Malware Analysis Report

2025-01-22 14:39

Sample ID 241215-xbnkmavkbj
Target OASIS AIO TOOL.7z
SHA256 b46a37de78b61ebd21ae5d6c0bfff1a7d221f0c26ac0db3ddbedf453fb760fe5
Tags
discovery bdaejec aspackv2 backdoor
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral23

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral27

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral26

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral24

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral25

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral28

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b46a37de78b61ebd21ae5d6c0bfff1a7d221f0c26ac0db3ddbedf453fb760fe5

Threat Level: Known bad

The file OASIS AIO TOOL.7z was found to be: Known bad.

Malicious Activity Summary

discovery bdaejec aspackv2 backdoor

Bdaejec

Bdaejec family

Detects Bdaejec Backdoor.

Checks computer location settings

Loads dropped DLL

ASPack v2.12-2.42

Executes dropped EXE

Drops file in Program Files directory

Drops file in Windows directory

Program crash

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-15 18:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20241023-en

Max time kernel

118s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\adb.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\adb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\adb.exe

"C:\Users\Admin\AppData\Local\Temp\adb.exe"

Network

N/A

Files

memory/2064-0-0x0000000000400000-0x00000000004E1000-memory.dmp

Analysis: behavioral16

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

95s

Max time network

99s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\click.wav C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\UserCustom.ini C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\adv.bat C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\CCleaner64.exe C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\renderer_dx.zip C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\DefenderControl.exe C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\keymapping.zip C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\helper C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\ros.bat C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\HWIDkey_Changer.exe C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\WinUpdatesDisabler_x64.exe C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 181.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 133.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/3568-0-0x00007FFE84C83000-0x00007FFE84C85000-memory.dmp

memory/3568-1-0x00000232BB8F0000-0x00000232BCCB6000-memory.dmp

memory/3568-2-0x00007FFE84C80000-0x00007FFE85741000-memory.dmp

memory/3568-3-0x00000232E1CC0000-0x00000232E43B6000-memory.dmp

memory/3568-4-0x00000232E43C0000-0x00000232E450E000-memory.dmp

memory/3568-5-0x00000232BD2E0000-0x00000232BD2F4000-memory.dmp

memory/3568-6-0x00007FFE84C83000-0x00007FFE84C85000-memory.dmp

memory/3568-9-0x00007FFE84C80000-0x00007FFE85741000-memory.dmp

memory/3568-11-0x00007FFE84C80000-0x00007FFE85741000-memory.dmp

memory/3568-12-0x00007FFE84C80000-0x00007FFE85741000-memory.dmp

memory/3568-22-0x00007FFE84C80000-0x00007FFE85741000-memory.dmp

Analysis: behavioral19

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20241010-en

Max time kernel

67s

Max time network

19s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\AdbWinApi.dll",#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 252

Network

N/A

Files

N/A

Analysis: behavioral23

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

117s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe"

Signatures

Bdaejec

backdoor bdaejec

Bdaejec family

bdaejec

Detects Bdaejec Backdoor.

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Journal\Journal.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\7-Zip\7zFM.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\7-Zip\7zG.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\updater.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe"

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\252d4bf1.bat" "

Network

Country Destination Domain Proto
US 8.8.8.8:53 ddos.dnsnb8.net udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp

Files

memory/576-0-0x0000000000400000-0x00000000004E6000-memory.dmp

\Users\Admin\AppData\Local\Temp\dhAcrH.exe

MD5 56b2c3810dba2e939a8bb9fa36d3cf96
SHA1 99ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA256 4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA512 27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

memory/576-4-0x0000000000350000-0x0000000000359000-memory.dmp

memory/576-13-0x0000000000400000-0x00000000004E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\34475B18.exe

MD5 20879c987e2f9a916e578386d499f629
SHA1 c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA256 9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512 bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

C:\Users\Admin\AppData\Local\Temp\252d4bf1.bat

MD5 6027d484800b12bcaa1779afdc482409
SHA1 791f0c08d0b9fb2cfcd50fa996684699544466bf
SHA256 07850a8d4cda1df150e78874798ddf8f8d3d8f38acacf375fc54f369b77fc296
SHA512 364e6950be857459c5d59c7069e9e956fc53b57f0c8ec435d72796409ae1765d13a71d4a73cfa5842f1af730866d0f8dfbe173e3abaf75b5dd59ab5a181033d2

memory/1680-53-0x0000000000100000-0x0000000000109000-memory.dmp

Analysis: behavioral27

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

117s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

Network

N/A

Files

memory/1924-0-0x0000000000400000-0x00000000004E1000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

154s

Command Line

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL.rar"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Program Files\7-Zip\7zFM.exe N/A
Token: 35 N/A C:\Program Files\7-Zip\7zFM.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\7-Zip\7zFM.exe N/A

Processes

C:\Program Files\7-Zip\7zFM.exe

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL.rar"

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

91s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

Signatures

Bdaejec

backdoor bdaejec

Bdaejec family

bdaejec

Detects Bdaejec Backdoor.

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\307660ab.bat" "

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 ddos.dnsnb8.net udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 105.84.221.44.in-addr.arpa udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 133.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/3428-0-0x0000000000400000-0x00000000004E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

MD5 56b2c3810dba2e939a8bb9fa36d3cf96
SHA1 99ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA256 4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA512 27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

memory/640-4-0x0000000000F40000-0x0000000000F49000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6C9A522A.exe

MD5 d3b07384d113edec49eaa6238ad5ff00
SHA1 f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256 b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA512 0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

C:\Users\Admin\AppData\Local\Temp\6C9A522A.exe

MD5 20879c987e2f9a916e578386d499f629
SHA1 c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA256 9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512 bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

memory/3428-35-0x0000000000400000-0x00000000004E6000-memory.dmp

memory/640-40-0x0000000000F40000-0x0000000000F49000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\307660ab.bat

MD5 07fd66bc1a40fd6cb1d321de6d41ad56
SHA1 6815e4027428ad8e476f09e016bd119dc03a7a70
SHA256 7f18ec57b1f0e3124aaf4b3867269d2eb138d1640c2af776f504bc989c64c3c8
SHA512 a5304e2054c5b4c951d02b4e0a88378800d171298141137db6a0cdb0a0f47822d568bb5969faf71b0f751f18e4cd8a7cb637a59ee2f1c2ee66a08fe2b8346a04

Analysis: behavioral15

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

120s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\SHREDDER AIO TOOL.exe"

Network

N/A

Files

memory/2512-0-0x000007FEF5EC3000-0x000007FEF5EC4000-memory.dmp

memory/2512-1-0x0000000000B90000-0x0000000001F56000-memory.dmp

memory/2512-2-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

memory/2512-3-0x0000000026CF0000-0x00000000293E6000-memory.dmp

memory/2512-4-0x00000000293F0000-0x000000002953E000-memory.dmp

memory/2512-5-0x0000000000990000-0x00000000009A4000-memory.dmp

memory/2512-8-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

memory/2512-9-0x000007FEF5EC3000-0x000007FEF5EC4000-memory.dmp

memory/2512-10-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

memory/2512-11-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

memory/2512-12-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

memory/2512-13-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

142s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3248 wrote to memory of 388 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3248 wrote to memory of 388 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3248 wrote to memory of 388 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 388 -ip 388

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 616

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 21.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

119s

Max time network

121s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 244

Network

N/A

Files

N/A

Analysis: behavioral12

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\renderer_dx.zip C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\HWIDkey_Changer.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\DefenderControl.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\UserCustom.ini C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\ros.bat C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\keymapping.zip C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\click.wav C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\WinUpdatesDisabler_x64.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\adv.bat C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\CCleaner64.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\helper C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 133.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 181.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 182.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

memory/4320-0-0x00007FFD8F053000-0x00007FFD8F055000-memory.dmp

memory/4320-1-0x00000224D9050000-0x00000224DA416000-memory.dmp

memory/4320-2-0x00007FFD8F050000-0x00007FFD8FB11000-memory.dmp

memory/4320-3-0x0000022480000000-0x00000224826F6000-memory.dmp

memory/4320-4-0x00000224FEF40000-0x00000224FF08E000-memory.dmp

memory/4320-5-0x00000224F4130000-0x00000224F4144000-memory.dmp

memory/4320-9-0x00007FFD8F050000-0x00007FFD8FB11000-memory.dmp

memory/4320-10-0x00007FFD8F053000-0x00007FFD8F055000-memory.dmp

memory/4320-11-0x00007FFD8F050000-0x00007FFD8FB11000-memory.dmp

memory/4320-21-0x00007FFD8F050000-0x00007FFD8FB11000-memory.dmp

Analysis: behavioral20

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

146s

Max time network

151s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\AdbWinApi.dll",#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1304 wrote to memory of 4040 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1304 wrote to memory of 4040 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1304 wrote to memory of 4040 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4040 -ip 4040

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 620

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 22.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 86.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

150s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1636 wrote to memory of 1416 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1636 wrote to memory of 1416 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1636 wrote to memory of 1416 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1416 -ip 1416

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 616

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Network

N/A

Files

memory/2332-0-0x000007FEF5D23000-0x000007FEF5D24000-memory.dmp

memory/2332-1-0x0000000001290000-0x0000000002656000-memory.dmp

memory/2332-2-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

memory/2332-3-0x0000000026D40000-0x0000000029436000-memory.dmp

memory/2332-4-0x0000000029440000-0x000000002958E000-memory.dmp

memory/2332-5-0x0000000001120000-0x0000000001134000-memory.dmp

memory/2332-6-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

memory/2332-7-0x000007FEF5D23000-0x000007FEF5D24000-memory.dmp

memory/2332-9-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

memory/2332-11-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

memory/2332-12-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

120s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

Signatures

Bdaejec

backdoor bdaejec

Bdaejec family

bdaejec

Detects Bdaejec Backdoor.

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\7-Zip\7zFM.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\updater.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Mail\WinMail.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Mail\wab.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Defender\MSASCui.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\6cb31e14.bat" "

Network

Country Destination Domain Proto
US 8.8.8.8:53 ddos.dnsnb8.net udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp

Files

memory/2504-0-0x0000000000400000-0x00000000004E6000-memory.dmp

memory/2504-4-0x0000000000350000-0x0000000000359000-memory.dmp

\Users\Admin\AppData\Local\Temp\dhAcrH.exe

MD5 56b2c3810dba2e939a8bb9fa36d3cf96
SHA1 99ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA256 4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA512 27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

memory/2504-10-0x0000000000350000-0x0000000000359000-memory.dmp

memory/2504-14-0x0000000000400000-0x00000000004E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6cb31e14.bat

MD5 01753c0872a1885de8537f600ddfdebd
SHA1 d36bef273597a5b7bde7457b1d22c651a840f5c7
SHA256 f770fbe17201fec005f9b06ce8365d3dbca85f04d6abb51228c385067cb4c1e3
SHA512 3d4a7787e235cface54025b206c5eba7f5308629a0b8cc309933375e85bb2756095026eb74ad8af88f4c771d1aef5219eeb3085a7fbbc26d63bb95ed2f9922e9

memory/2156-24-0x00000000011D0000-0x00000000011D9000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\adb.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\adb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\adb.exe

"C:\Users\Admin\AppData\Local\Temp\adb.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 182.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 84.65.42.20.in-addr.arpa udp

Files

memory/552-0-0x0000000000400000-0x00000000004E1000-memory.dmp

Analysis: behavioral26

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\CCleaner64.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\ros.bat C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\DefenderControl.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\keymapping.zip C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\WinUpdatesDisabler_x64.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\UserCustom.ini C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\adv.bat C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\helper C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\renderer_dx.zip C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\HWIDkey_Changer.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\click.wav C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 20.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 86.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/4016-0-0x00007FFC7EB33000-0x00007FFC7EB35000-memory.dmp

memory/4016-1-0x000001A700630000-0x000001A7019F6000-memory.dmp

memory/4016-2-0x00007FFC7EB30000-0x00007FFC7F5F1000-memory.dmp

memory/4016-3-0x000001A71E1A0000-0x000001A720896000-memory.dmp

memory/4016-4-0x000001A7208A0000-0x000001A7209EE000-memory.dmp

memory/4016-5-0x000001A703630000-0x000001A703644000-memory.dmp

memory/4016-8-0x00007FFC7EB30000-0x00007FFC7F5F1000-memory.dmp

memory/4016-10-0x00007FFC7EB33000-0x00007FFC7EB35000-memory.dmp

memory/4016-11-0x00007FFC7EB30000-0x00007FFC7F5F1000-memory.dmp

memory/4016-21-0x00007FFC7EB30000-0x00007FFC7F5F1000-memory.dmp

memory/4016-22-0x00007FFC7EB30000-0x00007FFC7F5F1000-memory.dmp

Analysis: behavioral22

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

140s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\renderer_dx.zip C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\HWIDkey_Changer.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\DefenderControl.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\keymapping.zip C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\WinUpdatesDisabler_x64.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\UserCustom.ini C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\adv.bat C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\CCleaner64.exe C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\helper C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\ros.bat C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A
File opened for modification C:\Windows\Web\Wallpaper\click.wav C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp

Files

memory/652-0-0x00007FFA2F173000-0x00007FFA2F175000-memory.dmp

memory/652-1-0x000002170A220000-0x000002170B5E6000-memory.dmp

memory/652-2-0x00007FFA2F170000-0x00007FFA2FC31000-memory.dmp

memory/652-3-0x00000217303D0000-0x0000021732AC6000-memory.dmp

memory/652-4-0x0000021732AD0000-0x0000021732C1E000-memory.dmp

memory/652-5-0x0000021725A20000-0x0000021725A34000-memory.dmp

memory/652-9-0x00007FFA2F173000-0x00007FFA2F175000-memory.dmp

memory/652-8-0x00007FFA2F170000-0x00007FFA2FC31000-memory.dmp

memory/652-11-0x00007FFA2F170000-0x00007FFA2FC31000-memory.dmp

memory/652-21-0x0000021732C20000-0x0000021732DC9000-memory.dmp

memory/652-22-0x00007FFA2F170000-0x00007FFA2FC31000-memory.dmp

Analysis: behavioral24

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe"

Signatures

Bdaejec

backdoor bdaejec

Bdaejec family

bdaejec

Detects Bdaejec Backdoor.

Description Indicator Process Target
N/A N/A N/A N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\Install\{AFD1DC19-D740-4861-ADFA-3BC6A9F6A223}\chrome_installer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\DisconnectRename.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\adb.exe"

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0f264b5d.bat" "

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 ddos.dnsnb8.net udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 8.8.8.8:53 105.84.221.44.in-addr.arpa udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 44.221.84.105:799 ddos.dnsnb8.net tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

memory/3420-0-0x0000000000400000-0x00000000004E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\dhAcrH.exe

MD5 56b2c3810dba2e939a8bb9fa36d3cf96
SHA1 99ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA256 4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA512 27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

memory/2132-4-0x0000000000D70000-0x0000000000D79000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VKYZDMA5\k1[1].rar

MD5 d3b07384d113edec49eaa6238ad5ff00
SHA1 f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256 b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA512 0cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6

C:\Users\Admin\AppData\Local\Temp\3487261B.exe

MD5 20879c987e2f9a916e578386d499f629
SHA1 c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA256 9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512 bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

memory/3420-30-0x0000000000400000-0x00000000004E6000-memory.dmp

memory/2132-48-0x0000000000D70000-0x0000000000D79000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0f264b5d.bat

MD5 18476042292054417e0807a8199eaed4
SHA1 509f7f76da05d9ba3e1a519d85af9fd2a201a107
SHA256 30ced5f55b58676eb0f08b6b57cd5ff7b9eb01e0b4d8171a1fc299f3f61fc3c0
SHA512 91de60285cbfc32347ba05d9a97c303c4ccb536ab12ff62ec53dcc2ea03de2d54e5357808f8444705e6a95a601eecf00a9426a44d69c424c4ea7fb1b31e140f7

Analysis: behavioral21

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20241023-en

Max time kernel

117s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Network

N/A

Files

memory/2140-0-0x000007FEF53A3000-0x000007FEF53A4000-memory.dmp

memory/2140-1-0x0000000000F00000-0x00000000022C6000-memory.dmp

memory/2140-2-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

memory/2140-3-0x0000000026E70000-0x0000000029566000-memory.dmp

memory/2140-4-0x000000001E200000-0x000000001E34E000-memory.dmp

memory/2140-5-0x0000000000A10000-0x0000000000A24000-memory.dmp

memory/2140-6-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

memory/2140-9-0x000007FEF53A3000-0x000007FEF53A4000-memory.dmp

memory/2140-10-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

memory/2140-11-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

memory/2140-12-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

memory/2140-13-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

Analysis: behavioral25

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240729-en

Max time kernel

121s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Signatures

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Web\Wallpaper\normal.ico C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\SHREDDER AIO TOOL.exe"

Network

N/A

Files

memory/2232-0-0x000007FEF50B3000-0x000007FEF50B4000-memory.dmp

memory/2232-1-0x0000000000F40000-0x0000000002306000-memory.dmp

memory/2232-2-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

memory/2232-3-0x0000000027320000-0x0000000029A16000-memory.dmp

memory/2232-4-0x000000001E6A0000-0x000000001E7EE000-memory.dmp

memory/2232-5-0x00000000008D0000-0x00000000008E4000-memory.dmp

memory/2232-6-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

memory/2232-7-0x000007FEF50B3000-0x000007FEF50B4000-memory.dmp

memory/2232-8-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

memory/2232-11-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

memory/2232-12-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240708-en

Max time kernel

121s

Max time network

125s

Command Line

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL.7z"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Program Files\7-Zip\7zFM.exe N/A
Token: 35 N/A C:\Program Files\7-Zip\7zFM.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\7-Zip\7zFM.exe N/A

Processes

C:\Program Files\7-Zip\7zFM.exe

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL.7z"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

91s

Max time network

148s

Command Line

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL.7z"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Program Files\7-Zip\7zFM.exe N/A
Token: 35 N/A C:\Program Files\7-Zip\7zFM.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\7-Zip\7zFM.exe N/A

Processes

C:\Program Files\7-Zip\7zFM.exe

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL.7z"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 85.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

119s

Max time network

122s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\AdbWinApi.dll",#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 244

Network

N/A

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20240903-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL.rar"

Signatures

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files\7-Zip\7zFM.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Program Files\7-Zip\7zFM.exe N/A
Token: 35 N/A C:\Program Files\7-Zip\7zFM.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\7-Zip\7zFM.exe N/A

Processes

C:\Program Files\7-Zip\7zFM.exe

"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\OASIS AIO TOOL.rar"

Network

N/A

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win7-20241010-en

Max time kernel

10s

Max time network

19s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 252

Network

N/A

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4792 wrote to memory of 1436 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4792 wrote to memory of 1436 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4792 wrote to memory of 1436 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1436 -ip 1436

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 616

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral28

Detonation Overview

Submitted

2024-12-15 18:40

Reported

2024-12-15 18:44

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe

"C:\Users\Admin\AppData\Local\Temp\OASIS AIO TOOL\adb.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/1516-0-0x0000000000400000-0x00000000004E1000-memory.dmp