Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1D02D012970...94.exe
windows10-2004-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10DBm0yQwt.exe.ViR.exe
windows10-2004-x64
10ca6ec46ee9...52.apk
android-9-x86
8ca6ec46ee9...52.apk
android-10-x64
8ca6ec46ee9...52.apk
android-11-x64
8calc.exe
windows10-2004-x64
5ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...B3.exe
windows10-2004-x64
10ccc71c83c8...68.exe
windows7-x64
7ccc71c83c8...68.exe
windows10-2004-x64
3cd2d085998...-0.dll
windows7-x64
8cd2d085998...-0.dll
windows10-2004-x64
8cdffb7e75b...ss.exe
windows7-x64
3cdffb7e75b...ss.exe
windows10-2004-x64
3cf7382c25a...c9.exe
windows7-x64
6cf7382c25a...c9.exe
windows10-2004-x64
3cgi19-alpt...e_.exe
windows7-x64
7cgi19-alpt...e_.exe
windows10-2004-x64
7chrst.exe
windows7-x64
3chrst.exe
windows10-2004-x64
3ci05l2a.exe
windows7-x64
ci05l2a.exe
windows10-2004-x64
cl.exe
windows7-x64
7cl.exe
windows10-2004-x64
7clean.exe
windows7-x64
3clean.exe
windows10-2004-x64
3coinvault.exe
windows7-x64
9coinvault.exe
windows10-2004-x64
6com_loader.exe
windows7-x64
3com_loader.exe
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:41
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DBm0yQwt.exe.ViR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral7
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
calc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
chrst.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
chrst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
ci05l2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ci05l2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
cl.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
cl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
coinvault.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
com_loader.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
com_loader.exe
Resource
win10v2004-20241007-en
General
-
Target
DBm0yQwt.exe.ViR.exe
-
Size
216KB
-
MD5
3cb2c3ce48ac870ab0be9afb7233295f
-
SHA1
b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
-
SHA256
ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
-
SHA512
e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900
-
SSDEEP
3072:UPPdPl/PuW/Yqoeog665R6OKEjzG6hgckhmnl/5aUWTo+Kuv+nAo:UHTnVHv82ZJFgJ+/Hxn
Malware Config
Extracted
C:\!HELP_SOS.hta
Signatures
-
Contacts a large (7709) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DBm0yQwt.exe.ViR.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 5fTArYbA.exe -
Executes dropped EXE 2 IoCs
pid Process 3612 5fTArYbA.exe 4744 5fTArYbA.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper 5fTArYbA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5AN.bmp" 5fTArYbA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fTArYbA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fTArYbA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBm0yQwt.exe.ViR.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 852 PING.EXE 1144 PING.EXE -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop 5fTArYbA.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-19 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-20 5fTArYbA.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\htafile 5fTArYbA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\DefaultIcon 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\FriendlyTypeName 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\htafile\DefaultIcon 5fTArYbA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\shell 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\shell\open 5fTArYbA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\.sage 5fTArYbA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\.sage\ = "sage.notice" 5fTArYbA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" 5fTArYbA.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\sage.notice\shell\open\command 5fTArYbA.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1144 PING.EXE 852 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe 3612 5fTArYbA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeShutdownPrivilege 4116 DBm0yQwt.exe.ViR.exe Token: SeCreatePagefilePrivilege 4116 DBm0yQwt.exe.ViR.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4844 4116 DBm0yQwt.exe.ViR.exe 85 PID 4116 wrote to memory of 4844 4116 DBm0yQwt.exe.ViR.exe 85 PID 4116 wrote to memory of 4844 4116 DBm0yQwt.exe.ViR.exe 85 PID 4116 wrote to memory of 876 4116 DBm0yQwt.exe.ViR.exe 86 PID 4116 wrote to memory of 876 4116 DBm0yQwt.exe.ViR.exe 86 PID 4116 wrote to memory of 876 4116 DBm0yQwt.exe.ViR.exe 86 PID 4116 wrote to memory of 3612 4116 DBm0yQwt.exe.ViR.exe 91 PID 4116 wrote to memory of 3612 4116 DBm0yQwt.exe.ViR.exe 91 PID 4116 wrote to memory of 3612 4116 DBm0yQwt.exe.ViR.exe 91 PID 4116 wrote to memory of 4564 4116 DBm0yQwt.exe.ViR.exe 92 PID 4116 wrote to memory of 4564 4116 DBm0yQwt.exe.ViR.exe 92 PID 4116 wrote to memory of 4564 4116 DBm0yQwt.exe.ViR.exe 92 PID 4564 wrote to memory of 1144 4564 cmd.exe 94 PID 4564 wrote to memory of 1144 4564 cmd.exe 94 PID 4564 wrote to memory of 1144 4564 cmd.exe 94 PID 3612 wrote to memory of 4744 3612 5fTArYbA.exe 97 PID 3612 wrote to memory of 4744 3612 5fTArYbA.exe 97 PID 3612 wrote to memory of 4744 3612 5fTArYbA.exe 97 PID 3612 wrote to memory of 2780 3612 5fTArYbA.exe 105 PID 3612 wrote to memory of 2780 3612 5fTArYbA.exe 105 PID 3612 wrote to memory of 2780 3612 5fTArYbA.exe 105 PID 3612 wrote to memory of 4352 3612 5fTArYbA.exe 106 PID 3612 wrote to memory of 4352 3612 5fTArYbA.exe 106 PID 3612 wrote to memory of 4352 3612 5fTArYbA.exe 106 PID 3612 wrote to memory of 4340 3612 5fTArYbA.exe 107 PID 3612 wrote to memory of 4340 3612 5fTArYbA.exe 107 PID 3612 wrote to memory of 4340 3612 5fTArYbA.exe 107 PID 3612 wrote to memory of 1628 3612 5fTArYbA.exe 108 PID 3612 wrote to memory of 1628 3612 5fTArYbA.exe 108 PID 3612 wrote to memory of 1628 3612 5fTArYbA.exe 108 PID 1628 wrote to memory of 852 1628 cmd.exe 112 PID 1628 wrote to memory of 852 1628 cmd.exe 112 PID 1628 wrote to memory of 852 1628 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe"C:\Users\Admin\AppData\Local\Temp\DBm0yQwt.exe.ViR.exe" g2⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "CImsTEdC" /TR "C:\Users\Admin\AppData\Roaming\5fTArYbA.exe" /SC ONLOGON /RL HIGHEST /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:876
-
-
C:\Users\Admin\AppData\Roaming\5fTArYbA.exe"C:\Users\Admin\AppData\Roaming\5fTArYbA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\5fTArYbA.exe"C:\Users\Admin\AppData\Roaming\5fTArYbA.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "CImsTEdC"3⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config16184093.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:852
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1144
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x344 0x3d01⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5095c22c42fe9fe3b835a732d9fbd1e2f
SHA167b94bc8357ebde1309f7cfb3dcf5f06d7c95aeb
SHA256df1d5677f838ba0c140e9aef5b9a55f97ba1d3e886a081a37094f39d63560b1c
SHA5128bd40bc5814d60fe756368e49ce865af77f5a4aa59e5817c81eb630015c1d917652a09369cddb99045810cc67979ea162bee5bfadb843c49a4de99050f6c9f1e
-
Filesize
218B
MD5a71098c6c4ff04a3e851a1dc8af879da
SHA1df805af84a4071ed646689286752257ebaca5066
SHA256c46afb76b5b86708c03f421a63214ee6e3bc487be8cf48734b059dc0f6ef48b2
SHA512017c7d061c0a84f685dda4eb2b16ebb1989b91af8f39a2e0743ffeeb362eb443ea587191b45e620d04c321944590b13ce50c36887bc5754529325cbe65a9193a
-
Filesize
227B
MD570e42df697ad661221ae5920a25e32cb
SHA1f481fff28b5abf6632ba1ab08bc9fb6488b7c52b
SHA25652e034a4f657349a1c5e0512e4b19157b56ef93469205a9974f501da319d894a
SHA512e9c5fd70023aec82fc61d8dc5c05800154163b244f995644f27ac5d7c89edd53206abbcc8ffa698fb4b6d2f53c1a28ee5c5a3046864c0b1e1e75c2c199253380
-
Filesize
3KB
MD54c999bbfddd5513d08d2d414c92ac2f4
SHA123e40ea4b75dc037a5cdfce521826737090dce09
SHA2569a55ac3ff3c115b686c19da0a88a9e7525aa62d49c69b107addf8efd33a16215
SHA5127b48cbff08a98f273afb78262167030395fab421718df559625867b91f98fbb0eb0152e8002568428086d1bd3f03f9c9ab26fdabdf9e33ffcea8f5c56529b944
-
Filesize
216KB
MD53cb2c3ce48ac870ab0be9afb7233295f
SHA1b87ac51e95b85e64bb3fecbbb8f9d2acb5b53895
SHA256ac3f6f87217e1d4fbcd56289b4c77b1adea3dbbaf4131a84b7b2508d6fadcfaf
SHA512e41c6ad1f5522dda96e19fdf4b79ebd8b7bc13507c5ed5afc1155e37b1dabf16f11f66b1101124035d3d92a942bcd60122e3751069ebd7da1a36e498845b6900
-
Filesize
65B
MD58e8ebd735b3243a535b67ba0631e9168
SHA1a39298edc7676e822cbacf6866bc90942f90c3f9
SHA256e6dc6b8240cf0338fa6dc6c72ce46fb4221a2bb7baa6fd546c4f236a762dc1d3
SHA512d0d8840a8ff3804e32b38b2d2efae5d555fc2e91a7b6477d0824c0dba681f02713068e923696a74afd7eadb733c23aac3bd45e9f2a12d9119ffb660528417d77