Analysis
-
max time kernel
56s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 19:34
Behavioral task
behavioral1
Sample
0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe
Resource
win7-20240903-en
General
-
Target
0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe
-
Size
118KB
-
MD5
c2f29e7622b41f880b6bda678e7a5584
-
SHA1
42713213d71d7b8c57e3c79798ce6b99e41889e8
-
SHA256
0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225
-
SHA512
7177a3632486db69854dff5342e1a10258cabdbfe6077337d734a170cdee1a3f00c65c8f47e45bc26aef7f28c53874f760ec345d1ecbbdfe8d33f8d5b629600b
-
SSDEEP
3072:++z7JXnrdFzp886+RMPy5fWMwdWRgjnahKoutjKI7ehMx:Jz75nrz286+RMaLVRgjahKoS
Malware Config
Extracted
netwire
imemerit.servehttp.com:3360
-
activex_autorun
true
-
activex_key
{I78G8V27-88UF-2L1T-8064-2S8723OVASE8}
-
copy_executable
false
-
delete_original
true
-
host_id
HostId-%Rand%
-
keylogger_dir
C:\Users\Admin\AppData\Roaming\Logs\
-
lock_executable
false
-
mutex
TIrKHSHH
-
offline_keylogger
true
-
password
`+8n0x<gT)\"Lu5"'A`c?$H="
-
registry_autorun
true
-
startup_name
FirstRowAli
-
use_mutex
true
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2500-86-0x0000000000400000-0x000000000041A000-memory.dmp netwire behavioral1/memory/2500-94-0x0000000000400000-0x000000000041A000-memory.dmp netwire -
Netwire family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{I78G8V27-88UF-2L1T-8064-2S8723OVASE8}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\FirstRow.pif\"" FirstRow.pif Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{I78G8V27-88UF-2L1T-8064-2S8723OVASE8} FirstRow.pif -
Executes dropped EXE 4 IoCs
pid Process 2828 FirstRow.pif 2984 FirstRow.pif 1936 FirstRow.pif 2500 FirstRow.pif -
Loads dropped DLL 5 IoCs
pid Process 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\UpdateAliAim = "C:\\Users\\Admin\\AppData\\Roaming\\FirstRow.pif" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\FirstRowAli = "C:\\Users\\Admin\\AppData\\Roaming\\FirstRow.pif" FirstRow.pif -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2308 set thread context of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 set thread context of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2828 set thread context of 2984 2828 FirstRow.pif 39 PID 2828 set thread context of 1936 2828 FirstRow.pif 41 PID 2828 set thread context of 2500 2828 FirstRow.pif 49 -
resource yara_rule behavioral1/memory/2308-0-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2308-5-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2308-4-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2308-7-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2424-8-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2308-10-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2120-18-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2120-16-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2424-14-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2424-11-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2120-19-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2308-25-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/files/0x000c000000012281-29.dat upx behavioral1/memory/2828-50-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2120-49-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2424-53-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2424-54-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2828-56-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2424-80-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2500-86-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2828-85-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2500-84-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2500-83-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2500-81-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1936-89-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2984-88-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2500-94-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2424-97-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FirstRow.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FirstRow.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FirstRow.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
pid Process 2268 ipconfig.exe 2788 ipconfig.exe 2980 ipconfig.exe 1716 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif Token: SeDebugPrivilege 1936 FirstRow.pif -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 2828 FirstRow.pif 2984 FirstRow.pif 1936 FirstRow.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2268 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 31 PID 2308 wrote to memory of 2268 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 31 PID 2308 wrote to memory of 2268 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 31 PID 2308 wrote to memory of 2268 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 31 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2424 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 32 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2308 wrote to memory of 2120 2308 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 34 PID 2424 wrote to memory of 2788 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 35 PID 2424 wrote to memory of 2788 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 35 PID 2424 wrote to memory of 2788 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 35 PID 2424 wrote to memory of 2788 2424 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 35 PID 2120 wrote to memory of 2828 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 37 PID 2120 wrote to memory of 2828 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 37 PID 2120 wrote to memory of 2828 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 37 PID 2120 wrote to memory of 2828 2120 0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe 37 PID 2828 wrote to memory of 2980 2828 FirstRow.pif 38 PID 2828 wrote to memory of 2980 2828 FirstRow.pif 38 PID 2828 wrote to memory of 2980 2828 FirstRow.pif 38 PID 2828 wrote to memory of 2980 2828 FirstRow.pif 38 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 2984 2828 FirstRow.pif 39 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2828 wrote to memory of 1936 2828 FirstRow.pif 41 PID 2984 wrote to memory of 1716 2984 FirstRow.pif 42 PID 2984 wrote to memory of 1716 2984 FirstRow.pif 42 PID 2984 wrote to memory of 1716 2984 FirstRow.pif 42 PID 2984 wrote to memory of 1716 2984 FirstRow.pif 42 PID 1936 wrote to memory of 1696 1936 FirstRow.pif 44 PID 1936 wrote to memory of 1696 1936 FirstRow.pif 44 PID 1936 wrote to memory of 1696 1936 FirstRow.pif 44 PID 1936 wrote to memory of 1696 1936 FirstRow.pif 44 PID 1936 wrote to memory of 1696 1936 FirstRow.pif 44 PID 1936 wrote to memory of 1696 1936 FirstRow.pif 44 PID 1696 wrote to memory of 2404 1696 bitsadmin.exe 46 PID 1696 wrote to memory of 2404 1696 bitsadmin.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe"C:\Users\Admin\AppData\Local\Temp\0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe"C:\Users\Admin\AppData\Local\Temp\0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe"C:\Users\Admin\AppData\Local\Temp\0f0f8700da79a05e5919bd31420e45cce0e79d5c7cec35b062c7dd4af3d6d225.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2980
-
-
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1716
-
-
-
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\system32\bitsadmin.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HUQTX.bat" "6⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "UpdateAliAim" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FirstRow.pif" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:772
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\FirstRow.pif"C:\Users\Admin\AppData\Roaming\FirstRow.pif"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:2500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD5f36ef4e2bfb399e9159d71c0806dc34f
SHA19ce20868ec14cabf37d77a1995b1399ebf40681d
SHA25699a012606942fe84a0ed1b09c60ef765cef48e4ba317b3a71595b300ae531cc2
SHA512ad7cd152f2b8f04aeee6838ccb2cc10675f289f0e4fd0e6175dace10a062655df1ec2a8d5e80ba65e5d6d0237311c91b0fce54c16e7576dc38b3399abc304b0b
-
Filesize
118KB
MD562b17b9cdbbd6711dbfce8e2ddbd3b25
SHA17cd2d136beee0629eec2ec88aeab0eeb862a228e
SHA2566e31069208365f3adafc6e17bd4c2e0b7b26c3d9d6d583da2880442a375c58e0
SHA512fe286afc62074384b45dd9ab193995ce0df2d3e4a502e63f243655428790b19dd0614986eb7d8be094eda637c493195bbbcdd9ce80a074e3ce51de24ba2c842b