Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2024, 11:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ggggugeliulanqGoogle1217.msi
Resource
win7-20241010-en
General
-
Target
ggggugeliulanqGoogle1217.msi
-
Size
54.3MB
-
MD5
afbf73c1469b3641f62cccb2b0bb178a
-
SHA1
633fd0c782856aba35f718c6806a8693fc2a5689
-
SHA256
e308b5f5029ee8f51f866beee18370456632409cd34a77e7992ae82ab282cdb6
-
SHA512
b92be4412e560f3103252a98371c9e0b1a5fde0aaa1016a146988dd0a34acd7d8f43aefcfdd6dd4d53c6058ff5a2b649ae35402996a3b4db2557b010923eaa6b
-
SSDEEP
786432:kErzXzCnli5q0Nl+nIgX9mt9Pfn8qjeoiMyIDbbLJsaC+lLft7NmkudZ0/4YTx6V:RrvCnMjkmjfn8qjem6Rat7b4kl/F0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1260-91-0x00000000023C0000-0x0000000002561000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1260-91-0x00000000023C0000-0x0000000002561000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
resource yara_rule behavioral2/files/0x000a000000023cd2-78.dat aspack_v212_v242 -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: NtHandleCallback.exe File opened (read-only) \??\M: NtHandleCallback.exe File opened (read-only) \??\W: NtHandleCallback.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\H: NtHandleCallback.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: NtHandleCallback.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: NtHandleCallback.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: NtHandleCallback.exe File opened (read-only) \??\Q: NtHandleCallback.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: NtHandleCallback.exe File opened (read-only) \??\X: NtHandleCallback.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: NtHandleCallback.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: NtHandleCallback.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: NtHandleCallback.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: NtHandleCallback.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: NtHandleCallback.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: NtHandleCallback.exe File opened (read-only) \??\O: NtHandleCallback.exe File opened (read-only) \??\Z: NtHandleCallback.exe File opened (read-only) \??\U: NtHandleCallback.exe File opened (read-only) \??\I: msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Google.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4188 tasklist.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Installer\e58659b.msi msiexec.exe File opened for modification C:\Windows\Installer\e58659b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI6618.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{05490FD0-9F52-4C7B-97A2-05CC070D8E03} msiexec.exe File opened for modification C:\Windows\Installer\MSI68A9.tmp msiexec.exe -
Executes dropped EXE 7 IoCs
pid Process 3844 Google.exe 1356 DingTalk.exe 2020 kail.exe 1260 NtHandleCallback.exe 3664 setup.exe 3360 setup.exe 2880 setup.exe -
Loads dropped DLL 8 IoCs
pid Process 3120 MsiExec.exe 3120 MsiExec.exe 3120 MsiExec.exe 3948 MsiExec.exe 3120 MsiExec.exe 1356 DingTalk.exe 1356 DingTalk.exe 1260 NtHandleCallback.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3100 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NtHandleCallback.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DingTalk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NtHandleCallback.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz NtHandleCallback.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 2388 timeout.exe 2100 timeout.exe 2180 timeout.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3904 msiexec.exe 3904 msiexec.exe 1356 DingTalk.exe 1356 DingTalk.exe 1356 DingTalk.exe 1356 DingTalk.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe 1260 NtHandleCallback.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3100 msiexec.exe Token: SeIncreaseQuotaPrivilege 3100 msiexec.exe Token: SeSecurityPrivilege 3904 msiexec.exe Token: SeCreateTokenPrivilege 3100 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3100 msiexec.exe Token: SeLockMemoryPrivilege 3100 msiexec.exe Token: SeIncreaseQuotaPrivilege 3100 msiexec.exe Token: SeMachineAccountPrivilege 3100 msiexec.exe Token: SeTcbPrivilege 3100 msiexec.exe Token: SeSecurityPrivilege 3100 msiexec.exe Token: SeTakeOwnershipPrivilege 3100 msiexec.exe Token: SeLoadDriverPrivilege 3100 msiexec.exe Token: SeSystemProfilePrivilege 3100 msiexec.exe Token: SeSystemtimePrivilege 3100 msiexec.exe Token: SeProfSingleProcessPrivilege 3100 msiexec.exe Token: SeIncBasePriorityPrivilege 3100 msiexec.exe Token: SeCreatePagefilePrivilege 3100 msiexec.exe Token: SeCreatePermanentPrivilege 3100 msiexec.exe Token: SeBackupPrivilege 3100 msiexec.exe Token: SeRestorePrivilege 3100 msiexec.exe Token: SeShutdownPrivilege 3100 msiexec.exe Token: SeDebugPrivilege 3100 msiexec.exe Token: SeAuditPrivilege 3100 msiexec.exe Token: SeSystemEnvironmentPrivilege 3100 msiexec.exe Token: SeChangeNotifyPrivilege 3100 msiexec.exe Token: SeRemoteShutdownPrivilege 3100 msiexec.exe Token: SeUndockPrivilege 3100 msiexec.exe Token: SeSyncAgentPrivilege 3100 msiexec.exe Token: SeEnableDelegationPrivilege 3100 msiexec.exe Token: SeManageVolumePrivilege 3100 msiexec.exe Token: SeImpersonatePrivilege 3100 msiexec.exe Token: SeCreateGlobalPrivilege 3100 msiexec.exe Token: SeCreateTokenPrivilege 3100 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3100 msiexec.exe Token: SeLockMemoryPrivilege 3100 msiexec.exe Token: SeIncreaseQuotaPrivilege 3100 msiexec.exe Token: SeMachineAccountPrivilege 3100 msiexec.exe Token: SeTcbPrivilege 3100 msiexec.exe Token: SeSecurityPrivilege 3100 msiexec.exe Token: SeTakeOwnershipPrivilege 3100 msiexec.exe Token: SeLoadDriverPrivilege 3100 msiexec.exe Token: SeSystemProfilePrivilege 3100 msiexec.exe Token: SeSystemtimePrivilege 3100 msiexec.exe Token: SeProfSingleProcessPrivilege 3100 msiexec.exe Token: SeIncBasePriorityPrivilege 3100 msiexec.exe Token: SeCreatePagefilePrivilege 3100 msiexec.exe Token: SeCreatePermanentPrivilege 3100 msiexec.exe Token: SeBackupPrivilege 3100 msiexec.exe Token: SeRestorePrivilege 3100 msiexec.exe Token: SeShutdownPrivilege 3100 msiexec.exe Token: SeDebugPrivilege 3100 msiexec.exe Token: SeAuditPrivilege 3100 msiexec.exe Token: SeSystemEnvironmentPrivilege 3100 msiexec.exe Token: SeChangeNotifyPrivilege 3100 msiexec.exe Token: SeRemoteShutdownPrivilege 3100 msiexec.exe Token: SeUndockPrivilege 3100 msiexec.exe Token: SeSyncAgentPrivilege 3100 msiexec.exe Token: SeEnableDelegationPrivilege 3100 msiexec.exe Token: SeManageVolumePrivilege 3100 msiexec.exe Token: SeImpersonatePrivilege 3100 msiexec.exe Token: SeCreateGlobalPrivilege 3100 msiexec.exe Token: SeCreateTokenPrivilege 3100 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3100 msiexec.exe Token: SeLockMemoryPrivilege 3100 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3100 msiexec.exe 3100 msiexec.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 DingTalk.exe 2020 kail.exe 1260 NtHandleCallback.exe 3664 setup.exe 3360 setup.exe 2880 setup.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3120 3904 msiexec.exe 85 PID 3904 wrote to memory of 3120 3904 msiexec.exe 85 PID 3904 wrote to memory of 3120 3904 msiexec.exe 85 PID 3904 wrote to memory of 4384 3904 msiexec.exe 108 PID 3904 wrote to memory of 4384 3904 msiexec.exe 108 PID 3904 wrote to memory of 3948 3904 msiexec.exe 110 PID 3904 wrote to memory of 3948 3904 msiexec.exe 110 PID 3904 wrote to memory of 3948 3904 msiexec.exe 110 PID 3120 wrote to memory of 3844 3120 MsiExec.exe 111 PID 3120 wrote to memory of 3844 3120 MsiExec.exe 111 PID 3844 wrote to memory of 1356 3844 Google.exe 112 PID 3844 wrote to memory of 1356 3844 Google.exe 112 PID 3844 wrote to memory of 1356 3844 Google.exe 112 PID 1356 wrote to memory of 1312 1356 DingTalk.exe 113 PID 1356 wrote to memory of 1312 1356 DingTalk.exe 113 PID 1356 wrote to memory of 1312 1356 DingTalk.exe 113 PID 1312 wrote to memory of 4188 1312 cmd.exe 115 PID 1312 wrote to memory of 4188 1312 cmd.exe 115 PID 1312 wrote to memory of 4188 1312 cmd.exe 115 PID 1312 wrote to memory of 4828 1312 cmd.exe 116 PID 1312 wrote to memory of 4828 1312 cmd.exe 116 PID 1312 wrote to memory of 4828 1312 cmd.exe 116 PID 1312 wrote to memory of 2388 1312 cmd.exe 117 PID 1312 wrote to memory of 2388 1312 cmd.exe 117 PID 1312 wrote to memory of 2388 1312 cmd.exe 117 PID 1312 wrote to memory of 2020 1312 cmd.exe 118 PID 1312 wrote to memory of 2020 1312 cmd.exe 118 PID 1312 wrote to memory of 2020 1312 cmd.exe 118 PID 1312 wrote to memory of 2100 1312 cmd.exe 120 PID 1312 wrote to memory of 2100 1312 cmd.exe 120 PID 1312 wrote to memory of 2100 1312 cmd.exe 120 PID 1312 wrote to memory of 1260 1312 cmd.exe 121 PID 1312 wrote to memory of 1260 1312 cmd.exe 121 PID 1312 wrote to memory of 1260 1312 cmd.exe 121 PID 1312 wrote to memory of 2180 1312 cmd.exe 122 PID 1312 wrote to memory of 2180 1312 cmd.exe 122 PID 1312 wrote to memory of 2180 1312 cmd.exe 122 PID 1312 wrote to memory of 3664 1312 cmd.exe 123 PID 1312 wrote to memory of 3664 1312 cmd.exe 123 PID 1312 wrote to memory of 3664 1312 cmd.exe 123 PID 3664 wrote to memory of 3360 3664 setup.exe 125 PID 3664 wrote to memory of 3360 3664 setup.exe 125 PID 3664 wrote to memory of 3360 3664 setup.exe 125 PID 3360 wrote to memory of 2880 3360 setup.exe 126 PID 3360 wrote to memory of 2880 3360 setup.exe 126 PID 3360 wrote to memory of 2880 3360 setup.exe 126 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ggggugeliulanqGoogle1217.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3100
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 22450C16D189B8F509B80C277A457B96 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Public\Documents\Google.exe"C:\Users\Public\Documents\Google.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Public\Documents\main\current\DingTalk.exe"C:\Users\Public\Documents\main\current\DingTalk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.execmd /c C:\\Users\\Public\\Documents\\FANG.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "IMAGENAME eq NtHandleCallback.exe"6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\SysWOW64\find.exefind /I "NtHandleCallback.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1 /nobreak6⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2388
-
-
C:\Users\Public\Documents\WindowsData\kail.exe"C:\Users\Public\Documents\WindowsData\kail.exe" x "C:\Users\Public\Documents\WindowsData\me.key" -o"C:\Users\Public\Documents\WindowsData" -pkillstartup -y6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1 /nobreak6⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2100
-
-
C:\Users\Public\Documents\WindowsData\NtHandleCallback.exe"C:\Users\Public\Documents\WindowsData\NtHandleCallback.exe"6⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1 /nobreak6⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2180
-
-
C:\Users\Public\Documents\WindowsData\setup.exe"C:\Users\Public\Documents\WindowsData\setup.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\CR_55942.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\CR_55942.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\CR_55942.tmp\CHROME.PACKED.7Z"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\CR_55942.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\CR_55942.tmp\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=70.0.3538.110 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2d8,0x2ec,0x716548,0x716558,0x7165648⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
-
-
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4384
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F7F85CF4D8B6FA3308E821FC9E94A38E2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2448
Network
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.158.22.2.in-addr.arpaIN PTRResponse19.158.22.2.in-addr.arpaIN PTRa2-22-158-19deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestx.zbj888.topIN AResponsex.zbj888.topIN A206.238.221.79
-
Remote address:8.8.8.8:53Request79.221.238.206.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.221.238.206.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request213.143.182.52.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
19.158.22.2.in-addr.arpa
-
58 B 74 B 1 1
DNS Request
x.zbj888.top
DNS Response
206.238.221.79
-
146 B 146 B 2 2
DNS Request
79.221.238.206.in-addr.arpa
DNS Request
79.221.238.206.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
213.143.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55ee94d10b0c78f7102946f13b0f98bc7
SHA1c2969ecfdf0873cb00fa77d92484bb3a5927bc53
SHA256f27b821fb2a5760d4f7e76c74d64a8bd147f88591cb99cd4b56313f0a17fa52c
SHA512fa00063d3711eb18fd62d4fa74e498ac314221bf4c93aca354fd27611b9e26d7b48b8fe72ddff3a5cfe229db872c8c87a4a70947185b67847816cd293a480d14
-
Filesize
2.0MB
MD5f4b59f1167891f6a7ec181e1aa0a8d8b
SHA141be9ee189473dfe82e56267a9f6594e825e8dfd
SHA2564dead65e1a1fbac3245182c6f7b40b5c568a2a7a7fd5b3a2d642b1919dcb93ea
SHA512f352d37a9fe278686df67f1485663110ba46535f9fd3b55867ec23a0dd5a6d64e1247bb0656470b45dc85d1d0d4bffa4ccdc296d799d7f7786f93f628b6e2ac8
-
Filesize
79KB
MD59a4968fe67c177850163deafec64d0a6
SHA115b3f837c4f066cface8b3535a88523d20e5ca5c
SHA256441d8c2ee1b434e21b7a8547f3c9e8b5b654ed7c790372d7870c8071d3a9b6ab
SHA512256d1173b794bda93adece3bf2689c6875a67a8690139587c271f5c7a45f2a397caf164a4a05f34c9710ce65c7f473243c05be35155d130406999a834fc7643f
-
Filesize
2KB
MD5ae2fd0aba2183a123c840c0afd0551c4
SHA105b11a559798fb6c6b39079608dcb9c7c0d32580
SHA256f6608b596458955ae7feba0b192b31fe6e2f1fbe8fb6dafb5843339ac7bb966f
SHA51277991355217dadbe04bf98a4d655bcf2576f3960a98467a1f6710180bc11d56558e406c1aa74525a67b4bb1cdc2d54c57d27e41202f3450c3ee2ccc02f1493aa
-
Filesize
3.9MB
MD5627e4a4ff89ecb9fd9c812a8d86b28c3
SHA10a8fffcf73bdcb8e0305225c9fcdf73947c59954
SHA2562bd7ca5ee774736af3c23d30c400b416d6ac41fc814d6f9f239eb1e7be599eb3
SHA5121f393b4e7ae4b26fb7bc094049983cc6a2d68f6ba99cc1ccf77610edde2f51d9b16b76b48bdf2a65f7fe2c3da9cd33013f8565c64a40a4ac593a30ba9b8b897d
-
Filesize
121KB
MD556995ed5b0877b7c024badde6ff255de
SHA1f33016ed1a87a8e3dfacd50740325aacfba036a8
SHA2568c034147471bed12edcc13ed525eb17ec6b6f9197108f4d97f89fa05112499d9
SHA51268a9ed254d394517315d4c78ecacb4079dd00c501bad3a67257b49de3c60a3de3a8d5056d0363420990e371030a9521f955405f9904448fd64f27fb2fbda8d3f
-
Filesize
150KB
MD5157b89f140fcdc2fa6d0990a3cf29560
SHA1bcdfb7aaf53ca6cea2b5a75e6c398efe6eb0dab9
SHA25663a34aaf8e991e67032e02de652f1f7a8f746a7bff5f196c507732192b6dcaf1
SHA51226c893e50f6cade2148413ff552418c8f9fac685152b6f1916a74bd8a333cb85026a56afe1cd47e518fdc014f29779372e036a63fe102077b684ec8e6ef3341b
-
Filesize
1.3MB
MD5aaba2e8d60314ca07d8b62fdfe5cc3ee
SHA19fa85d0832f34b0ba1a8580a074a688004f9e1fb
SHA256886905a6cee8ae4b352e5285e9c38c6d5cdd6d2374c383b8b62e6ea5825c5c4a
SHA5129113078dad1d225b75db60d568a2ac4402caa36d715f8aba27d37b2af4e2629c24d960a84335bd9a3d399d93eca54c84298d01d0d48ea040fd38b4e1bb2ddcf3
-
Filesize
1KB
MD55dadb16abae0cb3b806b3f5a655ed50f
SHA1cb0d60063c5a202cc39032889742f090bd799309
SHA2569718211c0b0a7923aa173b10b6ebf6bd0a2a9ded3ed17e415d05292827a95a8b
SHA512404a6de46995f659c78d541984d34e955d82fef87f757588156722dc7ed4845cc86af46191cc3ef76770ff52bf289680076d8ab21a3205c1d3f4304339007842
-
Filesize
732KB
MD542e83bb2537a79b17e13dd936ec2fef4
SHA1688ac633d0b61fd698459a55d9909164c04ef56e
SHA25600f85beb322fe51ab3a3b88abcbbbe40f019a7ee53498e27a507da6824adaf76
SHA5124d07e73371c4e0d24bb9a351c55e20738b61e8efd6f304ecfa1041a5d94a984a2b292648cac5bf831aba345ccf15437334fcae5c91f1032cf7385ebb3a74857c
-
Filesize
49.8MB
MD5e5735b95f35985f9819bf8f47b857482
SHA19c0fd34821b004124bb97180268ba0c86feef12e
SHA2569a59260ff9b1ac88a5c75ed77524b4dbdf24bff78ea512a7c81d39e8b694ab51
SHA5127c6b5a216e60eb391824fb02b7a2b8c202fdcbb3d41c38cbb034dd78923a5539e900a2fac269092df487135c36eadfb79a59781ad384036224e2bbd1ec8109fa
-
Filesize
128KB
MD5a018ed8eae43df148a0e4b7e08fac02d
SHA1eda9b1249e3c19468e128a81dcc0b4043b9de3fe
SHA256e2e7e20adb4ce0f9ec8eabe6b651e70881cb2c83ebb5be2c681c62b53849343c
SHA512efef4ab4fe15794977426ff793007dbd3bba09776a1e18175b73e7c52813c751bbf430cccdfebb1b8600203e51db46eb751b364b32acf6c81979b9ea41b0b374
-
Filesize
1.1MB
MD55a512d1a8eaf18c367a0c15ff11671b7
SHA1b360a012e70d5aadc7a4687621270bb97396e3c7
SHA2563ea37f077bdc72b4e1deccbb591bf9a319eeb2f132f067f87d7e1dd30034080e
SHA5126309982639b05b9794183591575dd9afbd901d5aa50078db18106503520fe47ed434ca407dbcd14cbf8ec600567620e861b0e545429e9cbab9002a286ea5b693
-
Filesize
353KB
MD5175ea664f62cdc31949d29a9a3ecd4f2
SHA13b8904f28c0e36b9aab2cfeacf2516d47dd3beae
SHA2561980bff5d376f07c7f01a6301f60d2012a90e84c2f9095ef4c1def3cbfcbe25b
SHA5128a16e53afe3a086140887df18e7df220856935c3941bc7e4f51066898764887d1b574ee7944e3d4f71c4382b1fccdee969704a5ead0061eac603f6d8fa02e09b
-
Filesize
24.1MB
MD5925e6723908b88eb45a2b87b8e6f7553
SHA1100b4c5dd400ba5ef5ce8d482f7367727f37a185
SHA256b898e42795d4eaa7600d072e9692cf48cddcf96841a34aa35b755dede008863b
SHA5123f1db15dfd5a63d7202d7336ad75abbfb80d95105e139a7e48935c13d41ffde707175ad042583e2cddf3ad3d75e6a6fd6ace06097af9619e551fb72df63cd648
-
\??\Volume{625ed6c4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{d8e2dfbd-734d-4684-96b2-81f0fdf61361}_OnDiskSnapshotProp
Filesize6KB
MD51ab2be2dd0d6e115de3d03f1ac82c66d
SHA1b329185148b87d64c7f694cb6760229ed58e03c5
SHA256407202afcb8af53a337b66009c5c76e4bb67d997edafee4142684807c53c42b6
SHA512df4cd88a0e09b5402021370060d5fb9b3e71265a76715bc70b966e0510c4b984540b41ca5c6a2bad353e075400a8398872d1eccf6eac8ea885800ba58c843b7c