Analysis
-
max time kernel
45s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe
Resource
win7-20240729-en
General
-
Target
464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe
-
Size
5.9MB
-
MD5
ef74da6fc3a4b2704b76b67646ae0586
-
SHA1
9edac158881bd29cbfd8928082cda81f4078c5f6
-
SHA256
464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6
-
SHA512
9726ed7a7b47b54a43b18967896375ffb058f650fb16b33087e17c7b8f670f1bd99d1bb9f693ae1dc16a3a7fa24e0ab751b733db574592fb48c567e97218ad2b
-
SSDEEP
98304:8H7CgqLPRPYv7cZuwYx72XPo0+XB6zVqZj9jG6zqS99T+Hcxo6v14jm6/ZQmBy:c+gqLKB2pKcqR9KQqDHE7vejm6xQmBy
Malware Config
Extracted
cryptbot
befcpg15.top
morhid01.top
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x00050000000196a1-172.dat family_babadeda -
Babadeda family
-
Cryptbot family
-
Executes dropped EXE 1 IoCs
pid Process 852 pdfrviewer.exe -
Loads dropped DLL 11 IoCs
pid Process 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 1852 MsiExec.exe 1852 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1564 MsiExec.exe 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 852 pdfrviewer.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1172 msiexec.exe 5 2768 msiexec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\H: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\U: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\X: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\Y: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\S: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\W: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\I: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\J: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\K: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\Installer\f77ba5a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIBCE0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBD20.tmp msiexec.exe File created C:\Windows\Installer\f77ba5d.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIBF43.tmp msiexec.exe File opened for modification C:\Windows\Installer\f77ba5d.ipi msiexec.exe File opened for modification C:\Windows\Installer\f77ba5a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIBBD4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBC33.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBC72.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdfrviewer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pdfrviewer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pdfrviewer.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1544 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 msiexec.exe 2768 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2768 msiexec.exe Token: SeTakeOwnershipPrivilege 2768 msiexec.exe Token: SeSecurityPrivilege 2768 msiexec.exe Token: SeCreateTokenPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeAssignPrimaryTokenPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeLockMemoryPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeIncreaseQuotaPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeMachineAccountPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeTcbPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSecurityPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeTakeOwnershipPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeLoadDriverPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSystemProfilePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSystemtimePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeProfSingleProcessPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeIncBasePriorityPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreatePagefilePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreatePermanentPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeBackupPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeRestorePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeShutdownPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeDebugPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeAuditPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSystemEnvironmentPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeChangeNotifyPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeRemoteShutdownPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeUndockPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSyncAgentPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeEnableDelegationPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeManageVolumePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeImpersonatePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreateGlobalPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreateTokenPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeAssignPrimaryTokenPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeLockMemoryPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeIncreaseQuotaPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeMachineAccountPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeTcbPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSecurityPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeTakeOwnershipPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeLoadDriverPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSystemProfilePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSystemtimePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeProfSingleProcessPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeIncBasePriorityPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreatePagefilePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreatePermanentPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeBackupPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeRestorePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeShutdownPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeDebugPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeAuditPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSystemEnvironmentPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeChangeNotifyPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeRemoteShutdownPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeUndockPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeSyncAgentPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeEnableDelegationPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeManageVolumePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeImpersonatePrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreateGlobalPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeCreateTokenPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeAssignPrimaryTokenPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe Token: SeLockMemoryPrivilege 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1172 msiexec.exe 1172 msiexec.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 2768 wrote to memory of 1852 2768 msiexec.exe 31 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 1520 wrote to memory of 1172 1520 464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe 32 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 1564 2768 msiexec.exe 33 PID 2768 wrote to memory of 852 2768 msiexec.exe 34 PID 2768 wrote to memory of 852 2768 msiexec.exe 34 PID 2768 wrote to memory of 852 2768 msiexec.exe 34 PID 2768 wrote to memory of 852 2768 msiexec.exe 34 PID 852 wrote to memory of 1128 852 pdfrviewer.exe 35 PID 852 wrote to memory of 1128 852 pdfrviewer.exe 35 PID 852 wrote to memory of 1128 852 pdfrviewer.exe 35 PID 852 wrote to memory of 1128 852 pdfrviewer.exe 35 PID 1128 wrote to memory of 1544 1128 cmd.exe 37 PID 1128 wrote to memory of 1544 1128 cmd.exe 37 PID 1128 wrote to memory of 1544 1128 cmd.exe 37 PID 1128 wrote to memory of 1544 1128 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe"C:\Users\Admin\AppData\Local\Temp\464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1734971075 " AI_EUIMSI=""2⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1172
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B1290E24125481DCF48E2EB6A8E251A1 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5C36995EC1DDD000C2A456DC209686812⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn\pdfrviewer.exe"C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn\pdfrviewer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\xYYcFmWE & timeout 4 & del /f /q "C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn\pdfrviewer.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\timeout.exetimeout 44⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1544
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD53286498f10c92006252ed5ebe2f9a3af
SHA175e354f5b077ce8f4eccfd711c99dc4a449022be
SHA256d3124fb6f45a8a2e72f5780fb268dfabe72df52ab75ee5158e689d2253a6fd2c
SHA512fd1f49afe2b079a350171c4a2540adf83aeb557c3321e3a58ebc159592fcd97fe17f6aef750b7f293972d089c4bb731690341ed4e4ebc6fde93846712865e562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fbb3cd2298f8da81b49dc216106816
SHA16d9b36753107d97983a1cc54b759a3b0e417a241
SHA2568cf87e7f96fb844ba12c2c3fb8663f507e7e7949340396206e3ba4a7a692712f
SHA5122b6e15465c3982487f044eed3a29990b8b6079e29ae9325f38380cfb2df69e906dbb52c662e1a2fe88981265c53c294731fbedc485211c9c8a1abec036f4ddfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb0f99a3474d524ed53a9fd95d82730
SHA1d080ceee66720913dc6cad5fb564f5234a1bb33a
SHA256370a4b86d5abc76db2a789504abda3ea58b30d3a8cf066145813e6b71490acc2
SHA51282677ca5096751e7702ee08ab818ce2614a4f4b50123cc6b85f14cc194efa45cfe4f6ec2d51d74340c3552433146dbe54fcf7bcbecf35cbe545de304ee9da0fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
391KB
MD5a32decee57c661563b038d4f324e2b42
SHA13f381a7e31f450a40c8c2cf2c40c36a61fb7a4c2
SHA256fcf24b9b574ed026d3f68b7b70aa6533806ba7fc566c476ccb62e6493ac28f04
SHA512e17c125adad4702c9a30639858e22a2f0dc4f2926fca89758d544c62fe1fb95360dabd5bd2de2f62a607158bd9ef108c60d8cb5ce709c634668ee509988214f9
-
Filesize
864KB
MD54e2e67fc241ab6e440ad2789f705fc69
SHA1bda5f46c1f51656d3cbad481fa2c76a553f03aba
SHA25698f4ebaa6ea1083e98ea0dd5c74c2cb22b1375c55b6a12cfdc5d877f716de392
SHA512452df66dd2b09485bf92d92b72b3ad2638cbf0a570741b80309056d1e67e68a18cbd0ad3616a2943bb29de62a057848a7382b6c64c3821335a51b0a03131564c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
144KB
MD5d817a6ec84cc47899f249b2c03b5f985
SHA15ebf96041a694c85bad7f71f0679f64700ee272e
SHA2560a5dc4026bceeb4afdddd73e3e16cc7224b2640e86a379d9afe6e5a81ce1ecdc
SHA51296d161c7844304d4466384f5a25e27e54f0a79fefc51e0656746837d31772eb84ab203e13686391b5fa0126f0f3c705876c1c1ae8eef4e4f0ec67c8c379918a2
-
Filesize
10KB
MD55c21f83c843650de84f1692a20156bf9
SHA103d93f7538eae63c34752f89f30efe3e5bd293f3
SHA2562514772e5475f208616174f81b67168179a7c51bdcb9570a96a9dc5962b83116
SHA5125b7faddb3f407979a127bc4243268ced07b380033897013c2a3e8ec9ac3d3187ce938c70878b0508f7620f4c34144eff644c7c7c9a35a7ef910622dbbced0b8b
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\Microsoft.ReportViewer.ProcessingObjectModel.dll
Filesize52KB
MD5253bc53169ad46b1eafb92982ba7268e
SHA13f2f8c6324480b1f39c7bc06b8503feedfe5def4
SHA256ca513f09b64f8e3dc8ee09663854adf7e4e84544133d07a3a2ef55701abfad4c
SHA512ab6847f2b7e07e85d555b313d63f74d4e74e50ea09ef32fe427822a25eca12264a49347428d32f42ed65c669c28dac426310bbd401a21c03177bd9729cfb5e08
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\OpenLink.Data.Virtuoso.dll
Filesize212KB
MD5e9152f504b96bb637e831f7cb3aa4cb3
SHA104cbd6e50eb9fa42b1c9a9da0a9ff397077fc1dd
SHA2561169b86071cee32dd2d096c213e2fc4a723ce1573193d928cdbf78598d203b26
SHA512d9e23f4322ccbbdee93312b3bc15e2d2107769e3d11720af20396546e0c214182449473a8dcfdeee18bb9b58620624b3078f0fc4eba0a544486c09dddde0d0d0
-
Filesize
2.1MB
MD59364e8c60ff4e4b72a019398bdf952e2
SHA11244879b663f11b49a7b87026ea507e2e849d05b
SHA2569f3b8c8419d1db83c34b280e82d7620cccb304ecd5c2ffda7e91d045cc037de4
SHA512db5ef11a953cbe506107de2bb139b9f3ca82f47ae7dc728a22f6d91d4e771ba73b90dbf16a7112eb8120b781d6383d63710ca3da81a2ecefcb4a45955afab186
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\bookmark\Demo-Sakila\CUSTOMER - FILM.dbl
Filesize403B
MD5718c7cc73f8766f6d56c9104e60306d4
SHA1ce7be93f2756db711775440f37455a48b9467bfd
SHA256318a45b17b88073235190e1bc36bb23c10d3ba86041c7e66cb70b4cbf9f90218
SHA512eafde8be5b3ed9ba0c92890132efab8b08e338d4e2d486941271d9b50935aeab3431ba104a5da29a16419528c1ff6862a17b52b4e4a61562b5c05365b51f204e
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\bookmark\Demo-Scott\EMPLOYEE - PROJECT.dbl
Filesize230B
MD57a846cc379bc92069d670166b5c749de
SHA1c18c366cab1e39601e7b1e82d2b6099889d4e1fa
SHA256031ec6ef99d1f2e349e9c465c5e8361d6f863f7ae7d9a6a98a8971e3503cdecf
SHA512f820fd45e2234309c742a390534a0dc117abb700663f0ef0d2dc65f4b19c1bc9b98648d43e439d0626a6ccd0c460f319b4d4b803dd0b78c50a8bf56d715505ce
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\bookmark\Demo-Scott\EMPLOYEE - ROLE.dbl
Filesize298B
MD5765f5df91f039f42ae1cbdde9409d339
SHA17caf901629f0477dd7f77c2621366e59c670d671
SHA256409ab209e68cad848d8272622e1de3b07b8ed872b5eb3158055adf6f6c86f16c
SHA512d5a89db9d3f4fc37ff71a71cc928d45cab1fb116e914d4326c29d7d59fe5e685d36e5dd4c0445aaf0c8ab31ee986828a6bde715a16b3d0f3bc5aac41e1785af0
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\bookmark\Demo-Scott\PROJECTS of JAMES.dbl
Filesize314B
MD55f8d6267dcc396ed4142ba4ab367b45c
SHA1de6e87363d1dd5274d23bd4ed757e123fd2f1794
SHA256d7007bf318469f32285497ced1aa330247abba34a61471d841b634a041ce956e
SHA512e6137ac9edb98d43cea33da9df31fbe35baf50a11cff9ac49c0305613602140d837212a5bb8461391a1aaac292423637ae8853258a86467a195cb59c53f03eb2
-
Filesize
491KB
MD5cc99d0272acf874c56c9407af08f1743
SHA11a22c15ec7dd41163bd0ece8cadc28d6a3e75e78
SHA2564681e22a135f62694578e35a13fdb48da19542a51fc83da48b8e0c878a2ac02a
SHA512802207110c3e5964a8b90d4a79a60a2014ed99dc142b32bb20a3497552606bb1c9b020214365609497ef3e51bc507c1683122bc5755f46b0ae6438a1b21fb071
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\gscheduler-30.dll
Filesize2.3MB
MD53a3fe4d4dd071959e944d36262345fa6
SHA12791aecd14f9db24a7c129c7457a82f84e061c6a
SHA256dcb1a3d279759beef50e4599757055fb19041d163cd2757ca3f339929118159b
SHA512ac54fffd4de88b590572ab076c506135aa88012191e72f24d103759a6e6c257cc0f882cb947f636cdbeacd4c9ddfcb216dd20313128f8519297e8d0d3db771d7
-
Filesize
30KB
MD51725c87b2fdeb6d87acf5a2e2ebd2a99
SHA133fd0c09fe96e1b7dc77cde8b9bb6c9215f85c56
SHA25640c7d2ed123767d60162d439bafacbeee75452bd051683e690ebebb9c5d875f6
SHA512e0f321297697853b17cb467d6766d73de6b17af2f3c94018bd60046b54c68c9c498461c697079f6d42619fef14de641d5d9822df955ec4d750cf77890b78067a
-
Filesize
179KB
MD5e9644e54c403dd5c0ef89c85ada3e295
SHA1a42708b2837dba534e4cb866266e4959b28da452
SHA25672ecd276b372487af75c67877eccc0ed4d15f2c07ffa7f631d8056038d0e8122
SHA51222411a9e8a9f7082b4cf90c3c906e414b62b4bd2b9b10ea1694ec5651e3dec8d2e4716354f5b09d6396f4c094555f5f08b26534647a98dfa7b3039d6c1e219f7
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\libgmodule-2.0-0.dll
Filesize41KB
MD54d233a220f91de3b1510d017b5481942
SHA1c59f449b0d09127d18268e7b07da3f7d749b2720
SHA25608336089e280805c8ac89f7476526f944b5868c014748b6dc29f65167e9e3ab0
SHA512a86a1f9b5d160813c6e2f771962f303428604057b9613021bf7844c1204cfca0a18571a28d950d7999acc4ecde0605095f9a460a9b79fe2bbe02f080c2683923
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\libgthread-2.0-0.dll
Filesize35KB
MD5cf2571c125fa1d2ec55b9977054f380a
SHA191014dd50f0eeb0d3d1faed77541c76a05b712b8
SHA25602b817b6db18db2dfccefdd08eed64a696e2bf326f4120ee7e93ae6aa73bccb3
SHA512a95bf3436ea2fac443924c5fc31fcd4337a44702ef38ca82d744474301e53f14721eaeb0f21e515ccff8569e7b7d81107fb5a4cf2ae485cd4a5d2dc95dae8f9b
-
C:\Users\Admin\AppData\Roaming\Xceed Software Inc\SharpSvn 3.5.2.2\install\C9D9D01\libmongoc-1.0.dll
Filesize227KB
MD5a80d629d6329dc31d5cb1157d853afab
SHA1a2fa781452106cdf17a83e3e59c6fe50d557e62c
SHA256500ee04865dbb7beb9474e0c2aebd6713df4407c849ec134457c7d0ca289faf0
SHA5124e0253615d4c3c418b93547370f416edf5326bf66e3a5872c687b129e65e5967dc3d4ae97cf524ca5e77327b0ce07d93ba63470d541614a6685ebd26e0c7427b
-
Filesize
45KB
MD584e8e72572d53558d52403011fa0d388
SHA1865160da7dbfaaea224541eb44e9430e1a7b7b20
SHA256ca717b5cf2a7b0e047aabad985c631278941c58f16e2e9650ca12c3a331fcd4f
SHA51247ee932bfa4ee3c51c3828ef8c6923e5b946966ad8e255bc2c53a60443aa2d4ab17521f21912a6f0469c7898d6543dc4b1783a86ddb5a84568818a7b37ec3992
-
Filesize
25KB
MD5739081eb931a03d9e119801bb1943d3c
SHA15c1aa73acee1f9822f37d2751d2fdf8f922ebf0c
SHA2567d9ceb730d094ebec4391a2ed926ec3a63076711f981e25206ab960f5601c2bc
SHA51272da49d69dfefa861ef33b1c8cdb8a686bb794585a62180034abd978374c98f55455f287f868d767ceb9612b714c3c04edeb3e121e215be6443973c5b50e89be
-
Filesize
7KB
MD5a5a239c980d6791086b7fe0e2ca38974
SHA1dbd8e70db07ac78e007b13cc8ae80c9a3885a592
SHA256fb33c708c2f83c188dc024b65cb620d7e2c3939c155bc1c15dc73dccebe256b7
SHA5128667904dda77c994f646083ef39b1f69c2961758c3da60cecadfe6d349dd99934c4d8784f8e38ae8b8c9eb9762edd546f2a7b579f02612578f8049e9d10e8da7
-
Filesize
6.6MB
MD579024ad98b26d2f579a5e508bf157d17
SHA1d00b47ea818deade58b2775488a13536bf4823a2
SHA256ce8f87872b1dab729dccdcc06aeec7642c5cbe83bb19260fb5d9db6ba16a870f
SHA5127e40596bdbdb5ee1c914e1be86828ab2d45c7186cc79c4fad2a3a17f21b430ea5532ea6feea6bf618a5478112d3dee6b3b06ed68d57ba38cefd18c39754af047
-
Filesize
21KB
MD54bc04536cb776f3f4add437065ad9fa6
SHA1ba68583b00ba0d84de851e2074942cf414d98551
SHA256113842def9c98250be02abbcb39e707faac093ce7f5764b816f3f69c07d34b97
SHA512e427be02a958e90450a76f8583b9a9963fae46da7e356ed466dccd0993511af65b93641152f7655c86515fbc2c5c1b17a853a049569c16329670f99fcbee269f
-
Filesize
35KB
MD5928c9eea653311af8efc155da5a1d6a5
SHA127300fcd5c22245573f5595ecbd64fce89c53750
SHA2566dc4bee625a2c5e3499e36fe7c6ff8ead92adf6aae40c4099fdc8ef82e85b387
SHA5120541d706bb53f8a04c78fcf327c4557553fa901d645ad2fd446e79753b4729f1e36793f42fbdd9b5e92073a30ed9a3dd853773a06ebea8e9302ece91a6c5362c
-
Filesize
44KB
MD5f315845157e4f003d6f60f453d6eca99
SHA1efbcb06383042847d6c4f90363f27487a1329ec1
SHA256738061221d9233fa14c6c1789d9918ea2e4e6ac524ae9c2c2b31926994ddc1cb
SHA512ec424ce378052356ba73a02704073da7504a993a86623f79b77499af0bfc430a8e78401b0ff5394fef87bc8d0511cc9db18e2946731e29dba695902b7e385a19
-
Filesize
40KB
MD548de70d11cb17ea6f49b4ad554734232
SHA12aedac7ff7b82f5cc7decdfc85630e5e8dbb8651
SHA256a094f62fbd65712056c4c63c5b656d987a7fbb5f188fe257aefa73ff9845ba5c
SHA51227968f5ba302be1ca54bd1888c4de6771c36a249a0e7fd7a14acf2253a421c2e022e608a8caac078e19eeba7169a4bbc664a405bde469b823c942295f9e3b115
-
Filesize
10KB
MD5638b03e4352d2681e7264a9120e2f77c
SHA10581a72ab06c94e55815e7d5d1e0bb520ee75e6f
SHA256bb9dc4a986ab913eb18787f09098f492a24d1fbfd44aa92900f23db314be3e87
SHA5128613a33629f4f331e45203b41dd361ea68449cf95edb3b32bd132481e85bf6355c6c6310855fa221951b75ce19ade4e43b0dff918d3fe8d79a9949883478349e
-
Filesize
15KB
MD50e72536ae405db2cfd2b473fb1ae7482
SHA1759e692dbbfbcf10c88ddb70976938fff68505b1
SHA25613a1089a8271353473df3ea5648a9f1276ae129f1957532ded84060ce864b389
SHA5120e76d595e58c2ad34a223b612781d34def1dc32ed38383270d4c8530f2d819a42e0c281dee051d70a92c7a346a14175adc1f784fb388874cd29fa205445b348e
-
Filesize
569KB
MD50be7cdee6c5103c740539d18a94acbd0
SHA1a364c342ff150f69b471b922c0d065630a0989bb
SHA25641abe8eb54a1910e6fc97fcea4de37a67058b7527badae8f39fba3788c46de14
SHA512f96ef5458fdc985501e0dca9cac3c912b3f2308be29eb8e6a305a3b02a3c61b129c4db2c98980b32fd01779566fa5173b2d841755d3cb30885e2f130e4ad6e2c
-
Filesize
202KB
MD5831e0b597db11a6eb6f3f797105f7be8
SHA1d89154670218f9fba4515b0c1c634ae0900ca6d4
SHA256e3404d4af16702a67dcaa4da4c5a8776ef350343b179ae6e7f2d347e7e1d1fb7
SHA512e5e71a62c937e7d1c2cf7698bc80fa42732ddd82735ba0ccaee28aee7a7ea7b2132650dfd2c483eb6fb93f447b59643e1a3d6d077a50f0cd42b6f3fc78c1ad8f