Overview
overview
10Static
static
10fda9c8dc11...6c.exe
windows7-x64
10fda9c8dc11...6c.exe
windows10-2004-x64
10fda9c8dc11...6c.exe
android-9-x86
fda9c8dc11...6c.exe
android-10-x64
fda9c8dc11...6c.exe
android-11-x64
fda9c8dc11...6c.exe
macos-10.15-amd64
fda9c8dc11...6c.exe
ubuntu-18.04-amd64
fda9c8dc11...6c.exe
debian-9-armhf
fda9c8dc11...6c.exe
debian-9-mips
fda9c8dc11...6c.exe
debian-9-mipsel
Analysis
-
max time kernel
899s -
max time network
429s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 04:25
Behavioral task
behavioral1
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral10
Sample
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe
-
Size
1.8MB
-
MD5
8fbadab3fee07f074017c6b0a9804bdf
-
SHA1
87a4b286a1d2d88c3d0e037bbabc485c9b62d7d8
-
SHA256
fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c
-
SHA512
0333207cee1e97189b031cdcef05450510c2d1f77fe3e45afedec1a5f2ebf307a634320f99c8689696ad5f74c2fb7270e4061ed7e13cde195982d5cafdd3402a
-
SSDEEP
12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUef:ujjSYIUDJ86giGTPQDbGV6eH81kT
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c96-21.dat warzonerat behavioral2/files/0x000800000000070b-213.dat warzonerat -
Executes dropped EXE 35 IoCs
pid Process 1160 StikyNot.exe 208 StikyNot.exe 2880 StikyNot.exe 2228 StikyNot.exe 4984 StikyNot.exe 1584 StikyNot.exe 688 StikyNot.exe 392 StikyNot.exe 64 StikyNot.exe 4752 StikyNot.exe 1392 StikyNot.exe 4604 StikyNot.exe 3896 StikyNot.exe 3088 StikyNot.exe 544 StikyNot.exe 1528 StikyNot.exe 2924 StikyNot.exe 1388 StikyNot.exe 4972 StikyNot.exe 3612 StikyNot.exe 1892 StikyNot.exe 4896 StikyNot.exe 3832 StikyNot.exe 4624 StikyNot.exe 4856 StikyNot.exe 3992 StikyNot.exe 5088 StikyNot.exe 4248 StikyNot.exe 884 StikyNot.exe 5008 StikyNot.exe 1736 StikyNot.exe 5080 StikyNot.exe 2884 StikyNot.exe 4088 StikyNot.exe 1252 StikyNot.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe -
Suspicious use of SetThreadContext 33 IoCs
description pid Process procid_target PID 4460 set thread context of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 set thread context of 4756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 100 PID 1160 set thread context of 208 1160 StikyNot.exe 102 PID 1160 set thread context of 2524 1160 StikyNot.exe 103 PID 2880 set thread context of 2228 2880 StikyNot.exe 105 PID 2880 set thread context of 4964 2880 StikyNot.exe 106 PID 4984 set thread context of 1584 4984 StikyNot.exe 108 PID 4984 set thread context of 4760 4984 StikyNot.exe 109 PID 688 set thread context of 392 688 StikyNot.exe 111 PID 688 set thread context of 4128 688 StikyNot.exe 112 PID 64 set thread context of 4752 64 StikyNot.exe 114 PID 64 set thread context of 1940 64 StikyNot.exe 115 PID 1392 set thread context of 4604 1392 StikyNot.exe 117 PID 1392 set thread context of 1048 1392 StikyNot.exe 118 PID 3896 set thread context of 3088 3896 StikyNot.exe 120 PID 3896 set thread context of 2336 3896 StikyNot.exe 121 PID 544 set thread context of 2924 544 StikyNot.exe 124 PID 544 set thread context of 4392 544 StikyNot.exe 125 PID 1528 set thread context of 1388 1528 StikyNot.exe 126 PID 1528 set thread context of 2384 1528 StikyNot.exe 127 PID 4972 set thread context of 3612 4972 StikyNot.exe 129 PID 1892 set thread context of 4896 1892 StikyNot.exe 132 PID 3832 set thread context of 4624 3832 StikyNot.exe 135 PID 4856 set thread context of 3992 4856 StikyNot.exe 138 PID 4856 set thread context of 4888 4856 StikyNot.exe 139 PID 5088 set thread context of 4248 5088 StikyNot.exe 141 PID 5088 set thread context of 3084 5088 StikyNot.exe 142 PID 884 set thread context of 5008 884 StikyNot.exe 144 PID 884 set thread context of 1528 884 StikyNot.exe 145 PID 1736 set thread context of 5080 1736 StikyNot.exe 147 PID 1736 set thread context of 4448 1736 StikyNot.exe 148 PID 2884 set thread context of 4088 2884 StikyNot.exe 150 PID 2884 set thread context of 1352 2884 StikyNot.exe 151 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskperf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StikyNot.exe -
NTFS ADS 13 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe 4756 diskperf.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 756 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 756 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 208 StikyNot.exe 208 StikyNot.exe 2228 StikyNot.exe 2228 StikyNot.exe 1584 StikyNot.exe 1584 StikyNot.exe 392 StikyNot.exe 392 StikyNot.exe 4752 StikyNot.exe 4752 StikyNot.exe 4604 StikyNot.exe 4604 StikyNot.exe 3088 StikyNot.exe 3088 StikyNot.exe 2924 StikyNot.exe 1388 StikyNot.exe 2924 StikyNot.exe 1388 StikyNot.exe 3612 StikyNot.exe 3612 StikyNot.exe 4896 StikyNot.exe 4896 StikyNot.exe 4624 StikyNot.exe 4624 StikyNot.exe 3992 StikyNot.exe 3992 StikyNot.exe 4248 StikyNot.exe 4248 StikyNot.exe 5008 StikyNot.exe 5008 StikyNot.exe 5080 StikyNot.exe 5080 StikyNot.exe 4088 StikyNot.exe 4088 StikyNot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 99 PID 4460 wrote to memory of 4756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 100 PID 4460 wrote to memory of 4756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 100 PID 4460 wrote to memory of 4756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 100 PID 4460 wrote to memory of 4756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 100 PID 4460 wrote to memory of 4756 4460 fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe 100 PID 4756 wrote to memory of 1160 4756 diskperf.exe 101 PID 4756 wrote to memory of 1160 4756 diskperf.exe 101 PID 4756 wrote to memory of 1160 4756 diskperf.exe 101 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 208 1160 StikyNot.exe 102 PID 1160 wrote to memory of 2524 1160 StikyNot.exe 103 PID 1160 wrote to memory of 2524 1160 StikyNot.exe 103 PID 1160 wrote to memory of 2524 1160 StikyNot.exe 103 PID 1160 wrote to memory of 2524 1160 StikyNot.exe 103 PID 1160 wrote to memory of 2524 1160 StikyNot.exe 103 PID 4756 wrote to memory of 2880 4756 diskperf.exe 104 PID 4756 wrote to memory of 2880 4756 diskperf.exe 104 PID 4756 wrote to memory of 2880 4756 diskperf.exe 104 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 2228 2880 StikyNot.exe 105 PID 2880 wrote to memory of 4964 2880 StikyNot.exe 106 PID 2880 wrote to memory of 4964 2880 StikyNot.exe 106 PID 2880 wrote to memory of 4964 2880 StikyNot.exe 106 PID 2880 wrote to memory of 4964 2880 StikyNot.exe 106 PID 2880 wrote to memory of 4964 2880 StikyNot.exe 106 PID 4756 wrote to memory of 4984 4756 diskperf.exe 107 PID 4756 wrote to memory of 4984 4756 diskperf.exe 107 PID 4756 wrote to memory of 4984 4756 diskperf.exe 107 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 1584 4984 StikyNot.exe 108 PID 4984 wrote to memory of 4760 4984 StikyNot.exe 109 PID 4984 wrote to memory of 4760 4984 StikyNot.exe 109 PID 4984 wrote to memory of 4760 4984 StikyNot.exe 109 PID 4984 wrote to memory of 4760 4984 StikyNot.exe 109 PID 4984 wrote to memory of 4760 4984 StikyNot.exe 109 PID 4756 wrote to memory of 688 4756 diskperf.exe 110 PID 4756 wrote to memory of 688 4756 diskperf.exe 110 PID 4756 wrote to memory of 688 4756 diskperf.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exeC:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exeC:\Users\Admin\AppData\Local\Temp\fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:208
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2524 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3088
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2336 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"8⤵PID:3448
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:884 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"8⤵PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1252
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2228
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4964 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:544 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3612
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:912
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:688 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:392
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4128 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:2384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:64 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1048 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4248
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:3084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4888 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeC:\Users\Admin\AppData\Local\Chrome\StikyNot.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5080
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD53190046d06010327d5f1ea103a985bbe
SHA146323e6baa7a832b8d925e011a034395635cb2af
SHA2568555703c101712b4f11a68a1344fdd4d83a50794579ca7fe09ea14155ebc9b08
SHA51255846a7eef737cd02fc0925035a962724bf778d0a039a55e69c7541f650ff7f3ef00a45e1965f7d2587110b421cb19f100940347fe9bcaea98e7a433d839be5f
-
Filesize
64KB
MD5f037e9de6541f9ecce2a4600bbe7d2bc
SHA11e62d8bebff13f7084493c0368da2290bef7bc6c
SHA256dbb0ff78995451c3ce2a3204b7854bc577efddb54a4e1b154e1ce56347e9b90a
SHA51208e60802aac6ff8b6654a16995b32acb363db6166ae9ae8b4c3013baeba31c6f2c6be00667eef29d84360cb670aae5de040d508eb7eb3d8fe92dc3e3a1138a4b
-
Filesize
1.8MB
MD58fbadab3fee07f074017c6b0a9804bdf
SHA187a4b286a1d2d88c3d0e037bbabc485c9b62d7d8
SHA256fda9c8dc11e87a2253800b7a579ef3e12c43e383a8294e081088ac63e697086c
SHA5120333207cee1e97189b031cdcef05450510c2d1f77fe3e45afedec1a5f2ebf307a634320f99c8689696ad5f74c2fb7270e4061ed7e13cde195982d5cafdd3402a