Resubmissions
10-01-2025 18:05
250110-wn7cts1pct 1010-01-2025 18:03
250110-wnc4zs1pay 1010-01-2025 17:59
250110-wkqwns1ndx 10Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 18:05
Static task
static1
Behavioral task
behavioral1
Sample
Dogusign Reader 1.26g.msi
Resource
win7-20241010-en
General
-
Target
Dogusign Reader 1.26g.msi
-
Size
10.5MB
-
MD5
35f774e65e57f419fff8d8f74945ea51
-
SHA1
c3e1d2d50a9bbca445576e0d71c6984cc1dc60bb
-
SHA256
d00a3e22e53210acbd5c3e39b85332e3d47c8ec001d2bbf7a13abb07427bbba2
-
SHA512
34db08df1751754159ca37249dd8a66a811150e2a0bbdc020858f5ee55f9fb8ef763bb74bbb723633f79ea9fde8dd0feeb0c79e0c442ca6f15a8c6d8ffa58a26
-
SSDEEP
196608:xaZKIcPtwQbOmV7SPjZJrtiXPFsKASDdybmR67JU6OpkKM1sQT9nAJDPMRAl6q7r:Y3cPt30JrtiXdsKAcrR67J0kR1syAtMU
Malware Config
Extracted
lumma
https://robinsharez.shop/api
https://handscreamny.shop/api
https://chipdonkeruz.shop/api
https://versersleep.shop/api
https://crowdwarek.shop/api
https://apporholis.shop/api
https://femalsabler.shop/api
https://soundtappysk.shop/api
Signatures
-
Lumma family
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2424 set thread context of 1624 2424 RttHlp.exe 39 PID 912 set thread context of 2976 912 RttHlp.exe 41 -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f77d8e2.msi msiexec.exe File opened for modification C:\Windows\Installer\f77d8e2.msi msiexec.exe File created C:\Windows\Installer\f77d8e3.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f77d8e5.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSIDAE4.tmp msiexec.exe File opened for modification C:\Windows\Installer\f77d8e3.ipi msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 1640 RttHlp.exe 912 RttHlp.exe 2424 RttHlp.exe -
Loads dropped DLL 10 IoCs
pid Process 1640 RttHlp.exe 1640 RttHlp.exe 1640 RttHlp.exe 1640 RttHlp.exe 912 RttHlp.exe 912 RttHlp.exe 912 RttHlp.exe 912 RttHlp.exe 2424 RttHlp.exe 2424 RttHlp.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RttHlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RttHlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RttHlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
GoLang User-Agent 6 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 5 Go-http-client/1.1 HTTP User-Agent header 21 Go-http-client/1.1 HTTP User-Agent header 22 Go-http-client/1.1 HTTP User-Agent header 23 Go-http-client/1.1 HTTP User-Agent header 26 Go-http-client/1.1 HTTP User-Agent header 4 Go-http-client/1.1 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2028 msiexec.exe 2028 msiexec.exe 1640 RttHlp.exe 912 RttHlp.exe 912 RttHlp.exe 2424 RttHlp.exe 2424 RttHlp.exe 1624 cmd.exe 1624 cmd.exe 2976 cmd.exe 2976 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2424 RttHlp.exe 912 RttHlp.exe 1624 cmd.exe 2976 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2940 msiexec.exe Token: SeIncreaseQuotaPrivilege 2940 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeSecurityPrivilege 2028 msiexec.exe Token: SeCreateTokenPrivilege 2940 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2940 msiexec.exe Token: SeLockMemoryPrivilege 2940 msiexec.exe Token: SeIncreaseQuotaPrivilege 2940 msiexec.exe Token: SeMachineAccountPrivilege 2940 msiexec.exe Token: SeTcbPrivilege 2940 msiexec.exe Token: SeSecurityPrivilege 2940 msiexec.exe Token: SeTakeOwnershipPrivilege 2940 msiexec.exe Token: SeLoadDriverPrivilege 2940 msiexec.exe Token: SeSystemProfilePrivilege 2940 msiexec.exe Token: SeSystemtimePrivilege 2940 msiexec.exe Token: SeProfSingleProcessPrivilege 2940 msiexec.exe Token: SeIncBasePriorityPrivilege 2940 msiexec.exe Token: SeCreatePagefilePrivilege 2940 msiexec.exe Token: SeCreatePermanentPrivilege 2940 msiexec.exe Token: SeBackupPrivilege 2940 msiexec.exe Token: SeRestorePrivilege 2940 msiexec.exe Token: SeShutdownPrivilege 2940 msiexec.exe Token: SeDebugPrivilege 2940 msiexec.exe Token: SeAuditPrivilege 2940 msiexec.exe Token: SeSystemEnvironmentPrivilege 2940 msiexec.exe Token: SeChangeNotifyPrivilege 2940 msiexec.exe Token: SeRemoteShutdownPrivilege 2940 msiexec.exe Token: SeUndockPrivilege 2940 msiexec.exe Token: SeSyncAgentPrivilege 2940 msiexec.exe Token: SeEnableDelegationPrivilege 2940 msiexec.exe Token: SeManageVolumePrivilege 2940 msiexec.exe Token: SeImpersonatePrivilege 2940 msiexec.exe Token: SeCreateGlobalPrivilege 2940 msiexec.exe Token: SeBackupPrivilege 2800 vssvc.exe Token: SeRestorePrivilege 2800 vssvc.exe Token: SeAuditPrivilege 2800 vssvc.exe Token: SeDebugPrivilege 2852 taskmgr.exe Token: SeBackupPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeRestorePrivilege 108 DrvInst.exe Token: SeLoadDriverPrivilege 108 DrvInst.exe Token: SeLoadDriverPrivilege 108 DrvInst.exe Token: SeLoadDriverPrivilege 108 DrvInst.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe Token: SeRestorePrivilege 2028 msiexec.exe Token: SeTakeOwnershipPrivilege 2028 msiexec.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2940 msiexec.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2940 msiexec.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe 2852 taskmgr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1640 2028 msiexec.exe 36 PID 2028 wrote to memory of 1640 2028 msiexec.exe 36 PID 2028 wrote to memory of 1640 2028 msiexec.exe 36 PID 2028 wrote to memory of 1640 2028 msiexec.exe 36 PID 1640 wrote to memory of 912 1640 RttHlp.exe 37 PID 1640 wrote to memory of 912 1640 RttHlp.exe 37 PID 1640 wrote to memory of 912 1640 RttHlp.exe 37 PID 1640 wrote to memory of 912 1640 RttHlp.exe 37 PID 912 wrote to memory of 2424 912 RttHlp.exe 38 PID 912 wrote to memory of 2424 912 RttHlp.exe 38 PID 912 wrote to memory of 2424 912 RttHlp.exe 38 PID 912 wrote to memory of 2424 912 RttHlp.exe 38 PID 2424 wrote to memory of 1624 2424 RttHlp.exe 39 PID 2424 wrote to memory of 1624 2424 RttHlp.exe 39 PID 2424 wrote to memory of 1624 2424 RttHlp.exe 39 PID 2424 wrote to memory of 1624 2424 RttHlp.exe 39 PID 912 wrote to memory of 2976 912 RttHlp.exe 41 PID 912 wrote to memory of 2976 912 RttHlp.exe 41 PID 912 wrote to memory of 2976 912 RttHlp.exe 41 PID 912 wrote to memory of 2976 912 RttHlp.exe 41 PID 2424 wrote to memory of 1624 2424 RttHlp.exe 39 PID 912 wrote to memory of 2976 912 RttHlp.exe 41 PID 1624 wrote to memory of 1060 1624 cmd.exe 43 PID 1624 wrote to memory of 1060 1624 cmd.exe 43 PID 1624 wrote to memory of 1060 1624 cmd.exe 43 PID 1624 wrote to memory of 1060 1624 cmd.exe 43 PID 2976 wrote to memory of 1996 2976 cmd.exe 44 PID 2976 wrote to memory of 1996 2976 cmd.exe 44 PID 2976 wrote to memory of 1996 2976 cmd.exe 44 PID 2976 wrote to memory of 1996 2976 cmd.exe 44 PID 1624 wrote to memory of 1060 1624 cmd.exe 43 PID 2976 wrote to memory of 1996 2976 cmd.exe 44 PID 1624 wrote to memory of 1060 1624 cmd.exe 43 PID 2976 wrote to memory of 1996 2976 cmd.exe 44 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Dogusign Reader 1.26g.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2940
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Yarrow\RttHlp.exe"C:\Users\Admin\AppData\Local\Yarrow\RttHlp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\configRemote_PZ4\RttHlp.exeC:\Users\Admin\AppData\Roaming\configRemote_PZ4\RttHlp.exe3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\configRemote_PZ4\BMLDPVGXZERMHUZWYS\RttHlp.exeC:\Users\Admin\AppData\Roaming\configRemote_PZ4\BMLDPVGXZERMHUZWYS\RttHlp.exe4⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000060" "000000000000005C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5ee66ae0bf3c57798a55377dc0f9aecba
SHA126c77f198a8342e31abf02d6cf72cf4d8dd0b9d0
SHA2566ba043353601caf20adaeea96c092a975ef3364aa2dcd1b8fee053dee646d909
SHA512f82f8a318084ffad33d8886576a286763c6cc2cac5832d6e412cf7a019112cbbde4874216fb489acc558d792bc943f9ca365cc6c500ea270129000e4656f5427
-
Filesize
12.9MB
MD500c5437a4f153bf1b325f648f186413b
SHA1a6b0b1a657a82fdfeabadc6c7d8121f4359690c7
SHA2560743337f37af340b16c277621ca5755a80d2e764e41b5e36a7d77cc50aa46872
SHA512834bc6042e63d2bdd4283389ae3e2ff2d3d3bff168ae1ba518b0a5963a91e6a905be9238c8ea045967520ef397b927845ce6d86475dba6f3f5f8d8b7adbd5e45
-
Filesize
1.0MB
MD542ca2cfd637cf1be4eb2b2b65316d755
SHA1b407822248eaf4afb675c3a68c2708b79d3a8b28
SHA2560555393dc84ef57d83f53bbaf9b541892cf6d66bf366b62977d2c98f038c1e74
SHA512ab363d9179190d7f1649cbeb4e4af1ee9658dc12a43918e1181eb7445d5bfccea3f60d40a2d837b5a97a4067d679808664b4a09736c94abe79acfc02c6851233
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.0MB
MD540b9628354ef4e6ef3c87934575545f4
SHA18fb5da182dea64c842953bf72fc573a74adaa155
SHA256372b14fce2eb35b264f6d4aeef7987da56d951d3a09ef866cf55ed72763caa12
SHA51202b0ea82efbfbe2e7308f86bfbec7a5109f3fe91d42731812d2e46aebedce50aabc565d2da9d3fbcd0f46febbff49c534419d1a91e0c14d5a80f06b74888c641
-
Filesize
135KB
MD5a2d70fbab5181a509369d96b682fc641
SHA122afcdc180400c4d2b9e5a6db2b8a26bff54dd38
SHA2568aed681ad8d660257c10d2f0e85ae673184055a341901643f27afc38e5ef8473
SHA512219c6e7e88004fad9f4392be9a852c58fc43b7f6900e40370991427f37eaea5c18f48d2954f9479dde8bcb787345f4e292d5620add8224aec4d93d7968820b83
-
Filesize
10.5MB
MD595a61e7f85bc8b48e6e52992d39eefc6
SHA1df90ab3e50a7e566948ff56dde540139d23934c0
SHA2560cea6a8a1b71eaaf329b70552ebe353d1a468ae2da5ac9c018d1927b55406bf5
SHA5127a2ebb2caebe5efed73b701ee96a7880dea32301776a16beb288ab008531b396d06e36f6d0c4e60590c02355b4e1fc206e1468bc181042900fc18bc7b9f20086
-
Filesize
52KB
MD5038c02b1cdce1b2738c09d9d2b8bbd74
SHA10f20d6c4a1cb65ca8a33c613b0f297148f9a39b2
SHA256ff5f5110ca6ca5d57db34ec4ea566d28d4b2535d71540331448711a25a89b3f4
SHA512afb692a8bddf29feb352a3129165c045187c5a41ac134515d5d5ff884b26f24789113929e9c49f0277b8e509755566f5725be05d15a268fd07f03771ab004717
-
Filesize
1.1MB
MD5adf82ed333fb5567f8097c7235b0e17f
SHA1e6ccaf016fc45edcdadeb40da64c207ddb33859f
SHA256d6dd7a4f46f2cfde9c4eb9463b79d5ff90fc690da14672ba1da39708ee1b9b50
SHA5122253c7b51317a3b5734025b6c7639105dbc81c340703718d679a00c13d40dd74ccaba1f6d04b21ee440f19e82ba680aa4b2a6a75c618aed91bd85a132be9fc92
-
Filesize
1.9MB
MD537c89f8997af129d230837c87997b737
SHA15031df412eaf09cc72688e7865e4604cda6c2fbd
SHA256f3ea5d6457089b4c4ab207f0b96dd5f321cdc7b3360ca27cd6ed273ec25d807e
SHA5123ede7277cb8d16c83e65bb6e6626f30b124ff9cb1579cfc8fbea7358489f9520d416238e998707219b4b0debb6cc1fc2634133f2fe9457a840d8b2bc76ddb3bf
-
Filesize
791KB
MD528431839e39dffad0485cc51b34c705f
SHA10b63857ea0abe841fdae8fd8b9f9b3ef0af881a0
SHA256d832c2fd66e09b3eb829901fa6e7a2b610a398d8e007d6352edf4763ea3ce363
SHA512cca16a18f52f2d059308214897673acd48cfca144a5075fba372ad33b8c645d202ebf32576d9d299d95e37e059d78dfdf70f7e844c479bd8c8484dc06bfe9d03
-
Filesize
10.5MB
MD535f774e65e57f419fff8d8f74945ea51
SHA1c3e1d2d50a9bbca445576e0d71c6984cc1dc60bb
SHA256d00a3e22e53210acbd5c3e39b85332e3d47c8ec001d2bbf7a13abb07427bbba2
SHA51234db08df1751754159ca37249dd8a66a811150e2a0bbdc020858f5ee55f9fb8ef763bb74bbb723633f79ea9fde8dd0feeb0c79e0c442ca6f15a8c6d8ffa58a26