Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe
Resource
win7-20240903-en
General
-
Target
46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe
-
Size
7.2MB
-
MD5
3ddb25fb8127c1ff0b5108ad3c1306bf
-
SHA1
bffc34d8e9cdcba6574b758048073389a15c9c59
-
SHA256
46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe
-
SHA512
d791550e760b457104e8235929585cf5372d03def61af33dfa5c4fe4b5caa143c34737d791ece975da0474d10e01cb7df015c1f566856eb8698760f2bd720723
-
SSDEEP
98304:Gws2ANnKXOaeOgmhtASKlmkt6U+66sJZDJ1W+zitw4JJOKAWb86MFkNgDlPRt/Fd:0KXbeO73IlmILFJNJEvbTwqNghptf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2900-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2900-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2572-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2572-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2572-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2572-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2572-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/files/0x0008000000015f4e-6.dat family_gh0strat behavioral1/memory/2900-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2900-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2572-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2572-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2572-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2572-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2572-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259451986.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
pid Process 1232 R.exe 2900 N.exe 2592 TXPlatfor.exe 2572 TXPlatfor.exe 1648 HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 2108 Remote Data.exe -
Loads dropped DLL 8 IoCs
pid Process 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 1232 R.exe 2120 svchost.exe 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 2592 TXPlatfor.exe 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 2120 svchost.exe 2108 Remote Data.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\259451986.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe -
resource yara_rule behavioral1/memory/2900-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2900-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2900-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2572-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2572-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2572-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2572-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2572-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2572-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remote Data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2788 cmd.exe 2324 PING.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2920A151-B190-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439403687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009c4862d9a5eeb54fb9c72f956a1c76c30000000002000000000010660000000100002000000035e6395265f4347e3eb43eb3a5de7bb44621cdcadad280e28763da4b3547efaa000000000e8000000002000020000000ef9ee5b31e3a4c758b9a96a9e64ceeec56995239b7db2de719ae947fc79e2151200000009e13df48cbc295449077c1dcf93319ee30f1ca490e3117e9df6f719fb08d5825400000003a847f5d351bcf23378bfe9f2f9f59cf1907282b6f5ab339377ee4fe8041283825b0cb24c43e97220fa35bed0f5e3f29ba13a4c15b70713a35739d33be2b4c93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e027fdfe9c45db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009c4862d9a5eeb54fb9c72f956a1c76c300000000020000000000106600000001000020000000e3a1a200730338d989c91833aa826ac1dea1836c47046cc31e13191e483faf90000000000e8000000002000020000000f8adf1b2c44ac10d38d5b40b4826432da32bb15b0cf4ae9d7f3aa73151691a559000000000897ff43cd06d384922841335a5004b419a5c1720418803ad2839a3f6c8d96b081384e711f50eceaf61a0cd066a93ca0f86687a4c1b90360ec930ae639e97d64800bb30fd722f040453a12c3e5bfe6891fe4999b4820aa11830bfc7d5e7b19e35b6a84835f6688cdf8df4884df2c0f4a5e8b186bdf51a0aed1e83930b9b3e531376cd990487cc696a56765c8fd54c09400000002af1bd2565a2993715b6e516a49dfb2e9c7a5c98162a7047bdc224c48355e6f2ce48b146f39d39715c50e848dc0850cb75c728544530734daceb5d885c4a46f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2324 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2572 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2900 N.exe Token: SeLoadDriverPrivilege 2572 TXPlatfor.exe Token: 33 2572 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2572 TXPlatfor.exe Token: 33 2572 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2572 TXPlatfor.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 3040 iexplore.exe 3040 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1232 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 31 PID 2676 wrote to memory of 1232 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 31 PID 2676 wrote to memory of 1232 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 31 PID 2676 wrote to memory of 1232 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 31 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2676 wrote to memory of 2900 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 34 PID 2900 wrote to memory of 2788 2900 N.exe 36 PID 2900 wrote to memory of 2788 2900 N.exe 36 PID 2900 wrote to memory of 2788 2900 N.exe 36 PID 2900 wrote to memory of 2788 2900 N.exe 36 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2592 wrote to memory of 2572 2592 TXPlatfor.exe 37 PID 2676 wrote to memory of 1648 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 39 PID 2676 wrote to memory of 1648 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 39 PID 2676 wrote to memory of 1648 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 39 PID 2676 wrote to memory of 1648 2676 46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 39 PID 2788 wrote to memory of 2324 2788 cmd.exe 40 PID 2788 wrote to memory of 2324 2788 cmd.exe 40 PID 2788 wrote to memory of 2324 2788 cmd.exe 40 PID 2788 wrote to memory of 2324 2788 cmd.exe 40 PID 2120 wrote to memory of 2108 2120 svchost.exe 41 PID 2120 wrote to memory of 2108 2120 svchost.exe 41 PID 2120 wrote to memory of 2108 2120 svchost.exe 41 PID 2120 wrote to memory of 2108 2120 svchost.exe 41 PID 1648 wrote to memory of 3040 1648 HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 42 PID 1648 wrote to memory of 3040 1648 HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 42 PID 1648 wrote to memory of 3040 1648 HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 42 PID 1648 wrote to memory of 3040 1648 HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe 42 PID 3040 wrote to memory of 3024 3040 iexplore.exe 43 PID 3040 wrote to memory of 3024 3040 iexplore.exe 43 PID 3040 wrote to memory of 3024 3040 iexplore.exe 43 PID 3040 wrote to memory of 3024 3040 iexplore.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe"C:\Users\Admin\AppData\Local\Temp\46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exeC:\Users\Admin\AppData\Local\Temp\HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/download-jdk/microsoft-jdk-17-windows-x64.msi3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:2800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259451986.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff43e11b5f841c547d8b60045e6c1e6
SHA1b28c709cb6000bfb98d650d90e53591591fbd189
SHA25696ff22e169c2d4a101160e636eaf592398372349ccbeb474e2c24b7835da508b
SHA5120a05fcbe69ffec1727d31480d926beadb4b1140bdc5251a076d6fddaefdfd0a7fcc40862d895c106eb163d344de66c35211217e42b3872b5d3c214e55d0d066a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fbba802a7f9e08d5dd42ff33411b6d
SHA124ba36b01360e6832bf385d4271bd4dad1483e4a
SHA25602417c9fe73eb070f670fdefe3dfd8518abba87e5c0fecacf202b6254fe4834a
SHA5121a57a9a72a81834622fad5ded1cb7d1820512c2469077d8e115b4d46d534647bb8792164f30537af5d14e52f8eb942fff781f8e1635b866267d33ab3cfce349b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a469cf043353a82078e8bf980a121d20
SHA13115fd735c5f499e93484709274f9947de7aad20
SHA256152633e969a5111ae146e0cdbf0cc66942f46e68c7fb7db7314134a1bd0564af
SHA512694cbd033684393d87587089da16ddd69de1f008b97094f72be233a3729e5d4e9e42c41f2d80b9025dd6337dd8393f56bc1c5eb3a5119c14ccdb5bcd507f0663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d30582764fc56eaf423f4ff8a45159
SHA126af15234a1bd5198406ca21c7ca641eb0766ad8
SHA256aa689ffb69e68e3f027d94a1c9eb99e02b087815173c911214604f49b90f503d
SHA512aa7b382f1acc4d9ff1b3d0ff475154ba40275ee522b5c1697d77a7aba7bf9927d017745965400e7d728b2488d8529addf1e8ae4237a2579e2bbb0176ed29612f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e3eb9dee16b3c06a117006db7b9d37
SHA130eea6367e7cadccf8ec571e5e37dafbf4ed64f9
SHA2564ec8c61c7a3b3c16d99d5f26681c069c4ea09914f36ef4eaeb1f80c4c834355a
SHA51222d6e4b5e2ba90d52b1ff629b4f57308c7faad6323283173194b30bf8b1fe137c36d402beb420334321db906d693adadb76605843973b8207543e246d85c2fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee0048ceaec5f5016992b2f7a449ea0
SHA137151364d2e584b5e0599fadb95c469d8a5e3a52
SHA25607729e6ddd258123cacacc7d74611e3be0c30971156021c39614d433c9703c03
SHA5127415af18ac6e7f16163e56c874815ad5bb9240d2e5f0dd773ac14cf6d48cf813a3025f142403090a410bb2f5715937281979ac861a9775fc67f7c92a496fe562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4de9ffdafcaf18ed70b97b034a93e6d
SHA1359fd9d5dc2d3700112aa576ae78587a40354b76
SHA2569043ce4e50a7cf58c7deb5577a5ff58bd04d411c4e9c728a423369c1cba4914a
SHA5123c27ca88601a589cc470415cb611c2f5b3f22e68a6e7a6d641e5c64ed8388f19d6c3d160ad5f38a3c15269c6535454196a4b5f664759cfd35f7f91fa43af387d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b5a55d0733697e040aeceb7be851fd
SHA11fe556ceeb1360e3e72a3eb418027a18db4c5f78
SHA2569bb4f36a71ef8d39e1dc4c3036953464d71216f7e6a8802ea5b3f82ac8c1056e
SHA51213d89279c1e4e02fdfa2bba696dcc4fbc3841f2fb117f60c1d86a74ebad3b0c05b402f1e2290fbc9214cc08af24b1c8212e4d49b29a1f372b28eb6f91e53dc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccbbe651774057315da2e69bc76a20a
SHA131f04a1ba6e8b3bdfb8255c7ac53e5f0de0c33d0
SHA256c7eb66814be926c48cfa395c9d897526d59a3445d99b33dd0a49157e4ec6a7d6
SHA51259459185ad3ebddc305b2c43e90d219285e6a61a248bf66d600c0a43653b28a6f88a69e38dbba57a60be198254bba4cc7a809153e54db469ecb17171dc8fb8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa87bae404f4753835839e9fafab80a9
SHA1c25c22a2e9e32f94a0034c34977584b6d7ec06f1
SHA2560c647fefe617efd4eee9a6a28fb1f5950fa6d15214d6077a0503ea8497212b04
SHA5129b1083090881798545c55108ccbb9f6a3ed016701cacfda37df358a8d8036ffdc99693c8f40939dff19e4d3fecea1fe5d8ec42f66cb3665913face43397fd6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f204dfb2403a3a931fa04e5f24595f3f
SHA1b65fdc2ec9112ced04ca5ed62d9e8a89600b7fe9
SHA25698b8df16717a0dc960995cb9a46f4da44fb7a1c1938f0d85188c5cb773f99b14
SHA51276ea24ce3c3d2f743f74ea0fbbcc1987944e3e70fcd9aaabde5afc2b19d20e0e01edaaf0a3de7df8ed654e9c412d04751a58ad98a5638b724caab97221d68040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1551c66888dc82d15d3b9e15279a95
SHA152392e1beefe852e7d74e929b375da55bde0782c
SHA256e08973c3aaf356f7680d057abad49940da63b300fd27776ac107dbad809c2e10
SHA51298be8587ecbd4210c137559d632afa0d1669a0c6dc66e0261841f20c020cc62dbb1785e16cbf36fb375f54ddf387b2cc7673671e5db8c6fdbe8e7baa189b1b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab442596e6c1302db9e879289b39cc3
SHA102d29d65f3152e094c9a618a28db77b491d1e2ac
SHA25602b144607db3877808f71c79a9b38b007d47605794e3b8b98c9d7e3a3be1e122
SHA512250f87426bac69ba0835749b3f1227dea80f357f2cc8d83a48f2261da0e35dff4a7ee9e78d696210e76f0319be5d571e242e9dcbaf17daadc46cb646b5eb81a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fafffc1ddb7e1c4940fd5df3d51610
SHA1590e4a9820fab4c791f1882862bbb22bb41a1a57
SHA256be1ed3cb20f4396b7375ce7c938a75bc3ad5c864eccbeb5c3d8477d99d228afd
SHA512e3485b30b7bb0c3145b757a455c9c2844c8d99b5f7612df963345106001908fa720483bf835182ff37e7a1ff95217164b1e864a71a4364e2000206560de64080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565691c3611469e3f9f0ffc610d584fb9
SHA157de04f6cd9bac43b64c23db446361972acc7489
SHA25600358e77de667b7ff00800ec5964639008b5a1f4ea89a0e7ba4a14a6262514a6
SHA5122cf7babb44ac0ecd843eb2d23d401b8da6bea817d52095761c72f96fd5e6f70ebb7a9304d227893fec43854ad2d37eb72bce7100475de3e2215a992aa55a6221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd443fda423264d37dd10d5686ec7d6
SHA14fe653a469de872f5da96108a0200982eebb5f5b
SHA25636ddd9e186a888fd6c1bea84144985652f98f00378a3546a47b9db617782c69e
SHA512ba7e71f1c7b740e4f888ea67b918eba17eff9aff790cef9491da86bb983c71295111503454c310df8f616600ccdd34e06839211c3fda51e082092118a9d02870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53defd2f9ec4f551188afe6dd163b26a6
SHA1ff03f530479d8d2321b946f0be93cf7b2e17de81
SHA256e4daa6d01bdb954706765953c7cd821cb7e5231026fb03d71430781a4bed6424
SHA512d58c840fd38e337f8588396af5ca94a7a5d6bd255bd0964d6a4749a7f8844319f0972641e33cbf99b191295a7d9d5ba3f763ba278cd1d7afba27a8798f0c7c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52478f0040a43a017a167cc1da1b38ebe
SHA1062c4d3f0dae41004313142e1a304c224f2d8377
SHA256ab92fb9ed345046823cfc33d71e46daa7538854b87b7140576bdfb47f13a01f2
SHA512496a7dab87cb2518a0a955ed0438180b6749cc955855494f80afea37f77aacfe90bc995f0347c3d3a1a42c7d9c91cdf5a64485644d854dd001b728c2d0c10760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba39824911579aff9fbf30bf68d57b7
SHA1b1b465d7364ca2500e57dc96c15d01fe772e52ac
SHA256db674a4a967fe69649418fef3d2c231e3d1c887aade1d5ab130daddc70f246a2
SHA512f782b78d9b20cd53770e0004c5e2a83f5232d8d42641ffb64774e0c2bdb94bc1272b64be57ba35a5e07805ec9834042d4b8b9e45b8c15b03b5c6358464513089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd4016986759cf940409b7ee7c02104
SHA144d709b9b44d61ef6d24e53ca03493ded57a6002
SHA2567d54dc327fec53488d40d388bd6fd5ff419fe8177b0e0afe3450613866bc5cca
SHA512b4ec26c6f9b2e9551313cd291991597cce4e300924c54e1918b1e4acc18faea1f823686069497af4f852f21d112ee616cee8ad06c2eb7b236857cb2a84d6dea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6c66765221c8f8ae048926eba9c72d
SHA1751eaedbcc153f8dc4bb36e8ce6b53515c0d8a37
SHA2569cc5252f8433609b4ab90cc84cd13ac985b2b18e377afce4265eb1a2aa347814
SHA5121c5345ef542a28d91e62e2c2982214df6de979cba6e060032953c34f47c185da2d6a9245f66c0c5fc0970db8df46c8ec98470a2858927b2fbd6027f40bb66597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303e631ba88f130197a72d5af15e119a
SHA1994cc408590b02549fb2c3f1f3ca441cfa469237
SHA256f211577ca4e92bbe5d134e21b7443d7200f1888d2f426c011d17ea62a39f434a
SHA5129c15f97fdfb0c334729ef0b76aef5c8491c633c3debd50bf95a838f10ba588e0520273114d4146302bc32ed8b36c8b467eafb95d26886268d5e1840dfc3063c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ced68be74a73cb07b983257f9fcc84c
SHA145219362d8a3261b84e868c5e145c794dc8c7a1f
SHA2569b0f48fcca129e1422928b9d437fde8a6fa7686e6e9c6bca3675b186832566ef
SHA512e5309a1cb3a50fd6026185866b1262fbbb71d83a8d60693ebc0304ae47231d545f2d766c6978c66e4920a7106b76b557a7a1fc91c9d4348b0850d79a9698ba1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b55543a39698d33012e556fc1559862
SHA176d1f218309e5145e450e3be314468251362ab0e
SHA256734761149cf4fdb4ed70379f1e749da69df9d2aa20e27e16ce598441c88a022d
SHA5128f3b80804ae88393d9c3821e4f1c3165428413afcf3d26065d64ea3a933e1ee728a3a47f6de23c7b47a377f5e5f273d99d9040f6ec0ce8560ad7b2d8abfa60a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c49f438ed6a35e0eb5cf94276fdf47
SHA163054eb3ca29ecaf1ea6e1daef739bde23ceb114
SHA256ec1decbc484f6515ffd57a2037863dbd26202f61df565d25200c3fcc1d3f1605
SHA512fb6832a1ec32b1a81728b87a6df267f0e6df09c0fe3939d21b96618a245d504daf5a8e578b018d5b5784144c3e72ae8e5879db90815d62ddf0130115c874389c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ee19dcffc9062910338cb4cae1499c
SHA1a65e4cb1490d81e4bcc3cf0f6539050b84bb5790
SHA2568a60c8f98158b549f2d78e397b0953389b73991b7ad6434f0e07f7ecc197bfd0
SHA512234f099a6254917a22ecf4030ee5ed117698972f93ba049aeb2cf41893e45c684894f4d4327ec701e46ba72c7fa40cf60e547c72e1c4c9571e4ae6ff86e02aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12f57f98caf194eb4666e784836a2cf
SHA103678e8b5f8d06b403cf519efd793bafd6146594
SHA2560ae84efc8403d25d07621cfc034c258c7e35834c8528d0eb32580403e7873d20
SHA5121edaee62dcb20489c36e9a8647dfede9fbfc47d9685ec3dea3e49fc653a3339aeb8b383c21828f3b136309778c80d9bd8f849c65b9103b304137fd76993c8b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512599d8555dfbcaa7b814890d39bc76e
SHA16087c86cfbe4a6a05f359241d3df8577b678a7be
SHA2569363971371795665400050f3243dcd1d4eb9bf780d1b0fce6d163bf9bf25dc7f
SHA5126d48e4a93581ed22a2f6b985d709ecb934deabc9ac07ce6756213cc76b7ab1fe5475341e212527c9c651fc0d90feebd5229012bb23a442602a7493b06339ead7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\HD_46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe.exe
Filesize4.7MB
MD593fe1dc753db74eaca66ccb24ef9a68f
SHA11b6f7838e00c35958d657c3570534229871480ff
SHA256947a3a5c383305f1aab7c3339be2221d1f1b2d4d5378ec221f9c5886f097ee43
SHA5122d1d228f7d45429778d4b5746c1e4e49e2f1a1825c653110d7cc118703fc91f3ae3934b361749abc0e62f5a8e1b13c8d0f265a65a422159989ebc1f2419ea03b
-
Filesize
2.5MB
MD525ff315fc42eba6b3276af066e4c6376
SHA1ba7213c92c55b61d4097856c6a808322f5cda86a
SHA25689820cb90c1b4632293bc43a8befc7296af35ab3d94f56852a3ddbe8dbb3583d
SHA51281f3108fa7a59ba56f7ec7551f570535597241210f3db51490254d63255b0cda119e05b716993c58a90748046bd46e95552965c4d1b875e63907b77812bc6088
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD5f712204cf420e5648489f926e81a5065
SHA16f643f4967beb01b9c2020de6a70bc6790148500
SHA256c8d97352ac563888d6166a2d43d857541810d97d0e6d631947850c00a5d1ac89
SHA512baec1bb96dd83afda0284046a6a30ecede2af22ec5866edc0971c16fcba09887a7b072ca71abd1869937af15a0f0bea8242b6c7ec7b820a511be697d8f1f416e