Overview
overview
10Static
static
3nj230708full.pdf.exe
windows7-x64
10nj230708full.pdf.exe
windows10-2004-x64
10.data
windows7-x64
3.data
windows10-2004-x64
3.rdata
windows7-x64
3.rdata
windows10-2004-x64
3.reloc
windows7-x64
3.reloc
windows10-2004-x64
3.rsrc/DIALOG/105
windows7-x64
1.rsrc/DIALOG/105
windows10-2004-x64
1.rsrc/DIALOG/106
windows7-x64
1.rsrc/DIALOG/106
windows10-2004-x64
1.rsrc/DIALOG/111
windows7-x64
1.rsrc/DIALOG/111
windows10-2004-x64
1.rsrc/GROUP_ICON/103
windows7-x64
1.rsrc/GROUP_ICON/103
windows10-2004-x64
1.rsrc/ICON/1.png
windows7-x64
3.rsrc/ICON/1.png
windows10-2004-x64
3.rsrc/ICON/2.ico
windows7-x64
3.rsrc/ICON/2.ico
windows10-2004-x64
3.rsrc/ICON/3.ico
windows7-x64
3.rsrc/ICON/3.ico
windows10-2004-x64
3.rsrc/MANIFEST/1.xml
windows7-x64
3.rsrc/MANIFEST/1.xml
windows10-2004-x64
1.text
windows7-x64
3.text
windows10-2004-x64
3CERTIFICATE
windows7-x64
1CERTIFICATE
windows10-2004-x64
1[0]
windows7-x64
1[0]
windows10-2004-x64
1[1]
windows7-x64
1[1]
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
nj230708full.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nj230708full.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
.data
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
.data
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
.rdata
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
.rdata
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
.reloc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
.reloc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
.rsrc/DIALOG/105
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
.rsrc/DIALOG/105
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
.rsrc/DIALOG/106
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
.rsrc/DIALOG/106
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
.rsrc/DIALOG/111
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
.rsrc/DIALOG/111
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
.rsrc/GROUP_ICON/103
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
.rsrc/GROUP_ICON/103
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
.rsrc/ICON/1.png
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
.rsrc/ICON/1.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
.rsrc/ICON/2.ico
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
.rsrc/ICON/2.ico
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
.rsrc/ICON/3.ico
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
.rsrc/ICON/3.ico
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
.rsrc/MANIFEST/1.xml
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
.rsrc/MANIFEST/1.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
.text
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
.text
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
CERTIFICATE
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
CERTIFICATE
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
[0]
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
[0]
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
[1]
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
[1]
Resource
win10v2004-20241007-en
General
-
Target
nj230708full.pdf.exe
-
Size
2.6MB
-
MD5
bd216fdea8517b5beb003e0ac03f536e
-
SHA1
a3f3d4395b74da605bb1e068c846ccb531213f38
-
SHA256
e96a0c1bc5f720d7f0a53f72e5bb424163c943c24a437b1065957a79f5872675
-
SHA512
57dadcbd826b9d2cd99e82d1ba5ada998219378d9c1782388de06c9a2dddc754ec32ca89682cc56e5f38dd55e1a57ce5bd5cb2482ba655ecbbd76206f353d694
-
SSDEEP
49152:ztJyfM3mq+li7JeXVn2GljPUXSrVFADPtMieH5nqwTs8X3jkXcMt:JUKmzi7Je4GljPUCrzAiieZq8IX3t
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/memory/3468-421-0x0000000001230000-0x000000000147A000-memory.dmp family_stormkitty behavioral2/memory/4132-436-0x0000000000F30000-0x000000000117A000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1092 created 3484 1092 Briefing.pif 56 PID 1092 created 3484 1092 Briefing.pif 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation nj230708full.pdf.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsabellaGuard.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsabellaGuard.url cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1092 Briefing.pif 2896 Wihnup.exe 4724 Wihnup.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2188 tasklist.exe 1620 tasklist.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\PennRemark nj230708full.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nj230708full.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Briefing.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wihnup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wihnup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1124 timeout.exe 1292 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2940 schtasks.exe 1108 schtasks.exe 2264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 3468 MSBuild.exe 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2188 tasklist.exe Token: SeDebugPrivilege 1620 tasklist.exe Token: SeDebugPrivilege 3468 MSBuild.exe Token: SeDebugPrivilege 4132 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1092 Briefing.pif 1092 Briefing.pif 1092 Briefing.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 344 wrote to memory of 3640 344 nj230708full.pdf.exe 82 PID 344 wrote to memory of 3640 344 nj230708full.pdf.exe 82 PID 344 wrote to memory of 3640 344 nj230708full.pdf.exe 82 PID 3640 wrote to memory of 2188 3640 cmd.exe 84 PID 3640 wrote to memory of 2188 3640 cmd.exe 84 PID 3640 wrote to memory of 2188 3640 cmd.exe 84 PID 3640 wrote to memory of 3232 3640 cmd.exe 85 PID 3640 wrote to memory of 3232 3640 cmd.exe 85 PID 3640 wrote to memory of 3232 3640 cmd.exe 85 PID 3640 wrote to memory of 1620 3640 cmd.exe 87 PID 3640 wrote to memory of 1620 3640 cmd.exe 87 PID 3640 wrote to memory of 1620 3640 cmd.exe 87 PID 3640 wrote to memory of 3452 3640 cmd.exe 88 PID 3640 wrote to memory of 3452 3640 cmd.exe 88 PID 3640 wrote to memory of 3452 3640 cmd.exe 88 PID 3640 wrote to memory of 4964 3640 cmd.exe 89 PID 3640 wrote to memory of 4964 3640 cmd.exe 89 PID 3640 wrote to memory of 4964 3640 cmd.exe 89 PID 3640 wrote to memory of 3440 3640 cmd.exe 90 PID 3640 wrote to memory of 3440 3640 cmd.exe 90 PID 3640 wrote to memory of 3440 3640 cmd.exe 90 PID 3640 wrote to memory of 3572 3640 cmd.exe 91 PID 3640 wrote to memory of 3572 3640 cmd.exe 91 PID 3640 wrote to memory of 3572 3640 cmd.exe 91 PID 3640 wrote to memory of 1092 3640 cmd.exe 92 PID 3640 wrote to memory of 1092 3640 cmd.exe 92 PID 3640 wrote to memory of 1092 3640 cmd.exe 92 PID 3640 wrote to memory of 1760 3640 cmd.exe 93 PID 3640 wrote to memory of 1760 3640 cmd.exe 93 PID 3640 wrote to memory of 1760 3640 cmd.exe 93 PID 1092 wrote to memory of 2952 1092 Briefing.pif 94 PID 1092 wrote to memory of 2952 1092 Briefing.pif 94 PID 1092 wrote to memory of 2952 1092 Briefing.pif 94 PID 1092 wrote to memory of 2664 1092 Briefing.pif 96 PID 1092 wrote to memory of 2664 1092 Briefing.pif 96 PID 1092 wrote to memory of 2664 1092 Briefing.pif 96 PID 2952 wrote to memory of 2940 2952 cmd.exe 98 PID 2952 wrote to memory of 2940 2952 cmd.exe 98 PID 2952 wrote to memory of 2940 2952 cmd.exe 98 PID 1092 wrote to memory of 3468 1092 Briefing.pif 105 PID 1092 wrote to memory of 3468 1092 Briefing.pif 105 PID 1092 wrote to memory of 3468 1092 Briefing.pif 105 PID 1092 wrote to memory of 3468 1092 Briefing.pif 105 PID 1092 wrote to memory of 3468 1092 Briefing.pif 105 PID 3468 wrote to memory of 388 3468 MSBuild.exe 107 PID 3468 wrote to memory of 388 3468 MSBuild.exe 107 PID 3468 wrote to memory of 388 3468 MSBuild.exe 107 PID 3468 wrote to memory of 3324 3468 MSBuild.exe 109 PID 3468 wrote to memory of 3324 3468 MSBuild.exe 109 PID 3468 wrote to memory of 3324 3468 MSBuild.exe 109 PID 388 wrote to memory of 1108 388 cmd.exe 112 PID 388 wrote to memory of 1108 388 cmd.exe 112 PID 388 wrote to memory of 1108 388 cmd.exe 112 PID 3324 wrote to memory of 1124 3324 cmd.exe 111 PID 3324 wrote to memory of 1124 3324 cmd.exe 111 PID 3324 wrote to memory of 1124 3324 cmd.exe 111 PID 3324 wrote to memory of 2896 3324 cmd.exe 114 PID 3324 wrote to memory of 2896 3324 cmd.exe 114 PID 3324 wrote to memory of 2896 3324 cmd.exe 114 PID 1092 wrote to memory of 4132 1092 Briefing.pif 116 PID 1092 wrote to memory of 4132 1092 Briefing.pif 116 PID 1092 wrote to memory of 4132 1092 Briefing.pif 116 PID 1092 wrote to memory of 4132 1092 Briefing.pif 116 PID 1092 wrote to memory of 4132 1092 Briefing.pif 116
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\nj230708full.pdf.exe"C:\Users\Admin\AppData\Local\Temp\nj230708full.pdf.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Remarks Remarks.cmd & Remarks.cmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7172744⤵
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PositionFlagsMalaysiaMissouri" Clips4⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Auditor + ..\Suite + ..\Stat + ..\Docs + ..\Islamic + ..\Sufficient + ..\Fought + ..\Petition + ..\Slight + ..\Computational + ..\Recruitment + ..\R + ..\Upset + ..\Principal + ..\Textiles + ..\Breed + ..\Peace + ..\Drinks + ..\Judicial + ..\Abandoned + ..\Morocco + ..\Berkeley + ..\Marks + ..\Remember + ..\Freebsd + ..\Pty + ..\Writings + ..\Fi + ..\Radio + ..\Workplace T4⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\717274\Briefing.pifBriefing.pif T4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF9C1.tmp.bat""6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1124
-
-
C:\Users\Admin\AppData\Roaming\Wihnup.exe"C:\Users\Admin\AppData\Roaming\Wihnup.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4132 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit6⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFC6C.tmp.bat""6⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1292
-
-
C:\Users\Admin\AppData\Roaming\Wihnup.exe"C:\Users\Admin\AppData\Roaming\Wihnup.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Employee" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardInno Technologies\IsabellaGuard.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Employee" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardInno Technologies\IsabellaGuard.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsabellaGuard.url" & echo URL="C:\Users\Admin\AppData\Local\GuardInno Technologies\IsabellaGuard.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsabellaGuard.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
942B
MD508fd55ab7b211d3fba9ba080bb93fc07
SHA13519a855c1d90857159c68422848785d68a89591
SHA256eb1d1fa6b376f369681435d4e310dc2e6e832877a6e2880640727f9390559614
SHA51261c362ac9ac9809532be0383eb239e06290b1387bc6e49e0ab0045bd7e4b904032f8def000d4b1e4800b6387c193f4ab78f8c507138030490014104cecb726d7
-
Filesize
841B
MD50efd0cfcc86075d96e951890baf0fa87
SHA16e98c66d43aa3f01b2395048e754d69b7386b511
SHA256ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7
SHA5124e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
2.1MB
MD56a16c57c66daf2a5b8ce4a5f050568ef
SHA1ce7b295e1095f6f1615eaf2ee065685105c99eac
SHA256817a9d154d06042ea6f7a7fa44db0a56386c44d9a36fcdd4185afe166c9c32d5
SHA512907d9eafe33bde5535255b811eec5b6c3a1d8e1c6897eec9e404f4af28f3f087b94a4f47a9e7b01452586220165c27a407f4e76f7dd06c464450135b512587d7
-
Filesize
67KB
MD518da19c1a6bdce0c460b4f4d1d29d11e
SHA104f6e8ffcb297e8ade3be3d8741dc6be840ae33b
SHA2560f4589de014cd500472959e710b8f4aa30ccbc6c5fae61147808a1d2b8ad01b0
SHA5125ca40f12585d90a1b0e449688e96d0423cb3118d5ad801c37c219692d7f041cee564acca8af8be83ccbcfbfbbcec4d44d2f0d1ed844776cb26d7149cdb262c22
-
Filesize
73KB
MD5c9dd3156963812c971c4330538c15475
SHA1c9d0021f8fbad189ed89bc870d7562603d67f117
SHA2561162076c38551807146ca2be943ab29320a239c7ae35e07adb30488918cf9a5c
SHA512bea3cad803c19b323efe74f10a28bbc76e5823ad3cbbdb942b462e2a35d085fcc046b5bb48a5c2b7baad527458a3a7798e4ea5a1c1df993fbd9fe5d658213c40
-
Filesize
61KB
MD53902bfe3c426128f7605d3268db36cf8
SHA158a17e8863b5109f0bd825df383ef70daf2b550c
SHA2567ed7da8a3fc15c0c5bce4dc158e5a201f9bd0838af1a5756676c6aadafbf18ac
SHA5124369b86a9b7ff550f3d026b8cf2cb6fd86a4a48c8031cf5a9f53dfa642194b6f14bcb62057839cb54c98755a937dfde76bec053d5d06d4f12ab160f50f053f6b
-
Filesize
80KB
MD57b85a8a8162983834481c2fc3977d6cc
SHA130404d1d4dfbe3374aeac976fed5ded2904cdad1
SHA2568ca02a9a6593a3bc55fdc3be6c10653ba260befc660a5e6681e0e2b82c38711f
SHA51227baf5390eadd9ea56bb51a75938ca12887b1cf858f4581d96c2ea8b4a866fd01e39b73f4f9173b95915b00c66d14c15e62bc4bac9ff0887b28a96abdc991f1c
-
Filesize
15KB
MD557c78b68607609bc35b7d1cacee2d640
SHA100af00543169e85208f329d5a72c8094698d6a30
SHA256638a6d42410c7ba571b50e1362ff409d6398bfc927ff2e59d2677f91c9e7206f
SHA512262520e6a314161508d2fa81c1590d2f7378c3da15241a6b5dcb85ff20365f65a95fa8f15814c9e11f43eef70ee192645e80894bb5e6e969342e523628564469
-
Filesize
67KB
MD5b4dccf25fc88fa917a3c8adebe421b48
SHA1c6f9abab8dbe51cb506b4de5efd66e3d652d9738
SHA256b53f6ea9bd037fe2e37548e8f86ade76b24bd96784fff770a5b16d8681708801
SHA5126b3cb87554ef4892d7ffada22792d2be15899ea41d6f7dc2adfcc49a320ab6198b94e7d60a498ed90ce89f7c0a72cc30af224cadb7e048be38bab27d0b5cb866
-
Filesize
68KB
MD54a6384a47df8ae1a3e249cc4267f77de
SHA1ab05c902702cd9183d2c1d470ad5a5e4f51615c0
SHA2563a3b4cecbbad4a93725cd9ff55a80e35dd1915d18faee7b6746ebdd049801dc8
SHA512aeace828eab93114bc3ce245415129274b846366d604fc1992c3cf7d316aef9122c214bbcb26d9899151f3553fb58f2fb2636efd33202108ec1069f6bf9265b7
-
Filesize
77KB
MD582f11e57b5a9009de28a97cd1735b6a3
SHA1fd2a5c51290b11fb66391e94fe976cc1512f350b
SHA2564556265567c0239879eca2df7e73a88185a70527cb83497c636493d9521c8db4
SHA512ec47b2a263d3636508d153eb4e3d04050f6323ca1f5fbf53dfb40a3bf2da7ebbd271eb69e06317804f5f8f673c3f9084af6ba0140a29bffdbafe81ba361c5364
-
Filesize
87KB
MD5e85921ec65740070d67cdd40549386fc
SHA1460505e79c5c6a8b42889fe6ba53662c6fb92fb2
SHA25606fe58bae3a43f1de0c6fe2bc93f85f84f9af0fe9592be31f07a26b2572e454c
SHA512f1d55a2550244788e2ba5869f629adce329830ca0eb3e28f7f3c3441f4c7b32706860eae3e63ae07ea81f643b1179b0e9b0c95745c290516c022598e38612787
-
Filesize
69KB
MD59b34585894eb1ccdcd82b169006576ec
SHA1e7ae9f1530c731e810e163260c9a9866dc8a3a28
SHA256fd42916f715812f39b907a28f5aec9b77c4948ca050a65f2be6828a3c42cb8d0
SHA512d6bd33599fbd5bde5e5ae84e8179f87b8c9a5412d8612bd8329f87dcbee9ad8d9e064fe3a6f516333beff2c6e8692b3617c68682c17be22b271f1fd958871ba8
-
Filesize
86KB
MD5dfbfd7310e2dcdbb9a4a505f1cc3effb
SHA1ee6f84566c3661996545dc3e094b10c36c91646f
SHA2564945f470c9a6ffc50a4b89c1c61e733f03d06703e6aafbf13608df267554dfb0
SHA512381097a8cafbb7f7d3e110afc0d202f25a1e5868aea9c9829b4d877ea5367ebe663da57f4127b0a2490547badbbbab8426eed461e5a0401a9498dba87a5146a0
-
Filesize
88KB
MD5a772dd8dff2b5b0adc48e248482fcf37
SHA1f31ecba21d5955bd3db62a0ee43a1f70fbe9c867
SHA256d8283ad6f03e09b6df2790c9e1fe9a6eac19337dd340c81fe129b8e1d66530d8
SHA5128febb5daca59b8825970fce3324ab93045a8f406c59cf91df5227c693e7cfe2e434659398a6e884d79c6e288c6af84939aa8363859b4ea15554e6d6834e4fa3a
-
Filesize
90KB
MD5896532d212f45cafd8788647f58ce42f
SHA1168ba160fb14ae66180138f03f269b34915d012e
SHA25671c77a0c4e572d7290eba86941f04a740441429ff354fa2c9cbbdf8a79eff34f
SHA5125280cfa0f40a9c23b40b385837dc1b02556a3d660b685f24106c440617f11ed50378543df281cea6bf7ac7ee10fe02b948645eff24f54d36cc36832badce2c8c
-
Filesize
62KB
MD5735197be3eea32cf6383951c62c35613
SHA193690fc284ad422d344b85cc7b089b0a651bb59b
SHA256074c900354fc81a5b32e3bb1b920445dbcb213b41a31735aa0be98f362bd8861
SHA512a2f3edc573376c3f7135282d73f8f4e69c9551840fa4c30197b758dcae0743eedbdb64a5d83ff70eeffa1ca53f84c48e498234a71080ae44a16ef3dcaca37d04
-
Filesize
74KB
MD5cc57dbf4daece475d7ab8dcbc8d8f56d
SHA1c31fc58ab9d86e69b3659afb15e5e626412a06da
SHA256e616e843609c56443ed9af172579ead8b2c0cff92284eec494d8843d96475627
SHA512a6a7c14a1f3481f6d6df76e720080f6ae381ba8809518141fd3965e1c82845a3b92fff7ab71ce27229a088871b14ab69661635f64d119a2e57ef654c6a0ce227
-
Filesize
88KB
MD544718b0d9cf17639c3c67a385319956b
SHA1194b64dbf82abe34f83671a79dea9c0d9c14f346
SHA25631038f4a3a516d38c9b5bdfb872ac67fef3759745a4201d53526a1cd792a82a8
SHA512c634e3f9d9c711a56f72d89205914ec8086beff6b2ff02c0358b11a3ce7633b9c3a420e9beb41dcc728edc4e35e86d3562552babd6a00cb3e094d7db9addfefc
-
Filesize
72KB
MD5940dcd93266c885c245f0bb43848a82a
SHA1f4c265da0aab95031446c382de1dfb6a33547a4b
SHA25645fb600e9e36eea5c30cb6a41b1e693a533dd4805c687059ff3529eb6e40538b
SHA5120a776a5a7309e3497f502eb2c6cbeb21fe3af67c28157d5ff353edec2262c013ccc79204c2e207645c0647ba4c14157d2aa55f271ef9e23bd2ceba8d100481c7
-
Filesize
67KB
MD539038c8d2bcae0ee7248712c8f76f2ac
SHA12081469f02daa1fb6ec92041695800c38fb7672f
SHA256b4fefc16a5d54c809c7fd250afeaf15f334c5b9aec634db49d854f2881b04a39
SHA512b34c563a4a6f68ba7f4facaa418c7c615cf82777e6af2621e6d18a50616988d99d7bfa34265d10127e572beaa82f1eeab5ceba09c82f649068328bf76d49c5ca
-
Filesize
57KB
MD5d97d8500cd803acfcb2c25d234a50118
SHA1de934752632cd51db7975280d8d8aaed17de50ba
SHA256d9f10397fdc297971c8962f34b5db38c8f4cafe54b6eb58f144095879bccf23b
SHA51204ba974a85c8861d3d59b71e1d21edb3a20f30cf8afc7db20f41f1f62a4c411647d224d75145e6ed784805d2a94b32fc54adfdc64af511da081c4ed1b03cfddd
-
Filesize
61KB
MD5637589d295f6c230bd08ccbcb4e7e20b
SHA11882592646a956a9b29818d2da15a84b3b9fe75e
SHA256d7906db911ca0193e8d1e9572f22854a8f04777d34be7aa9bc15e4ee97824b8a
SHA51277e9381c3c26a10349c27568b4c2d63708efcbdc31eb49246b8332500b1beaf632726aa3ee2602bb91dfb1457d8eb910492f9da73d13390de71696216bafe424
-
Filesize
82KB
MD5b521d7fa82a96a9e37a487e321129a4b
SHA196b24fa878f58e9b5f3e275a4ec9922d1b09bdb6
SHA256b4cb548251f03db83eba1ce5cf4503659a31410d6949068dc8dfe0cf43cd00fa
SHA512258ae0c06a46ecdd272f05fdf81186a1dbf8b6f670393e8730e45ca836ff685e12771d04cf00a087c51dcf404ff6e7e3994b38cdb8ee8e3b137a58dd05373d2e
-
Filesize
60KB
MD5a69710ad34f4bf7c0932cb24b9e0ed02
SHA1586d0c24209158024044314eda5147f55cdf8151
SHA25606b90db0f9c2439cb3e64bef36149ebce3243109bdef48ee01cdbf4c4d66c2f7
SHA512304a5a34983616954f8d65e15c69353195ede7a5ca14b4999d4006c164583f574f9fe90e2138da56e610f1a9958b6e5bf9b3f4b5e13a9f24a87a865f308d0692
-
Filesize
906KB
MD5d0c7b81f3b20301582a8df4c51a5655a
SHA19148ec2cf20061ae80a9e38df791e7051d5453fd
SHA256842d02703c597877661b6ac434547d6d490fe6c10deff3e7532c6b3d95c52186
SHA512c0ae6d4b3f533d2634cceb2454833443364608f1646600c306a13e8b1e81deee77b0664b263146bce594bb55b9606d9e3d2474126518a939ae2f21d5c7b05a24
-
Filesize
17KB
MD52b45fc31b2859f9e44bb3fd335c15394
SHA113fb50e19fdf5f8a4dd2132419be321e71f2800e
SHA256ee96a8343930cb044f37982401528d91a7766e6dee0e88d3b82379fbc7f7b00e
SHA5123138578f4fcb46f4eb80a4222b4ab0b0c802551da5fee9efda5c9e4251b0e4aafaf59b63eb974f54c858aeee497a377fdb81bf8ad8e6508af121f359fb038d37
-
Filesize
88KB
MD5f799d842d9351d2c86f0db882599dfba
SHA1bcf6b430952aad9f0cc6096e98d63ccac7a2540c
SHA2568f64f1856cda02ae9276e6ce7b5b64aec5d4939af919b9b7f79e5540d8b7abe1
SHA512e2bb382115efb7075a60c2aa79684a29f3b0cef121e0dcf56f9f7f27bba9e0a29138497bd0335110d4e9ba2b041923bbdbe7d40f4e6738d7c4bf98c646400a38
-
Filesize
56KB
MD5996f9b329e5283c05e6e9cfa66d3a63f
SHA1cd24010d87b4d5623b095214c620ae2cd75d049c
SHA256f9d3852383fb0594426f488afc52e361570c6b8155b3c30e84f05c2bcb94dc6d
SHA512259242a94650baa21d1bc64bea1b6306d0937c079bf91052a0b3af13f693a54519b6d21871e9af576475832146b436ed33ac12be1a3c0ff0933c5c1e4164639c
-
Filesize
63KB
MD50e8173eef663ba40991fb667600ecf95
SHA118a548686ccd5c544b02bb7dde5cf914e5166084
SHA2567b667b26889182e04c5e436eb7083e1c3847c0a3066fb5e778cc77357ef6632d
SHA5129c859f1deb29fba79a9e108df0a3c9199fa0d0439272bdae690f273a3c373de0171d3211713e3a03f8de245c8f703acd63b2721c244c2a4567a19dea0731cc4f
-
Filesize
98KB
MD57645204a3617032fb1f45eb0a93b66b7
SHA12e2f69385b9df56b6217b5dfdc1608bd73f58bf4
SHA25625e5d95b5c8814c9f21c6d18b6e13d1969795c6d7ccc88751caa969abf1dc678
SHA5127cab09f66bf7b8e38cd85f7180860c57d9fa63c020f508d6b7805765d55b3f0d96d31a360753c1a0f94fcaa0b101077076d95197a6a85d4646f220c4adb4d96b
-
Filesize
69KB
MD57af81514cb520c518e7f3c4bb743227a
SHA10f500950bcab9037ad12e47fe53a15d057ffb383
SHA256af11f6ce725b3a38bcdf8d7bc0251762c4b360f13fd1dd9d5e7f6f0a9e432610
SHA512f51565d012871e44d707c67ad7bd9318abf1a1a4197dcfd61d027135f452cd8ca1cda67581084e0f56391c52307a81d2b04d179347b9e482daf979a79216e7d2
-
Filesize
53KB
MD5556ada8916c5bcb381534f3bd45bfcd9
SHA1128995a8410d03643287b89a96d41096b0a51a0d
SHA2569b93972c61a346d132b7a7e99461f6d1e1c7abe4f84fa08f47118bfdc60fe2f9
SHA51255263f77498ecdd5de07356baea52771c201a56dacee6ef2e7e6d5e4f6734a829ecd351207609d3f53643748048c812268f46c11e4e4f283b09738d81a25ea95
-
Filesize
66KB
MD5e8443d7b438842b8a6b236a9b9fd55f1
SHA12963fb03777c344809df505c141feecbd0ce0246
SHA25623eefa138447816ed41edfbf1d065a38ddf1d501a024a25f2d2c4a8275ac3a60
SHA5123c6e8a01bf609f08593bbcf1a4b317a5b12a3ba64ad4dccb4abeeefb2d9b1590e446d7a7fbe1d826e2e59e5b6d3de44dba7632530f4b738a702006f9f05ae14a
-
Filesize
1KB
MD5d851f9ac6b3a85cc5867a8fb505ca14b
SHA19bddc727f55d63d1c65f196fa421970b9f670334
SHA2562c36b36bd475f5ba2926eb570d2bbadc8a248ea0f21a15b82511c737e3ec1358
SHA5122f8fa47349f1136eeaa3a5bc6ccb78945dae1c475eedded3b1ac01d035f28b920f7f6f50292a86ce9e7cdc4ffd1743ae28989359adf9bc727012a39bbf97f129
-
Filesize
91KB
MD57a9c73df748595a4c8234e8af5b0659d
SHA18153a322dfca222e0bfd795fc18a2679314e22e9
SHA256d233c7dabd1eabdb771671cfce90075e817edc868492e14d560f51b99d337b4c
SHA512650fd7e05f2aabcad60864a1be9e3293d503bc993712461443510eccf0477a3b9f754871ad2183f69a2b38f4238e3a0b1baaadab97dcce00af0670fa96c1abdc
-
Filesize
150B
MD50a97a0962e500b3135eb13e6740e95ba
SHA1db2a8ef8d9850499da9eab9bf478dbb7477d45d9
SHA256fa9cad709711952704391721ec1e11b787c8e03e366444784c88159ce2b368b7
SHA512d8fa7aa51b6cc789199c6dbba92255d8d9875bc56889e891984c5a1847db4e0b87baec24e5f02b09dc42de0c9e18085d6abfe37b773fd54328c093b690b09214
-
Filesize
150B
MD576315dd8a8e0dd96f531ac2f1c34d77c
SHA1aa148b695f0ef1ca9ebf3f98115dcda0d4c16d8f
SHA256cacef9d51592da70947f5dee4c1a6fb30caee5bcdfad1040e38692dfcfeae307
SHA512cb18689536baa44fe5f49dd6a718406e966b8c6a4368ca8e057545b1e4c04224dd6f513ea12de497d9c820091add5aa34e1c655419883b26855699e9d13fa059
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be