Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 02:27
Static task
static1
Behavioral task
behavioral1
Sample
Setup.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.zip
Resource
win10v2004-20241007-en
General
-
Target
Setup.zip
-
Size
126.7MB
-
MD5
307e7ca23242f65e49887e5455723410
-
SHA1
834501fda42e01480a23a2894491b7e49ae43c5f
-
SHA256
98c7ed12a9c8f8c8c4b321fe8b1f0111387961c365a2e053a2a13414cd53a2e0
-
SHA512
de97238b2a2b41e32241246a59befa9b3b92cb0e5146386cdab845809fe43be2bb6c42eba15db61eadec72c393a915b711998aa7e96333f3cec50ff56ddd9811
-
SSDEEP
3145728:PHBH4iP9KG0LJz4RESbbveTg4rG50sTMHO3lzgW:pHxVK3LJCDGg4rGnMIV
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Executes dropped EXE 35 IoCs
pid Process 2912 Setup.exe 3492 Setup.exe 3544 Setup.exe 3608 Extreme Injector.exe 3600 Extreme Injector.exe 556 Extreme Injector.exe 1684 Extreme Injector.exe 4100 Setup.exe 4952 Setup.exe 4044 Setup.exe 3224 Setup.exe 1976 Extreme Injector.exe 3684 Extreme Injector.exe 3452 Setup.exe 4740 Setup.exe 4044 Extreme Injector.exe 3156 Extreme Injector.exe 2316 Extreme Injector.exe 3660 Extreme Injector.exe 1640 Setup.exe 1456 Setup.exe 3012 Setup.exe 3056 Setup.exe 1320 Setup.exe 3540 Setup.exe 2496 Setup.exe 3232 Setup.exe 3848 Setup.exe 4980 Setup.exe 4924 Setup.exe 404 Setup.exe 4628 Setup.exe 4748 Setup.exe 4192 Setup.exe 2648 Setup.exe -
Loads dropped DLL 10 IoCs
pid Process 3608 Extreme Injector.exe 3600 Extreme Injector.exe 556 Extreme Injector.exe 1684 Extreme Injector.exe 1976 Extreme Injector.exe 3684 Extreme Injector.exe 4044 Extreme Injector.exe 3156 Extreme Injector.exe 2316 Extreme Injector.exe 3660 Extreme Injector.exe -
Suspicious use of SetThreadContext 20 IoCs
description pid Process procid_target PID 2912 set thread context of 3544 2912 Setup.exe 97 PID 3608 set thread context of 1504 3608 Extreme Injector.exe 103 PID 3600 set thread context of 888 3600 Extreme Injector.exe 106 PID 556 set thread context of 644 556 Extreme Injector.exe 109 PID 1684 set thread context of 3352 1684 Extreme Injector.exe 112 PID 4100 set thread context of 4952 4100 Setup.exe 115 PID 4044 set thread context of 3224 4044 Setup.exe 120 PID 1976 set thread context of 5088 1976 Extreme Injector.exe 127 PID 3684 set thread context of 3132 3684 Extreme Injector.exe 130 PID 3452 set thread context of 4740 3452 Setup.exe 133 PID 4044 set thread context of 2020 4044 Extreme Injector.exe 143 PID 3156 set thread context of 1592 3156 Extreme Injector.exe 144 PID 2316 set thread context of 336 2316 Extreme Injector.exe 147 PID 3660 set thread context of 4196 3660 Extreme Injector.exe 152 PID 1640 set thread context of 1456 1640 Setup.exe 155 PID 3012 set thread context of 2496 3012 Setup.exe 164 PID 1320 set thread context of 3848 1320 Setup.exe 169 PID 3232 set thread context of 404 3232 Setup.exe 174 PID 4628 set thread context of 4192 4628 Setup.exe 181 PID 4748 set thread context of 2648 4748 Setup.exe 184 -
Program crash 12 IoCs
pid pid_target Process procid_target 3788 2912 WerFault.exe 93 4252 4100 WerFault.exe 113 2928 4044 WerFault.exe 116 2968 3224 WerFault.exe 120 4936 3452 WerFault.exe 131 3936 336 WerFault.exe 147 2312 1640 WerFault.exe 153 1980 3012 WerFault.exe 158 4528 1320 WerFault.exe 161 976 3232 WerFault.exe 166 4328 4628 WerFault.exe 177 1420 4748 WerFault.exe 179 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Extreme Injector.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3736 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 3736 7zFM.exe Token: 35 3736 7zFM.exe Token: SeSecurityPrivilege 3736 7zFM.exe Token: SeRestorePrivilege 3316 7zG.exe Token: 35 3316 7zG.exe Token: SeSecurityPrivilege 3316 7zG.exe Token: SeSecurityPrivilege 3316 7zG.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3736 7zFM.exe 3736 7zFM.exe 3316 7zG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3700 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3492 2912 Setup.exe 96 PID 2912 wrote to memory of 3492 2912 Setup.exe 96 PID 2912 wrote to memory of 3492 2912 Setup.exe 96 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 2912 wrote to memory of 3544 2912 Setup.exe 97 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3608 wrote to memory of 1504 3608 Extreme Injector.exe 103 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 3600 wrote to memory of 888 3600 Extreme Injector.exe 106 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 556 wrote to memory of 644 556 Extreme Injector.exe 109 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112 PID 1684 wrote to memory of 3352 1684 Extreme Injector.exe 112
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Setup.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3736
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
PID:3492
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 9882⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2912 -ip 29121⤵PID:1260
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 1402⤵
- Program crash
PID:4252
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 14403⤵
- Program crash
PID:2968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 2322⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4100 -ip 41001⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4044 -ip 40441⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3224 -ip 32241⤵PID:3156
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 9962⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3452 -ip 34521⤵PID:4424
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap20593:516:7zEvent256801⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3316
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3700
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 12163⤵
- Program crash
PID:3936
-
-
-
C:\Users\Admin\Desktop\Extreme Injector.exe"C:\Users\Admin\Desktop\Extreme Injector.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 336 -ip 3361⤵PID:2760
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10042⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1640 -ip 16401⤵PID:1856
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
PID:3056
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
PID:3540
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 2442⤵
- Program crash
PID:1980
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 9122⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3012 -ip 30121⤵PID:4492
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3232 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
PID:4980
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
PID:4924
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 9922⤵
- Program crash
PID:976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1320 -ip 13201⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3232 -ip 32321⤵PID:4928
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4628 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 9922⤵
- Program crash
PID:4328
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 9802⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4628 -ip 46281⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4748 -ip 47481⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 336 -ip 3361⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
461KB
MD56677991b2637c61062f0e9b7b8dcc435
SHA1f0964b9695dcc103628f109037b41e649d7b1a4a
SHA256513cacb00912532a95a12c8dee0e5bc82b868047dd4cd621ea07cbb370ae157b
SHA51249573bc202839f89af21ef0beb18c54f6010f027e9b9dabe110137a5b3aef9e500844bc15d6d2a1ae5fa8e2b635b1f8dd98e119e5163331d495a6db670cc3e54
-
Filesize
4.8MB
MD5d9b78f4b2f8f393c8854c7cc95eae5d8
SHA18d648e7bda5b6bf7b02041189b9823fe8d4689e5
SHA25655faebb8f5e28cde50f561bbd2638db7edcfd26e7ee7b975e0049b113145ae38
SHA5126e76b524a56cc9bb5ae4beeedd41a48c35cf03c730752da3cae49862cb7bc3c17283099c39787f5933c1771eca7c2e651d92b961de7f43813f026eb295c90c81
-
Filesize
840KB
MD50fdda3a8c8be28993b156b24b300ccdf
SHA157fe6cfd0b28708d23ae560675d4c462127722c8
SHA256335cec3a5f9082f083190660932b6641f682f4c5818ffbd6ffa98c9d0c24e0f1
SHA5124ba8b28ac903d087344185b77144bfcbcd5bda11efb2a8d45b942363b8a13c7c4fb56820644166c7556fb44b68a8786ebb10b8cc4b3557247aa85214289e4453
-
Filesize
253KB
MD506cc5d18a496520e05bcfee1e3169535
SHA198ba5d0ed52499a845038c3b4bcba356b9339f11
SHA256ea31035fa96ba656d64b58d4f1a9dd210df7154afad3d4f96ee36b41584e4360
SHA512154a2fdbaa045df6289476420cc4045905a866cd54d756dcc09e0ea79f2cec7f33c748534f47c827841e35c35f71d462cadb801a6b99bf72c162c075d786fdbe
-
Filesize
4.3MB
MD5f697ffc85fb86d72654c4f5ba4e1bdc2
SHA1670657f598d408ab232dec75be6fc7983bc5ce4b
SHA256400fa69aa8803f6c3a6f9a5fc956475d0396095c4b6d4665b7aa29bbcb8e3640
SHA51247513892c22a193c51ecf09c8f3e4c4271a92be33b7b7d535290ea75a1498c5531881a26a85dbf758361e6892abf12a796f1c5c284a34f1d173d61d2012325b7
-
Filesize
374KB
MD5b23837e32ca13b2c2386fb7afb398d02
SHA1c85e33b87d86346dd9b3d8ce8fff5473f715d11c
SHA256c37272695c829d118a5482acb384af828f56eb1282521a286a42b836a91439f1
SHA512d16fa16fd7f4cb27e5733297cf8fe728a137b321dbeb71c72e4589df2cad912df5206ce1585bc6142a1fad8077e030cb4cec7aee2e6c3b5d04f4fbe351f862b8
-
Filesize
731KB
MD545ad5195977a46b165bb96887ac206de
SHA1ade19c68fc90514a987760f3a0fe881bc2dc3bc4
SHA25660bffec055dcee0eed7c3d2820fb501f81e022a2911f7b01f5ad71bd130f2c12
SHA512643bb1a63211dcd8ec62f15740934039b7dead7e823688f50598657fa870f74c3e25c245b50108dc1fda0f0887105f398f8d62a56f6aa3f652368f48abc6e6f6