Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
Resource
win10v2004-20241007-en
General
-
Target
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe
-
Size
1.7MB
-
MD5
4a45eda053a2e6ca140a58d2dcba5ff0
-
SHA1
fa5bcdcb373d8dce86ae6bcc4ed4770ab4498b5d
-
SHA256
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11
-
SHA512
89fdba17a8750c85b3488492e1968a2ae7bc876552a558f84cd6ecee6582ee360112abe580fa0dab0005824f09695b4f8b114a4e2f09e12bad4f7030c14a416b
-
SSDEEP
49152:kOBuzw/nMVpcq/2ELfWum/+kD+MKklDvjao:kOuzwMobEKpDVKabjao
Malware Config
Extracted
darkcomet
093012DE
hosting.servegame.com:8085
DC_MUTEX-NPS90EE
-
gencode
Sjl07Y5gccaE
-
install
false
-
offline_keylogger
true
-
password
Michemicalromance
-
persistence
false
Signatures
-
Darkcomet family
-
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 676 takeown.exe 2372 icacls.exe 2300 takeown.exe 2456 icacls.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
HCMH78.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HCMH78.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate HCMH78.exe -
Executes dropped EXE 6 IoCs
Processes:
HCMH78.exeFileName.exeFileName.exeFileName.exeFileName.exebootsect.exepid Process 2940 HCMH78.exe 2592 FileName.exe 2720 FileName.exe 2700 FileName.exe 2644 FileName.exe 2364 bootsect.exe -
Loads dropped DLL 9 IoCs
Processes:
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exepid Process 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid Process 676 takeown.exe 2372 icacls.exe 2300 takeown.exe 2456 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeDLL = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\FileName.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exeFileName.exedescription pid Process procid_target PID 1312 set thread context of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 set thread context of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 2592 set thread context of 2720 2592 FileName.exe 60 PID 2592 set thread context of 2700 2592 FileName.exe 61 PID 2592 set thread context of 2644 2592 FileName.exe 62 -
Processes:
resource yara_rule behavioral1/memory/3020-99-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/3020-98-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2816-97-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3020-96-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2816-93-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2816-92-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2816-91-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2816-89-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3020-73-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/3020-72-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/3020-86-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/3020-85-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2816-83-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2816-81-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x0009000000017342-104.dat upx behavioral1/memory/3020-116-0x0000000003CF0000-0x0000000003F13000-memory.dmp upx behavioral1/memory/2940-119-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/3020-225-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2816-226-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2700-318-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2720-317-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2644-325-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2940-324-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/2816-333-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2720-336-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2940-348-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/memory/3020-351-0x0000000000400000-0x00000000007AD000-memory.dmp upx behavioral1/memory/2700-352-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2644-355-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeFileName.execmd.execmd.exeFileName.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exeFileName.exeFileName.execmd.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exeHCMH78.execmd.execmd.exetakeown.execmd.execompact.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exereg.exetakeown.exeicacls.execmd.exeicacls.execmd.exebootsect.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileName.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HCMH78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compact.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootsect.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
HCMH78.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct HCMH78.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS HCMH78.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
HCMH78.exepid Process 2940 HCMH78.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
HCMH78.exetakeown.exetakeown.exeFileName.exeFileName.exedescription pid Process Token: 33 2940 HCMH78.exe Token: SeIncBasePriorityPrivilege 2940 HCMH78.exe Token: 33 2940 HCMH78.exe Token: SeIncBasePriorityPrivilege 2940 HCMH78.exe Token: SeTakeOwnershipPrivilege 676 takeown.exe Token: SeTakeOwnershipPrivilege 2300 takeown.exe Token: SeIncreaseQuotaPrivilege 2644 FileName.exe Token: SeSecurityPrivilege 2644 FileName.exe Token: SeTakeOwnershipPrivilege 2644 FileName.exe Token: SeLoadDriverPrivilege 2644 FileName.exe Token: SeSystemProfilePrivilege 2644 FileName.exe Token: SeSystemtimePrivilege 2644 FileName.exe Token: SeProfSingleProcessPrivilege 2644 FileName.exe Token: SeIncBasePriorityPrivilege 2644 FileName.exe Token: SeCreatePagefilePrivilege 2644 FileName.exe Token: SeBackupPrivilege 2644 FileName.exe Token: SeRestorePrivilege 2644 FileName.exe Token: SeShutdownPrivilege 2644 FileName.exe Token: SeDebugPrivilege 2644 FileName.exe Token: SeSystemEnvironmentPrivilege 2644 FileName.exe Token: SeChangeNotifyPrivilege 2644 FileName.exe Token: SeRemoteShutdownPrivilege 2644 FileName.exe Token: SeUndockPrivilege 2644 FileName.exe Token: SeManageVolumePrivilege 2644 FileName.exe Token: SeImpersonatePrivilege 2644 FileName.exe Token: SeCreateGlobalPrivilege 2644 FileName.exe Token: 33 2644 FileName.exe Token: 34 2644 FileName.exe Token: 35 2644 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe Token: SeDebugPrivilege 2700 FileName.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
HCMH78.exepid Process 2940 HCMH78.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exeFileName.exeFileName.exeFileName.exeFileName.exepid Process 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 2592 FileName.exe 2700 FileName.exe 2644 FileName.exe 2720 FileName.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.execmd.exeHCMH78.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 3020 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 31 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 1312 wrote to memory of 2816 1312 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 32 PID 3020 wrote to memory of 2940 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 33 PID 3020 wrote to memory of 2940 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 33 PID 3020 wrote to memory of 2940 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 33 PID 3020 wrote to memory of 2940 3020 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 33 PID 2816 wrote to memory of 2792 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 34 PID 2816 wrote to memory of 2792 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 34 PID 2816 wrote to memory of 2792 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 34 PID 2816 wrote to memory of 2792 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 34 PID 2792 wrote to memory of 1648 2792 cmd.exe 36 PID 2792 wrote to memory of 1648 2792 cmd.exe 36 PID 2792 wrote to memory of 1648 2792 cmd.exe 36 PID 2792 wrote to memory of 1648 2792 cmd.exe 36 PID 2816 wrote to memory of 2592 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 37 PID 2816 wrote to memory of 2592 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 37 PID 2816 wrote to memory of 2592 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 37 PID 2816 wrote to memory of 2592 2816 1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe 37 PID 2940 wrote to memory of 1576 2940 HCMH78.exe 40 PID 2940 wrote to memory of 1576 2940 HCMH78.exe 40 PID 2940 wrote to memory of 1576 2940 HCMH78.exe 40 PID 2940 wrote to memory of 1576 2940 HCMH78.exe 40 PID 1576 wrote to memory of 2580 1576 cmd.exe 42 PID 1576 wrote to memory of 2580 1576 cmd.exe 42 PID 1576 wrote to memory of 2580 1576 cmd.exe 42 PID 1576 wrote to memory of 2580 1576 cmd.exe 42 PID 2580 wrote to memory of 676 2580 cmd.exe 43 PID 2580 wrote to memory of 676 2580 cmd.exe 43 PID 2580 wrote to memory of 676 2580 cmd.exe 43 PID 2580 wrote to memory of 676 2580 cmd.exe 43 PID 2940 wrote to memory of 1696 2940 HCMH78.exe 44 PID 2940 wrote to memory of 1696 2940 HCMH78.exe 44 PID 2940 wrote to memory of 1696 2940 HCMH78.exe 44 PID 2940 wrote to memory of 1696 2940 HCMH78.exe 44 PID 1696 wrote to memory of 2372 1696 cmd.exe 46 PID 1696 wrote to memory of 2372 1696 cmd.exe 46 PID 1696 wrote to memory of 2372 1696 cmd.exe 46 PID 1696 wrote to memory of 2372 1696 cmd.exe 46 PID 2940 wrote to memory of 904 2940 HCMH78.exe 47 PID 2940 wrote to memory of 904 2940 HCMH78.exe 47 PID 2940 wrote to memory of 904 2940 HCMH78.exe 47 PID 2940 wrote to memory of 904 2940 HCMH78.exe 47 PID 904 wrote to memory of 1464 904 cmd.exe 49 PID 904 wrote to memory of 1464 904 cmd.exe 49 PID 904 wrote to memory of 1464 904 cmd.exe 49 PID 904 wrote to memory of 1464 904 cmd.exe 49 PID 1464 wrote to memory of 2300 1464 cmd.exe 50 PID 1464 wrote to memory of 2300 1464 cmd.exe 50 PID 1464 wrote to memory of 2300 1464 cmd.exe 50 PID 1464 wrote to memory of 2300 1464 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\HCMH78.exe"C:\Users\Admin\AppData\Roaming\HCMH78.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe /c takeown /f C:\ldrscan\bootwin"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\ldrscan\bootwin5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\ldrscan\bootwin6⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\icacls.exeicacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "cmd.exe /c takeown /f C:\ldrscan\bootwin"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\ldrscan\bootwin5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\ldrscan\bootwin6⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "icacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)"4⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\icacls.exeicacls C:\ldrscan\bootwin /grant *S-1-1-0:(F)5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2456
-
-
-
C:\Windows\system32\cmd.execmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ilc "C:\Acer.XRM-MS""4⤵PID:1984
-
C:\Windows\System32\cscript.exeC:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ilc "C:\Acer.XRM-MS"5⤵PID:308
-
-
-
C:\Windows\system32\cmd.execmd.exe /A /C "C:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk FJGCP-4DFJD-GJY49-VJBQ7-HYRR2"4⤵PID:2424
-
C:\Windows\System32\cscript.exeC:\Windows\System32\cscript.exe //nologo C:\Windows\System32\slmgr.vbs -ipk FJGCP-4DFJD-GJY49-VJBQ7-HYRR25⤵PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "compact /u \\?\Volume{367eaf83-3d79-11ef-ac21-806e6f6e6963}\MHJCS"4⤵
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\compact.execompact /u \\?\Volume{367eaf83-3d79-11ef-ac21-806e6f6e6963}\MHJCS5⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /A /C "C:\bootsect.exe /nt60 SYS /force"4⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\bootsect.exeC:\bootsect.exe /nt60 SYS /force5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"C:\Users\Admin\AppData\Local\Temp\1e177bb6591daf06a0dafc378093c04669403a90fda3e539ca4a1aa2a67c7c11N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LTHRH.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AdobeDLL" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1648
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"C:\Users\Admin\AppData\Roaming\FolderName\FileName.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f25832af6a684360950dbb15589de34a
SHA117ff1d21005c1695ae3dcbdc3435017c895fff5d
SHA256266d64637cf12ff961165a018f549ff41002dc59380605b36d65cf1b8127c96f
SHA512e0cf23351c02f4afa85eedc72a86b9114f539595cbd6bcd220e8b8d70fa6a7379dcd947ea0d59332ba672f36ebda6bd98892d9b6b20eedafc8be168387a3dd5f
-
Filesize
149B
MD54b05d1e57e68c984b22080ba52141cf6
SHA1e24e2b20367bb2344ffe5f003ecc93e7d4f63882
SHA2563d287de92ac4dcb4f85dc66770f9d13be5775980f75b82da44a3e1f77ed8c884
SHA512bbc7f57d56478018f5f607d4e43eacbd4ced26b85fd06a760ec3bb7726ba8874f918709733a05821fdd2dc645face265752c6884b36e5c804b18914a71eaf816
-
Filesize
1.7MB
MD59f9ff50f2fcb8ebe36f2d7ab3c4cd07a
SHA15d0852438ec222bc89c401a59afc536a047c5de3
SHA2561fb78daf06a8749a2919be9b7d0c07cfcbfe8db6bb4b81377b5d8c9a563a2491
SHA5121e709c0970a610c1b58e9e02a49455c85feff2a983162e46df73cb3f175d2c5dfd304f16a6f42f05a8e4a9b64da291fca95fd72520b95566fc89015eb42a83cb
-
Filesize
95KB
MD5900afcdb6923b58798566101a957809c
SHA172f4a66de64d6745ceb86ecc123bc958c51b6067
SHA2560f759cd6cf30b90336e9523ba42892b6221144cf0ea38ac49e2f2e1242643180
SHA512722d899668974f36a6b1fe4a10fc7e67d945e6d97ad491d83d036eec2b27126156461673753b3997307b407fac0ab562500acbe7d135e5eecc30002e1ccdf38b
-
Filesize
314KB
MD5590ca01034604734a72b616a00c082a0
SHA1aa0742708b74a4ca25e9a2bf35374da2ccb6fb35
SHA256ec4f793f3fa5d93106064857cbaf79c39ff76bf776e3c4f9af1257477a3b6424
SHA5127744bef754aa9fb5acc1d94b226a0525df27b8b17a443b7481a500084daf6b678a84a95cd9040a88d7b70c657c4c911c743bf6915b4d47267e0b540dc7c335ea
-
Filesize
3.6MB
MD554687dfbd4e31c206ea4036fcad32738
SHA1ff30aea6c549943815418399d389fd179a24b505
SHA256fc761228d8892545e813e763deac19105c3fce15ebd642f5332ad12217402ceb
SHA5127bf3d91fa4a83ab2ff28a8c6c422d113df439be2000a02e878f713a24cb2e2aa98caea3416d141ce519666e96b9a4662afb1d75c7a64118884f868738e379613