Malware Analysis Report

2024-12-07 20:18

Sample ID 241118-w71z6axmfq
Target 2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch
SHA256 09cbf66e1c5aadf7441fb056a2c06b4e049e48285970d8462db2573721ca6dd7
Tags
skuld credential_access defense_evasion discovery execution persistence privilege_escalation spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

09cbf66e1c5aadf7441fb056a2c06b4e049e48285970d8462db2573721ca6dd7

Threat Level: Known bad

The file 2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch was found to be: Known bad.

Malicious Activity Summary

skuld credential_access defense_evasion discovery execution persistence privilege_escalation spyware stealer

Skuld family

Skuld stealer

Command and Scripting Interpreter: PowerShell

Drops file in Drivers directory

Reads user/profile data of web browsers

Unsecured Credentials: Credentials In Files

Reads user/profile data of local email clients

Obfuscated Files or Information: Command Obfuscation

Looks up external IP address via web service

Maps connected drives based on registry

Accesses cryptocurrency files/wallets, possible credential harvesting

Adds Run key to start application

Unsigned PE

System Network Configuration Discovery: Wi-Fi Discovery

Event Triggered Execution: Netsh Helper DLL

Browser Information Discovery

Detects videocard installed

Views/modifies file attributes

GoLang User-Agent

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-18 18:34

Signatures

Skuld family

skuld

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-18 18:34

Reported

2024-11-18 18:37

Platform

win7-20240903-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe

"C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-18 18:34

Reported

2024-11-18 18:37

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"

Signatures

Skuld family

skuld

Skuld stealer

stealer skuld

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Windows\system32\attrib.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Windows\system32\attrib.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Unsecured Credentials: Credentials In Files

credential_access stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A

Obfuscated Files or Information: Command Obfuscation

defense_evasion

Browser Information Discovery

discovery

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A

System Network Configuration Discovery: Wi-Fi Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\wmic.exe N/A
N/A N/A C:\Windows\System32\Wbem\wmic.exe N/A

GoLang User-Agent

Description Indicator Process Target
HTTP User-Agent header Go-http-client/1.1 N/A N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 5c000000010000000400000000080000190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c7e00000001000000080000000000042beb77d5017a000000010000000c000000300a06082b060105050703097f000000010000000c000000300a06082b060105050703091d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c990b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d0400000001000000100000003e455215095192e1b75d379fb187298a200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4860 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 3188 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 4936 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 4936 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 4200 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4860 wrote to memory of 4200 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4860 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4860 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4860 wrote to memory of 4688 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 4688 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\Wbem\wmic.exe
PID 4860 wrote to memory of 640 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\netsh.exe
PID 4860 wrote to memory of 640 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\netsh.exe
PID 4860 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 3704 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 1844 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 1844 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\system32\attrib.exe
PID 4860 wrote to memory of 3600 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4860 wrote to memory of 3600 N/A C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3600 wrote to memory of 2612 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
PID 3600 wrote to memory of 2612 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
PID 2612 wrote to memory of 3668 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
PID 2612 wrote to memory of 3668 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A
N/A N/A C:\Windows\system32\attrib.exe N/A
N/A N/A C:\Windows\system32\attrib.exe N/A
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe

"C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"

C:\Windows\system32\attrib.exe

attrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe

C:\Windows\system32\attrib.exe

attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get UUID

C:\Windows\System32\Wbem\wmic.exe

wmic path win32_VideoController get name

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\2024-11-18_b52f97f5927edde5ce2bcca43224e516_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe

C:\Windows\System32\Wbem\wmic.exe

wmic os get Caption

C:\Windows\System32\Wbem\wmic.exe

wmic cpu get Name

C:\Windows\System32\Wbem\wmic.exe

wmic path win32_VideoController get name

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend

C:\Windows\System32\Wbem\wmic.exe

wmic csproduct get UUID

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\attrib.exe

attrib -r C:\Windows\System32\drivers\etc\hosts

C:\Windows\system32\attrib.exe

attrib +r C:\Windows\System32\drivers\etc\hosts

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe

"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vpfurjls\vpfurjls.cmdline"

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA0B4.tmp" "c:\Users\Admin\AppData\Local\Temp\vpfurjls\CSCA28FCB54A94E483FAA4AACFFDE2B66A.TMP"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 172.67.74.152:443 api.ipify.org tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 152.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 api.gofile.io udp
US 8.8.8.8:53 ptb.discord.com udp
FR 45.112.123.126:443 api.gofile.io tcp
US 162.159.138.232:443 ptb.discord.com tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 126.123.112.45.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 85.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe

MD5 b52f97f5927edde5ce2bcca43224e516
SHA1 843fce85bcbf1b384e47cfb6a917dca3f9eca306
SHA256 09cbf66e1c5aadf7441fb056a2c06b4e049e48285970d8462db2573721ca6dd7
SHA512 e51f061da8d1cf3e47c9f1e0e25c44a284ab39c109d909ff5d288c28b412f1f130a8d8b03e3975096ab807fc637e1add769b299d23fb2ec9ccc3a885fa5fe6f9

memory/4200-3-0x00000187653F0000-0x0000018765412000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iutf14hl.h0v.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 77d622bb1a5b250869a3238b9bc1402b
SHA1 d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256 f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512 d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

C:\Windows\System32\drivers\etc\hosts

MD5 6e2386469072b80f18d5722d07afdc0b
SHA1 032d13e364833d7276fcab8a5b2759e79182880f
SHA256 ade1813ae70d7da0bfe63d61af8a4927ed12a0f237b79ce1ac3401c0646f6075
SHA512 e6b96f303935f2bbc76f6723660b757d7f3001e1b13575639fb62d68a734b4ce8c833b991b2d39db3431611dc2cacde879da1aecb556b23c0d78f5ee67967acb

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 98baf5117c4fcec1692067d200c58ab3
SHA1 5b33a57b72141e7508b615e17fb621612cb8e390
SHA256 30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51
SHA512 344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

\??\c:\Users\Admin\AppData\Local\Temp\vpfurjls\vpfurjls.cmdline

MD5 18ea908b1f2b5236dece77635eba087c
SHA1 6cc13425a9344cb71746e6b29a0aa31d0ee21707
SHA256 b384df62be8b4b4ae8103f1edbaa2a0eb69e81a6e29500ca028c05f03585f33b
SHA512 4d085786fd83ee5f2d2d99c18ac92954f0f113cb94c7ca0465d8a15035c9f1368887fca01feeb9651623abfc1b2104ef4080648f0d4cf9832548a7be80f48d53

\??\c:\Users\Admin\AppData\Local\Temp\vpfurjls\vpfurjls.0.cs

MD5 c76055a0388b713a1eabe16130684dc3
SHA1 ee11e84cf41d8a43340f7102e17660072906c402
SHA256 8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7
SHA512 22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

\??\c:\Users\Admin\AppData\Local\Temp\vpfurjls\CSCA28FCB54A94E483FAA4AACFFDE2B66A.TMP

MD5 22aef23602eb5d1f3af99b4079a3fd2a
SHA1 9e3230adbdfeb99408f8690f97056d059f7ab183
SHA256 b57ded7aa516ae79389f45d7cc4c6913a2ddc11d32dd6d2b5548f3e20defcee5
SHA512 116b20b7798e56714021410a9fd26abe2ebf050ce71dcb7a355c341c21fcf5c47c0885320a335e3ef4767d3068b79e0f1615cbef803177580df9793d745fa4f5

C:\Users\Admin\AppData\Local\Temp\RESA0B4.tmp

MD5 70cc418d611eac35d97433f5a977cf1b
SHA1 1f8e45b174f6819bb042c002d44d60f3ce56d678
SHA256 8cefdb92b09bb5536341a6a8f994762cd834cf3128da908dc412a73937ac59ab
SHA512 8bf4124c0c282bae789ce965a8830b0635d92422f7dfe8ea7f5fa1c044395219fcef34a649867c0d4e07b805c2316bf7d2f4bbba7c14eec05d8a81c232eea72f

C:\Users\Admin\AppData\Local\Temp\vpfurjls\vpfurjls.dll

MD5 ed18b7e138dcb7b1205285f21771f025
SHA1 59b08a180fc6ea8b764e6493ab0a73d4d4c94276
SHA256 498247787d9a9133a126be57521c135a9ba011251a87ac18009de7e12a57f558
SHA512 e6dd7b9b24c1ba5e8cc748f616ca9f1dbcc961cd91cddc0656b7154ef433ff397480096c20a134b538f430fe65ef009526e829d28ffd8101f76564a9bf3aac4b

memory/3600-59-0x000002121EFE0000-0x000002121EFE8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FyFOKM6Tl4\Display (1).png

MD5 fe278db1187bd0411ca98dd16a5e07e1
SHA1 39d93e5f20c20663bfc2254e0d517c42e0638dc1
SHA256 595d4fe30ff4cd67f638b07dbfbd6a3980b931d7f74e9a1341872737526db791
SHA512 d6192b889c3d449f79893c85529c3870d1374bc3dbf0e34b528e580a419a4f0ee49e395eaef06cafbca257bee984d9bdad670a878587b48a845f6f4ed28232c7