Malware Analysis Report

2024-11-30 16:03

Sample ID 241118-h6seqswqdk
Target 3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe
SHA256 3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca
Tags
imminent discovery persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca

Threat Level: Known bad

The file 3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe was found to be: Known bad.

Malicious Activity Summary

imminent discovery persistence spyware trojan

Imminent family

Modifies WinLogon for persistence

Imminent RAT

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Suspicious use of SetThreadContext

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

Delays execution with timeout.exe

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-18 07:21

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-18 07:21

Reported

2024-11-18 07:23

Platform

win7-20240903-en

Max time kernel

99s

Max time network

110s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe"

Signatures

Imminent RAT

trojan spyware imminent

Imminent family

imminent

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\file.exe" C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2316 set thread context of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\wscript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2316 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 3008 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2316 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3008 wrote to memory of 1224 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 3008 wrote to memory of 1224 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 3008 wrote to memory of 1224 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 3008 wrote to memory of 1224 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 1224 wrote to memory of 2752 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 1224 wrote to memory of 2752 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 1224 wrote to memory of 2752 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 1224 wrote to memory of 2752 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 2316 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 1640 wrote to memory of 2936 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1640 wrote to memory of 2936 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1640 wrote to memory of 2936 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1640 wrote to memory of 2936 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe

"C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

C:\Users\Admin\AppData\Roaming\System interrupts .exe

"C:\Users\Admin\AppData\Roaming\System interrupts .exe"

C:\Windows\SysWOW64\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs" "C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat" "

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Roaming\FolderName\stres.bat" "

C:\Windows\SysWOW64\timeout.exe

timeout /t 300

Network

Country Destination Domain Proto
AT 213.208.152.204:9003 tcp
AT 213.208.152.204:9003 tcp
AT 213.208.152.204:9003 tcp
AT 213.208.152.204:9003 tcp
AT 213.208.152.204:9003 tcp

Files

memory/2316-0-0x00000000749D1000-0x00000000749D2000-memory.dmp

memory/2316-1-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2316-2-0x00000000749D0000-0x0000000074F7B000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

MD5 b33985e3fc0ff1814a70626c744d2fd9
SHA1 269ff1b7ff5510822cd5207ca8593e48672d7431
SHA256 b4a06f7d7c2b2887801515c8f0cdc7a4cf8245af5afa38314f72952bd18fb357
SHA512 689de361836ff6053e2f0c88942e0b7ac62a3cbc8e8ef923d49c6e84e4c28e65c11588b6d88b69abad86e06d5eb22586d22cafe1abff1ceb6e0fc0d930a97769

\Users\Admin\AppData\Roaming\System interrupts .exe

MD5 278edbd499374bf73621f8c1f969d894
SHA1 a81170af14747781c5f5f51bb1215893136f0bc0
SHA256 c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA512 93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

memory/2148-19-0x0000000000400000-0x000000000044A000-memory.dmp

memory/2148-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2148-25-0x0000000000400000-0x000000000044A000-memory.dmp

memory/2148-23-0x0000000000400000-0x000000000044A000-memory.dmp

memory/2148-21-0x0000000000400000-0x000000000044A000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs

MD5 c578d9653b22800c3eb6b6a51219bbb8
SHA1 a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA256 20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA512 3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

MD5 a557a61b017faddffbf634b01b09afa2
SHA1 324addd96cc2878fe77c1de25fa59b90afa81172
SHA256 9d605915f3bfafc681b550536c203f51698b695dcf1b44f991f517cfa2bc85aa
SHA512 0666502bac0b965c4bc0fa6f7e360c9ca44df50a5fb85a0754d8db534a7db85297ae1654207b9fe16b8525603fefa8ddb96a792da30f0846af38266fbb2a9178

C:\Users\Admin\AppData\Roaming\FolderName\rundll11-.txt

MD5 1fbedc7b8c82a26cb3776bbc30c48a5c
SHA1 3b6e3f62f1b5c7ba16bb86bcbc4609678e1ba0bf
SHA256 3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca
SHA512 83835506a4b4c8099fcad057250cd852a3385ee9c52f1cbeba538bdbe4d6d0985dffba85d21490a0a13f0e0da47a35a8a0f5ecbac004137299c5fcf1a84eee85

memory/2316-34-0x00000000749D0000-0x0000000074F7B000-memory.dmp

memory/2148-35-0x0000000000400000-0x000000000044A000-memory.dmp

memory/2148-41-0x0000000000400000-0x000000000044A000-memory.dmp

memory/2148-39-0x0000000000400000-0x000000000044A000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\stres.bat

MD5 e832589ab098b4e9894b27f3f37d97fb
SHA1 d379434086919ff1a1f369feaffe56c45ab0b6c6
SHA256 718e1e8c2c7c0d0ff617b11fef703affe7818e82d6aad2d84982d1200742a62a
SHA512 1d0b0dc46d361b0f2c221bbd5092cd42d5a504f88c4e982ff93663a84b2f149f7b56fce9cceef26c9fea6d5e9b658f6cee016185a1f6c7a7419bd7f4391940e5

memory/2316-55-0x00000000749D0000-0x0000000074F7B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-18 07:21

Reported

2024-11-18 07:23

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

104s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\file.exe" C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wscript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\wscript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4888 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 4888 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 4888 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 4888 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 4888 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 4888 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 456 wrote to memory of 2448 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 456 wrote to memory of 2448 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 456 wrote to memory of 2448 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 2448 wrote to memory of 1364 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 1364 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2448 wrote to memory of 1364 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 4888 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 4888 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 4888 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe C:\Windows\SysWOW64\cmd.exe
PID 1640 wrote to memory of 4296 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1640 wrote to memory of 4296 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1640 wrote to memory of 4296 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe

"C:\Users\Admin\AppData\Local\Temp\3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

C:\Users\Admin\AppData\Roaming\System interrupts .exe

"C:\Users\Admin\AppData\Roaming\System interrupts .exe"

C:\Windows\SysWOW64\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs" "C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat" "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FolderName\stres.bat" "

C:\Windows\SysWOW64\timeout.exe

timeout /t 300

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/4888-0-0x0000000074EA2000-0x0000000074EA3000-memory.dmp

memory/4888-1-0x0000000074EA0000-0x0000000075451000-memory.dmp

memory/4888-2-0x0000000074EA0000-0x0000000075451000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

MD5 b33985e3fc0ff1814a70626c744d2fd9
SHA1 269ff1b7ff5510822cd5207ca8593e48672d7431
SHA256 b4a06f7d7c2b2887801515c8f0cdc7a4cf8245af5afa38314f72952bd18fb357
SHA512 689de361836ff6053e2f0c88942e0b7ac62a3cbc8e8ef923d49c6e84e4c28e65c11588b6d88b69abad86e06d5eb22586d22cafe1abff1ceb6e0fc0d930a97769

C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs

MD5 c578d9653b22800c3eb6b6a51219bbb8
SHA1 a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA256 20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA512 3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

MD5 a557a61b017faddffbf634b01b09afa2
SHA1 324addd96cc2878fe77c1de25fa59b90afa81172
SHA256 9d605915f3bfafc681b550536c203f51698b695dcf1b44f991f517cfa2bc85aa
SHA512 0666502bac0b965c4bc0fa6f7e360c9ca44df50a5fb85a0754d8db534a7db85297ae1654207b9fe16b8525603fefa8ddb96a792da30f0846af38266fbb2a9178

C:\Users\Admin\AppData\Roaming\FolderName\rundll11-.txt

MD5 1fbedc7b8c82a26cb3776bbc30c48a5c
SHA1 3b6e3f62f1b5c7ba16bb86bcbc4609678e1ba0bf
SHA256 3b603c01ce2e49044dd3355cac57e02a049c558a680fa108683af452b7fc53ca
SHA512 83835506a4b4c8099fcad057250cd852a3385ee9c52f1cbeba538bdbe4d6d0985dffba85d21490a0a13f0e0da47a35a8a0f5ecbac004137299c5fcf1a84eee85

memory/4888-18-0x0000000074EA2000-0x0000000074EA3000-memory.dmp

memory/4888-19-0x0000000074EA0000-0x0000000075451000-memory.dmp

memory/4888-25-0x0000000074EA0000-0x0000000075451000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\stres.bat

MD5 e832589ab098b4e9894b27f3f37d97fb
SHA1 d379434086919ff1a1f369feaffe56c45ab0b6c6
SHA256 718e1e8c2c7c0d0ff617b11fef703affe7818e82d6aad2d84982d1200742a62a
SHA512 1d0b0dc46d361b0f2c221bbd5092cd42d5a504f88c4e982ff93663a84b2f149f7b56fce9cceef26c9fea6d5e9b658f6cee016185a1f6c7a7419bd7f4391940e5