program Files\dotnet\dotnet.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe zvweqmo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteshare.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE zvweqmo.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe zvweqmo.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe zvweqmo.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe zvweqmo.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{86586A1C-7EEC-4BB2-AD86-7C1FB3D0D811}\chrome_installer.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe zvweqmo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe zvweqmo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvweqmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvweqmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvweqmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvweqmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop Rj3fNWF3.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-19 Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-20 Rj3fNWF3.exe -
Modifies registry class 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\DefaultIcon Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\FriendlyTypeName Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\shell\open\command Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\htafile\DefaultIcon Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\htafile Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.sage\ = "sage.notice" Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" Rj3fNWF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\shell Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\shell\open Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings Rj3fNWF3.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.sage Rj3fNWF3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3916 Rj3fNWF3.exe 3916 Rj3fNWF3.exe 3916 Rj3fNWF3.exe 3916 Rj3fNWF3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2032 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2032 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2444 wrote to memory of 3244 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 83 PID 2444 wrote to memory of 3244 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 83 PID 2444 wrote to memory of 3244 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 83 PID 3244 wrote to memory of 2404 3244 zvweqmo.exe 88 PID 3244 wrote to memory of 2404 3244 zvweqmo.exe 88 PID 3244 wrote to memory of 2404 3244 zvweqmo.exe 88 PID 2444 wrote to memory of 4352 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 90 PID 2444 wrote to memory of 4352 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 90 PID 2444 wrote to memory of 4352 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 90 PID 4352 wrote to memory of 708 4352 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 91 PID 4352 wrote to memory of 708 4352 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 91 PID 4352 wrote to memory of 708 4352 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 91 PID 708 wrote to memory of 2900 708 zvweqmo.exe 92 PID 708 wrote to memory of 2900 708 zvweqmo.exe 92 PID 708 wrote to memory of 2900 708 zvweqmo.exe 92 PID 2444 wrote to memory of 3532 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 93 PID 2444 wrote to memory of 3532 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 93 PID 2444 wrote to memory of 3532 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 93 PID 2444 wrote to memory of 3916 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 100 PID 2444 wrote to memory of 3916 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 100 PID 2444 wrote to memory of 3916 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 100 PID 3916 wrote to memory of 2380 3916 Rj3fNWF3.exe 101 PID 3916 wrote to memory of 2380 3916 Rj3fNWF3.exe 101 PID 3916 wrote to memory of 2380 3916 Rj3fNWF3.exe 101 PID 2380 wrote to memory of 4972 2380 zvweqmo.exe 102 PID 2380 wrote to memory of 4972 2380 zvweqmo.exe 102 PID 2380 wrote to memory of 4972 2380 zvweqmo.exe 102 PID 2444 wrote to memory of 4848 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 104 PID 2444 wrote to memory of 4848 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 104 PID 2444 wrote to memory of 4848 2444 a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe 104 PID 3916 wrote to memory of 1480 3916 Rj3fNWF3.exe 106 PID 3916 wrote to memory of 1480 3916 Rj3fNWF3.exe 106 PID 3916 wrote to memory of 1480 3916 Rj3fNWF3.exe 106 PID 1480 wrote to memory of 3884 1480 Rj3fNWF3.exe 107 PID 1480 wrote to memory of 3884 1480 Rj3fNWF3.exe 107 PID 1480 wrote to memory of 3884 1480 Rj3fNWF3.exe 107 PID 3884 wrote to memory of 1296 3884 zvweqmo.exe 108 PID 3884 wrote to memory of 1296 3884 zvweqmo.exe 108 PID 3884 wrote to memory of 1296 3884 zvweqmo.exe 108 PID 3916 wrote to memory of 2300 3916 Rj3fNWF3.exe 116 PID 3916 wrote to memory of 2300 3916 Rj3fNWF3.exe 116 PID 3916 wrote to memory of 2300 3916 Rj3fNWF3.exe 116 PID 3916 wrote to memory of 4328 3916 Rj3fNWF3.exe 117 PID 3916 wrote to memory of 4328 3916 Rj3fNWF3.exe 117 PID 3916 wrote to memory of 4328 3916 Rj3fNWF3.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe"C:\Users\Admin\AppData\Local\Temp\a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\zvweqmo.exeC:\Users\Admin\AppData\Local\Temp\zvweqmo.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0ceb7200.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe"C:\Users\Admin\AppData\Local\Temp\a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f.exe" g2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\zvweqmo.exeC:\Users\Admin\AppData\Local\Temp\zvweqmo.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6ae65f0c.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "N0mFUQoa" /TR "C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" /SC ONLOGON /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\zvweqmo.exeC:\Users\Admin\AppData\Local\Temp\zvweqmo.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\341f05e8.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4972
-
-
-
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\zvweqmo.exeC:\Users\Admin\AppData\Local\Temp\zvweqmo.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\27d54fac.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f252888.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x520 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
189B
MD57595b05d5e2ad10b9f714846ec2696e5
SHA10ed72be6d127f7b24d481775ba109a38b0d327a9
SHA256390174fcfca45cbdf6c7738fa1121429c00ebebcda002664234fb5190203816e
SHA5129e4fc83d4b194e2797f83e71daeb960e332789c2c399b215ebe346647cabfc2f6cf42825af5c8d262951bfc9c972269b67c81349a1906a306a1c800dbee5dff0
-
Filesize
189B
MD514dd3e146136b217c77edb6f18a95d12
SHA1891e459f824dbc5503b4f8a38bc60268cd5feb12
SHA256ca32c5a231af3d64a73e91684c5917c18ac7192f04af60e00df060da9a342693
SHA51224596622c17b7a347925cf568092b3ee445863de69899e0f9d3606bd1a87d58912482c06205d394f032b227065171906fb650ab3300056959eea88c9299864d3
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
189B
MD58c053d1c9e9ed7b09c455053d8ae9bca
SHA12000c7959506e5a02aa989748fa57c151db55ba9
SHA2563938e3da35768ca9062a608ad28943f5572c3500b9e79bea8113babf60819d31
SHA5123150ae504460a56deb3b306c522629a10567b9689f14ade95fefcb5abc0d8d8625c060e0a2d19cb8c5ee86dad817292e3311dc3efcc18a03040232eee8f89303
-
Filesize
189B
MD58d72933d582af6a13a2d4651f8efe319
SHA1bb2be44a92368050b1ffdd38547b353c824d3815
SHA2564c5852dff3093715cfbb4bc8688fd763d55b6138c170fe83ebf7df5fc1e601ca
SHA512a9be4bf4a604802a17cb03c52b2814d0b337cfe6bcbf5c78d13b05430cef4211b9851310f7acfb71cf4df864c7d41abd57da75c3d057a7eb0f12e0be22d21ef4
-
Filesize
3KB
MD537219fd2d09abee4189a1ae33de93e2d
SHA15e4cc26e169b6bd16843bcc86806556dac372c57
SHA2562a0d2418a2504ad14960dcff54f0892339eeed53e359585c9b04a29c4e6e4274
SHA512626b89eb5b132ac43a6fb2d5dcc1c62349a6a48045a486835aa51c17348b0c4849cf5d56b4b56359c7bab5bdccaa04adf659f7486de84f9c14d86032272e5069
-
Filesize
610B
MD5b7fa110b58fd4baad65a54c13289bbf1
SHA1b069553ff25022e1c8329d80649ea6b81daff492
SHA2563f0aaea937d81a3148c47c4a40d5e26133d65bff5b5aba532064a9465f4db2c4
SHA51291c8f3253ecb49e8f9b09f9856b9de4419bc28d1d3b7d5ed74fae5c9bca56da4ba795a3fe7f7a4b04ba4452af6f568ade473de0d5cc12528914fef28807b7122
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3
-
Filesize
355KB
MD5d80e625211db0a05bb8346f1fc2551f9
SHA12eab153918e144c22eb00d2f47e8757f21b39211
SHA256a05806f9060f1f2de61cec62599ef7558dc0b8e4b0a62cc71a1d8e762d91ee1f
SHA51269261b12ffa2568f20752dab17cc48fe97598f4f640eba4d0dd54b0ab44ff6be529a97eadc1ef23d8758fd70d53c54fa9a764b9f4de86465e4004dffafd461cd
-
Filesize
72B
MD5bba1d098293df479d4baf647bda11843
SHA132a32bd8c26b90893e401fbcc0f49c4f371ddb7f
SHA256e33405526047777d6d7d74d6e23c55f17783f22802753639223f3638a212b0de
SHA51287ae7c474e34a1af5db51840bffab67811dfe7761ab115979ca04e68271c2f14230bff8dd0803bedd2a082c05f1a41bb91e2a2c71a80595ed55f57f4df62c83d
-
Filesize
99KB
MD55d6fa5d5728fe94506bd7ce2eb6b606f
SHA1283e80849952ced0fba921b82573f072fec0778b
SHA2562dd89ffff975f07f8a90fa946127edf8fde2dfe0ee59c60ad1374fe35e02a355
SHA5126dfae31445d7fb2460fcd1fd869ff03b9735b74717ae844057b342e3f5a9bc5f0f0a455845a4f6d2930e235a457628c314f03b763b547ec196db946871b46904