Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_49ad58b15a86127a570834164851a3df1132e2ec578b2f6bc1c5185aab7ca7a7.exe
Resource
win10v2004-20241007-en
General
-
Target
setup_installer.exe
-
Size
8.0MB
-
MD5
d79f4e5eceee0a9b3645514cc509098b
-
SHA1
474424ce06fbfc3c5fdcb875aecf81914e2916b6
-
SHA256
f5edf6fa082dbb5d2c78faf436fbc3d44df12e7edf3a7d9c4f144f400be89ebb
-
SHA512
37db11efa0662221014f228d71fd9f226bae68522a8525e0d05fcd4cc5ffa75cac491e72853020ea4e83077dc5a3169c29b60b73633e11fb1da5657be5142acc
-
SSDEEP
196608:x9fjrq8ySlNVV/fQocAKLBuqI/O/d9iBANQOnLuO3vXhBijG:xhjrq3SlzFfPcAWBHTiMQ/+PDiq
Malware Config
Extracted
nullmixer
http://624e4f01d3a8d.com/
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/vsdh41/
Extracted
smokeloader
pub3
Extracted
gcleaner
31.210.20.149
212.192.241.16
212.192.246.217
203.159.80.49
-
url_path
/software.php
/software.php
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral3/memory/912-160-0x0000000140000000-0x0000000140692000-memory.dmp family_fabookie -
Fabookie family
-
Gcleaner family
-
Nullmixer family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Socelars family
-
Socelars payload 1 IoCs
resource yara_rule behavioral3/files/0x0005000000019238-150.dat family_socelars -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2568 powershell.exe 2560 powershell.exe -
resource yara_rule behavioral3/files/0x000500000001925d-50.dat aspack_v212_v242 behavioral3/files/0x0005000000019240-53.dat aspack_v212_v242 behavioral3/files/0x0005000000019278-58.dat aspack_v212_v242 behavioral3/files/0x0008000000015fba-83.dat aspack_v212_v242 -
Executes dropped EXE 18 IoCs
pid Process 1836 setup_install.exe 1832 624e4f04abaa7_Thu02b4f4ab3a.exe 1144 624e4f0934f6c_Thu02042b3162ca.exe 2664 624e4f02be608_Thu02e613347dd.exe 1484 624e4f03a9e4c_Thu02a659c88.exe 1924 624e4f04abaa7_Thu02b4f4ab3a.exe 1612 624e4f1010d03_Thu02f08f6e.exe 896 624e4f13e5282_Thu02162f030.exe 2100 624e4f14eb481_Thu02f311ad437.exe 2192 624e4f185fb1a_Thu02643e91db.exe 2296 624e4f07974db_Thu02a5a7728.exe 2836 624e4f0c17da5_Thu02dc0a6b71c.exe 912 624e4f1298c47_Thu028bba903.exe 776 624e4f14eb481_Thu02f311ad437.tmp 992 624e4f13e5282_Thu02162f030.exe 2940 624e4f07974db_Thu02a5a7728.tmp 1992 624e4f07974db_Thu02a5a7728.exe 2476 624e4f07974db_Thu02a5a7728.tmp -
Loads dropped DLL 64 IoCs
pid Process 2084 setup_installer.exe 2084 setup_installer.exe 2084 setup_installer.exe 1836 setup_install.exe 1836 setup_install.exe 1836 setup_install.exe 1836 setup_install.exe 1836 setup_install.exe 1836 setup_install.exe 1836 setup_install.exe 1836 setup_install.exe 2552 cmd.exe 2552 cmd.exe 2704 cmd.exe 2704 cmd.exe 1832 624e4f04abaa7_Thu02b4f4ab3a.exe 1832 624e4f04abaa7_Thu02b4f4ab3a.exe 2596 cmd.exe 2596 cmd.exe 1144 624e4f0934f6c_Thu02042b3162ca.exe 1144 624e4f0934f6c_Thu02042b3162ca.exe 2756 cmd.exe 2756 cmd.exe 2664 624e4f02be608_Thu02e613347dd.exe 2664 624e4f02be608_Thu02e613347dd.exe 2664 624e4f02be608_Thu02e613347dd.exe 2664 624e4f02be608_Thu02e613347dd.exe 2664 624e4f02be608_Thu02e613347dd.exe 2636 cmd.exe 2636 cmd.exe 1832 624e4f04abaa7_Thu02b4f4ab3a.exe 780 cmd.exe 780 cmd.exe 1924 624e4f04abaa7_Thu02b4f4ab3a.exe 1924 624e4f04abaa7_Thu02b4f4ab3a.exe 1736 cmd.exe 1712 cmd.exe 2812 cmd.exe 1612 624e4f1010d03_Thu02f08f6e.exe 1612 624e4f1010d03_Thu02f08f6e.exe 2100 624e4f14eb481_Thu02f311ad437.exe 2100 624e4f14eb481_Thu02f311ad437.exe 2608 cmd.exe 896 624e4f13e5282_Thu02162f030.exe 896 624e4f13e5282_Thu02162f030.exe 2868 cmd.exe 2100 624e4f14eb481_Thu02f311ad437.exe 2192 624e4f185fb1a_Thu02643e91db.exe 2192 624e4f185fb1a_Thu02643e91db.exe 2296 624e4f07974db_Thu02a5a7728.exe 2296 624e4f07974db_Thu02a5a7728.exe 896 624e4f13e5282_Thu02162f030.exe 1864 WerFault.exe 1864 WerFault.exe 2836 624e4f0c17da5_Thu02dc0a6b71c.exe 2836 624e4f0c17da5_Thu02dc0a6b71c.exe 992 624e4f13e5282_Thu02162f030.exe 992 624e4f13e5282_Thu02162f030.exe 2296 624e4f07974db_Thu02a5a7728.exe 776 624e4f14eb481_Thu02f311ad437.tmp 776 624e4f14eb481_Thu02f311ad437.tmp 776 624e4f14eb481_Thu02f311ad437.tmp 1864 WerFault.exe 2940 624e4f07974db_Thu02a5a7728.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/files/0x00050000000191f3-88.dat vmprotect behavioral3/memory/912-160-0x0000000140000000-0x0000000140692000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 iplogger.org 23 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 896 set thread context of 992 896 624e4f13e5282_Thu02162f030.exe 62 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1864 1144 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f14eb481_Thu02f311ad437.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f07974db_Thu02a5a7728.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f0c17da5_Thu02dc0a6b71c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f14eb481_Thu02f311ad437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f07974db_Thu02a5a7728.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f02be608_Thu02e613347dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f13e5282_Thu02162f030.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f07974db_Thu02a5a7728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f1010d03_Thu02f08f6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f13e5282_Thu02162f030.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f04abaa7_Thu02b4f4ab3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f07974db_Thu02a5a7728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f0934f6c_Thu02042b3162ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f04abaa7_Thu02b4f4ab3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624e4f185fb1a_Thu02643e91db.exe -
Kills process with taskkill 1 IoCs
pid Process 2684 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2568 powershell.exe 2560 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2476 624e4f07974db_Thu02a5a7728.tmp 1612 624e4f1010d03_Thu02f08f6e.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeCreateTokenPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeAssignPrimaryTokenPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeLockMemoryPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeIncreaseQuotaPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeMachineAccountPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeTcbPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeSecurityPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeTakeOwnershipPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeLoadDriverPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeSystemProfilePrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeSystemtimePrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeProfSingleProcessPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeIncBasePriorityPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeCreatePagefilePrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeCreatePermanentPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeBackupPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeRestorePrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeShutdownPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeDebugPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeAuditPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeSystemEnvironmentPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeChangeNotifyPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeRemoteShutdownPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeUndockPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeSyncAgentPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeEnableDelegationPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeManageVolumePrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeImpersonatePrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeCreateGlobalPrivilege 2192 624e4f185fb1a_Thu02643e91db.exe Token: 31 2192 624e4f185fb1a_Thu02643e91db.exe Token: 32 2192 624e4f185fb1a_Thu02643e91db.exe Token: 33 2192 624e4f185fb1a_Thu02643e91db.exe Token: 34 2192 624e4f185fb1a_Thu02643e91db.exe Token: 35 2192 624e4f185fb1a_Thu02643e91db.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 1484 624e4f03a9e4c_Thu02a659c88.exe Token: SeDebugPrivilege 2684 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1832 624e4f04abaa7_Thu02b4f4ab3a.exe 1832 624e4f04abaa7_Thu02b4f4ab3a.exe 1924 624e4f04abaa7_Thu02b4f4ab3a.exe 1924 624e4f04abaa7_Thu02b4f4ab3a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 2084 wrote to memory of 1836 2084 setup_installer.exe 30 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2620 1836 setup_install.exe 32 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2552 1836 setup_install.exe 33 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2756 1836 setup_install.exe 34 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2704 1836 setup_install.exe 35 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2812 1836 setup_install.exe 36 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2596 1836 setup_install.exe 37 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 1836 wrote to memory of 2608 1836 setup_install.exe 38 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 2552 wrote to memory of 2664 2552 cmd.exe 40 PID 1836 wrote to memory of 2636 1836 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f02be608_Thu02e613347dd.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f02be608_Thu02e613347dd.exe624e4f02be608_Thu02e613347dd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f03a9e4c_Thu02a659c88.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f03a9e4c_Thu02a659c88.exe624e4f03a9e4c_Thu02a659c88.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f04abaa7_Thu02b4f4ab3a.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f04abaa7_Thu02b4f4ab3a.exe624e4f04abaa7_Thu02b4f4ab3a.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f04abaa7_Thu02b4f4ab3a.exe"C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f04abaa7_Thu02b4f4ab3a.exe" -h5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f07974db_Thu02a5a7728.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f07974db_Thu02a5a7728.exe624e4f07974db_Thu02a5a7728.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\is-4D81N.tmp\624e4f07974db_Thu02a5a7728.tmp"C:\Users\Admin\AppData\Local\Temp\is-4D81N.tmp\624e4f07974db_Thu02a5a7728.tmp" /SL5="$901C8,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f07974db_Thu02a5a7728.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f07974db_Thu02a5a7728.exe"C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f07974db_Thu02a5a7728.exe" /SILENT6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\is-5DC0N.tmp\624e4f07974db_Thu02a5a7728.tmp"C:\Users\Admin\AppData\Local\Temp\is-5DC0N.tmp\624e4f07974db_Thu02a5a7728.tmp" /SL5="$6018E,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f07974db_Thu02a5a7728.exe" /SILENT7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2476
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f0934f6c_Thu02042b3162ca.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f0934f6c_Thu02042b3162ca.exe624e4f0934f6c_Thu02042b3162ca.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 2725⤵
- Loads dropped DLL
- Program crash
PID:1864
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f0c17da5_Thu02dc0a6b71c.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f0c17da5_Thu02dc0a6b71c.exe624e4f0c17da5_Thu02dc0a6b71c.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\Nf7XP7.65⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\Nf7XP7.66⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\Nf7XP7.67⤵PID:2880
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\Nf7XP7.68⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f1010d03_Thu02f08f6e.exe /mixtwo3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f1010d03_Thu02f08f6e.exe624e4f1010d03_Thu02f08f6e.exe /mixtwo4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f1298c47_Thu028bba903.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f1298c47_Thu028bba903.exe624e4f1298c47_Thu028bba903.exe4⤵
- Executes dropped EXE
PID:912 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 912 -s 4805⤵PID:2888
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f13e5282_Thu02162f030.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:780 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f13e5282_Thu02162f030.exe624e4f13e5282_Thu02162f030.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:896 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f13e5282_Thu02162f030.exe624e4f13e5282_Thu02162f030.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:992
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f14eb481_Thu02f311ad437.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f14eb481_Thu02f311ad437.exe624e4f14eb481_Thu02f311ad437.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\is-KMN86.tmp\624e4f14eb481_Thu02f311ad437.tmp"C:\Users\Admin\AppData\Local\Temp\is-KMN86.tmp\624e4f14eb481_Thu02f311ad437.tmp" /SL5="$7015A,140006,56320,C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f14eb481_Thu02f311ad437.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:776
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f1593ab0_Thu0234c2663be.exe3⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 624e4f185fb1a_Thu02643e91db.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\7zS4281FF86\624e4f185fb1a_Thu02643e91db.exe624e4f185fb1a_Thu02643e91db.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\access[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
152KB
MD5fd67ef6772724c3ba0692682d491f3ad
SHA12e4b7ee161fc7e76715f4988175a91b193129afe
SHA2567b644fcbef62e3971b5116a5c1c0898d632576c9fea13e5857615019ae174326
SHA5122c53318e25269eed6ef63b43e877d991165f362b7104eacf96056f1976533d1dda1b49cc10ad797df6342c87ec34392b748573dcf26c1496001f886a494f5e2d
-
Filesize
312KB
MD5479ba7ea1f2fa2cd51a3ca59a9638010
SHA18992de6c918131fbe8821dd16cc0277951cd362c
SHA256d66c7fb807beccc1fa5a7d4162d3e8e2d553ba560653a404e1ce6de68ba8c801
SHA51270be353017f77f5b4fd82738700843bdc5848f175a39d07626dd9f4cb59b4d685dadf69de156f00c62dcc76f8fba233656df258ea103e1000ff038305580179f
-
Filesize
1.5MB
MD595a4fc4c2fa08c611cd390dda3c946f1
SHA179af3a4eec0e4f7929f9bc4692efe3264bc1d6a3
SHA25615bbdd71197ba9af2dfbb8615805228f8d19c333ce5603a3d2f4f4708d0b56f9
SHA5121b231fcd97b9a265bda8545d1db7e4f14c46faa98f137280245b812e79d1d9957a2966e5a976788ae2d2d7695ab6c78f2ff7f56aeabbf5a98a1b4464e5d37b75
-
Filesize
2.2MB
MD5e9ae9a2f317cda41ae73bc2059739e2c
SHA1cfe4c3622f6ce2e6e959c2a8dd403cd494078746
SHA25647e5c321f7a29b72fe6cb61bb9e7246c09ef3357c42b7c3b40ba34dbc5b6c5b9
SHA51278ee1fe8314873a3df253abebe200663ca66a76aa7c2aefbd3eccde8bec6cbff5e98d419f5c934dfbf878b70945d875b530a690a94ebfd5988d1800000ff62cb
-
Filesize
397KB
MD53756e07048157d0ecfd2f525d5335caf
SHA195668f9c9fedc7b4a635b1b06d6aaa3d9d3d349f
SHA256d1cbecdbd6cfb139284af70ad04dac1322cdff40c91b9f8872943e6af894a785
SHA5129c4b96521c60447a3e67f7899cda6c2ff7d922c5e7401f2c07a5d7a1a770a07de9f92225b9304ba9ae3981cf06201a7a3e996445ca9e6cd2b078646926bec8f3
-
Filesize
3.7MB
MD518f96076334ae5dcaa0afe6b339a41e1
SHA1ad4e83cfe9c89a57b4a5585a4f1156d5a96f8f3c
SHA256abc1102bffd9831302f9353274817296b2ac391f1c148fc95164dcbab97c2fbd
SHA512e92cb9433a9759128bca933f1bcfcff4f47cc861757624de5f25ebed498c53317d4f736872486f9b25e0fc1c7991f56b2f6ccba5e15de55735087bbb3b8a3f46
-
Filesize
234KB
MD510413d40c08c93d9de5e8a5991877a81
SHA19afaf62459daa44b450d39130f175bf7b3bd2413
SHA256d350e431503d8f187d1c4e11ebe2a5375c4b25acdabf21ff6de6b7e5dbdac66f
SHA51297ff995d69495922c0da3d3662dad1d2a1a29fb24aafa80809e22cd0d0111f092db083b596326bbb8cb0e44f72e41fd848398f8e3e62e5548c9ed21818ea300a
-
Filesize
383KB
MD55d075d500127014766a7ab73ca6b3cc1
SHA13b6661aa4877eb73c4c1367cd124b05b0982e40b
SHA256c64d884893a68f77cd300c6900a244fb34f6611737c38922483dea787decf311
SHA5129d91aaf612aed7a46e4981b45adc7cc8eaad22c297cece2fa7e18e7d86f73daa6c6b4b525eca9afd63816aeaeab88ce032094b5e20f1b0383e97e1ba22ec9eb4
-
Filesize
1KB
MD5f184d55a54eae149f306684766cdee7a
SHA1d3f640f50591aa8523a8caff9d278abf96840781
SHA2566c7fd4878ef23fdd99f03af133480bdf349f2ba1c71ea6a7eff67bd5f420e48b
SHA512d5f4277db836a419c12bb43cf96eef683b6104e92fabf2b37631e46b03ee80c8dbfd6167d72a945287dc4a6bc54c8896185701e14407631db03b9348a1112241
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.5MB
MD5127ff88c447a99fca6c0907f27e61ca1
SHA1a57cf8ca347f1bb6767bc4f0b10b1fbccb315f46
SHA2567de9e69ff6305c9e2b52f05f365eb775521502dbccac937842725cc0e8972e0a
SHA5129aa052473b0717c795585031baa0fcbabd71a89b3fc7eb8e0a66f3f94f582394ca57ee52e7fb23b5b31831036870c64929ab2c50c255498a0193064a83ec1471
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BYHPO3S8A4ISXP68JTD8.temp
Filesize7KB
MD57ddde1c0d6489ed6d5d792554df8847d
SHA1e5b808e7b40b28d99eaff895e2efee9b99eafd63
SHA2565d6a43b952ea24260c56468a073cc0a79def894f7fcaf0f17670ef16023b4730
SHA5122b7094047faec1c76c40c410f6e4bbbaf5ad21ead634be805d1438b36b3255a2f37a399e6bacdc511f463723f5b4f94b3e9bcbfbc4b4ec2013e1d6185e97ad71
-
Filesize
20KB
MD598c3385d313ae6d4cf1f192830f6b555
SHA131c572430094e9adbf5b7647c3621b2e8dfa7fe8
SHA2564b2e2adafc390f535254a650a90e6a559fb3613a9f13ce648a024c078fcf40be
SHA512fdd0406ef1abee43877c2ab2be9879e7232e773f7dac48f38a883b14306907c82110c712065a290bafac3cc8b0f4c0a13694847ad60a50a2b87e6aed2fd73aff
-
Filesize
235KB
MD523f7387abf14527d3b1c7f786abecfcd
SHA1fed9c8b9316049534843436a4438125b3e4c8cec
SHA256b822e4848c7b832c034f9f742ebf83a5b20f651c209d546ae99d0ca2d65ac7ce
SHA512d90deee1aef5a4772da14e4251586a126778f604252df6cc62040dc961d62fd8ed1fa1323eaa1c9427dff8566ba9477dca9d48e5164d486d486bb05bd85b3ab1
-
Filesize
1.4MB
MD5247d99cf6557c6bffdd319291ab5f4f9
SHA1ee6f76d68d53007e65dca3541c6a31f6b40b55c5
SHA256938f66db003711703c9ad736d942d230623f5546427d63849e87d7124f7a077f
SHA51241deef72f3fa958a539b159c6bef4aeef368aec65dc37693d0f759525c2e9ff4aa2e0d6928993562655602f5fb36a3cc3f1335e75950fe456111fc706b923722
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
2.1MB
MD55e9030c344de01e542d868ba34858e2a
SHA1972811811a4e69a8afccc8ec2a817466da2c14d2
SHA2567864f418df961d9a4f3f8799e94c7427b81d7d0108f58790ee538587141dd024
SHA512eff95435d253bf8152bffbda11c9ab31bf7ad8ce2128178647e83d80dbd5ea57e73523680765d5e894a20d1c5834efee9a60e1e0b53939e4fc6f0d8d842444a3