Malware Analysis Report

2024-11-30 16:03

Sample ID 241119-eltwaazdkh
Target 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe
SHA256 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12e
Tags
discovery persistence imminent spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12e

Threat Level: Known bad

The file 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe was found to be: Known bad.

Malicious Activity Summary

discovery persistence imminent spyware trojan

Modifies WinLogon for persistence

Imminent family

Imminent RAT

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Drops desktop.ini file(s)

Suspicious use of SetThreadContext

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Delays execution with timeout.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-19 04:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-19 04:02

Reported

2024-11-19 04:04

Platform

win7-20240903-en

Max time kernel

20s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\file.exe" C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\wscript.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2528 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2880 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 2880 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 2880 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 2880 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 2528 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2528 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2528 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2528 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 2696 wrote to memory of 2812 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2696 wrote to memory of 2812 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2696 wrote to memory of 2812 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2696 wrote to memory of 2812 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2528 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 2624 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2624 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2624 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2624 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe

"C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

C:\Windows\SysWOW64\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs" "C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

C:\Users\Admin\AppData\Roaming\System interrupts .exe

"C:\Users\Admin\AppData\Roaming\System interrupts .exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat" "

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Roaming\FolderName\stres.bat" "

C:\Windows\SysWOW64\timeout.exe

timeout /t 300

Network

N/A

Files

memory/2528-0-0x0000000074E21000-0x0000000074E22000-memory.dmp

memory/2528-1-0x0000000074E20000-0x00000000753CB000-memory.dmp

memory/2528-2-0x0000000074E20000-0x00000000753CB000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

MD5 b33985e3fc0ff1814a70626c744d2fd9
SHA1 269ff1b7ff5510822cd5207ca8593e48672d7431
SHA256 b4a06f7d7c2b2887801515c8f0cdc7a4cf8245af5afa38314f72952bd18fb357
SHA512 689de361836ff6053e2f0c88942e0b7ac62a3cbc8e8ef923d49c6e84e4c28e65c11588b6d88b69abad86e06d5eb22586d22cafe1abff1ceb6e0fc0d930a97769

\Users\Admin\AppData\Roaming\System interrupts .exe

MD5 278edbd499374bf73621f8c1f969d894
SHA1 a81170af14747781c5f5f51bb1215893136f0bc0
SHA256 c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA512 93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs

MD5 c578d9653b22800c3eb6b6a51219bbb8
SHA1 a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA256 20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA512 3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

MD5 a557a61b017faddffbf634b01b09afa2
SHA1 324addd96cc2878fe77c1de25fa59b90afa81172
SHA256 9d605915f3bfafc681b550536c203f51698b695dcf1b44f991f517cfa2bc85aa
SHA512 0666502bac0b965c4bc0fa6f7e360c9ca44df50a5fb85a0754d8db534a7db85297ae1654207b9fe16b8525603fefa8ddb96a792da30f0846af38266fbb2a9178

C:\Users\Admin\AppData\Roaming\FolderName\rundll11-.txt

MD5 e7c9164ded4de1d5b33800bf17ab2ff0
SHA1 1a7c1734d6d2fcae7ef8de850fde8f7b0453d54d
SHA256 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12e
SHA512 303aeb98f88388c56cdc1f907d99438fd1f8fe65903f8143d150c00fddd8cbccd30fb452405df2c23b8d93d164c578519fc90a9f9c25d3f2735b4cd20467c945

memory/2528-25-0x0000000074E20000-0x00000000753CB000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\stres.bat

MD5 e832589ab098b4e9894b27f3f37d97fb
SHA1 d379434086919ff1a1f369feaffe56c45ab0b6c6
SHA256 718e1e8c2c7c0d0ff617b11fef703affe7818e82d6aad2d84982d1200742a62a
SHA512 1d0b0dc46d361b0f2c221bbd5092cd42d5a504f88c4e982ff93663a84b2f149f7b56fce9cceef26c9fea6d5e9b658f6cee016185a1f6c7a7419bd7f4391940e5

memory/2528-35-0x0000000074E20000-0x00000000753CB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-19 04:02

Reported

2024-11-19 04:04

Platform

win10v2004-20241007-en

Max time kernel

118s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe"

Signatures

Imminent RAT

trojan spyware imminent

Imminent family

imminent

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\file.exe" C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wscript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3388 set thread context of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\wscript.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\System interrupts .exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3388 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 3388 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 3388 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 3388 wrote to memory of 3604 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Users\Admin\AppData\Roaming\System interrupts .exe
PID 4392 wrote to memory of 2164 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 4392 wrote to memory of 2164 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 4392 wrote to memory of 2164 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\wscript.exe
PID 2164 wrote to memory of 2384 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2384 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2384 N/A C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\cmd.exe
PID 3388 wrote to memory of 3968 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 3388 wrote to memory of 3968 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 3388 wrote to memory of 3968 N/A C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe C:\Windows\SysWOW64\cmd.exe
PID 3968 wrote to memory of 3308 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3968 wrote to memory of 3308 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3968 wrote to memory of 3308 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe

"C:\Users\Admin\AppData\Local\Temp\362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12eN.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

C:\Users\Admin\AppData\Roaming\System interrupts .exe

"C:\Users\Admin\AppData\Roaming\System interrupts .exe"

C:\Windows\SysWOW64\wscript.exe

wscript.exe "C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs" "C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat" "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\FolderName\stres.bat" "

C:\Windows\SysWOW64\timeout.exe

timeout /t 300

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
AT 213.208.152.204:9003 tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
AT 213.208.152.204:9003 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
AT 213.208.152.204:9003 tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
AT 213.208.152.204:9003 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
AT 213.208.152.204:9003 tcp
AT 213.208.152.204:9003 tcp

Files

memory/3388-0-0x0000000074FA2000-0x0000000074FA3000-memory.dmp

memory/3388-1-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3388-2-0x0000000074FA0000-0x0000000075551000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\mata.bat

MD5 b33985e3fc0ff1814a70626c744d2fd9
SHA1 269ff1b7ff5510822cd5207ca8593e48672d7431
SHA256 b4a06f7d7c2b2887801515c8f0cdc7a4cf8245af5afa38314f72952bd18fb357
SHA512 689de361836ff6053e2f0c88942e0b7ac62a3cbc8e8ef923d49c6e84e4c28e65c11588b6d88b69abad86e06d5eb22586d22cafe1abff1ceb6e0fc0d930a97769

C:\Users\Admin\AppData\Roaming\FolderName\invs.vbs

MD5 c578d9653b22800c3eb6b6a51219bbb8
SHA1 a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA256 20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA512 3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

C:\Users\Admin\AppData\Roaming\FolderName\mata2.bat

MD5 a557a61b017faddffbf634b01b09afa2
SHA1 324addd96cc2878fe77c1de25fa59b90afa81172
SHA256 9d605915f3bfafc681b550536c203f51698b695dcf1b44f991f517cfa2bc85aa
SHA512 0666502bac0b965c4bc0fa6f7e360c9ca44df50a5fb85a0754d8db534a7db85297ae1654207b9fe16b8525603fefa8ddb96a792da30f0846af38266fbb2a9178

C:\Users\Admin\AppData\Roaming\FolderName\rundll11-.txt

MD5 e7c9164ded4de1d5b33800bf17ab2ff0
SHA1 1a7c1734d6d2fcae7ef8de850fde8f7b0453d54d
SHA256 362284018784f52d4a7a3eaff987ce09198df75d5e515c1aed9663ac5042d12e
SHA512 303aeb98f88388c56cdc1f907d99438fd1f8fe65903f8143d150c00fddd8cbccd30fb452405df2c23b8d93d164c578519fc90a9f9c25d3f2735b4cd20467c945

memory/3388-17-0x0000000074FA2000-0x0000000074FA3000-memory.dmp

memory/3388-18-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3604-19-0x0000000000400000-0x000000000044A000-memory.dmp

C:\Users\Admin\AppData\Roaming\System interrupts .exe

MD5 a64daca3cfbcd039df3ec29d3eddd001
SHA1 eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256 403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512 b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479

memory/3604-23-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3604-24-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3604-25-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3604-29-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3604-30-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/3388-36-0x0000000074FA0000-0x0000000075551000-memory.dmp

C:\Users\Admin\AppData\Roaming\FolderName\stres.bat

MD5 e832589ab098b4e9894b27f3f37d97fb
SHA1 d379434086919ff1a1f369feaffe56c45ab0b6c6
SHA256 718e1e8c2c7c0d0ff617b11fef703affe7818e82d6aad2d84982d1200742a62a
SHA512 1d0b0dc46d361b0f2c221bbd5092cd42d5a504f88c4e982ff93663a84b2f149f7b56fce9cceef26c9fea6d5e9b658f6cee016185a1f6c7a7419bd7f4391940e5