Overview
overview
10Static
static
1008751be484...2d.dll
windows10-ltsc 2021-x64
100a9f79abd4...51.exe
windows10-ltsc 2021-x64
30di3x.exe
windows10-ltsc 2021-x64
102019-09-02...10.exe
windows10-ltsc 2021-x64
102c01b00772...eb.exe
windows10-ltsc 2021-x64
1031.exe
windows10-ltsc 2021-x64
103DMark 11 ...on.exe
windows10-ltsc 2021-x64
342f9729255...61.exe
windows10-ltsc 2021-x64
105da0116af4...18.exe
windows10-ltsc 2021-x64
1069c56d12ed...6b.exe
windows10-ltsc 2021-x64
10905d572f23...50.exe
windows10-ltsc 2021-x64
10948340be97...54.exe
windows10-ltsc 2021-x64
1095560f1a46...f9.dll
windows10-ltsc 2021-x64
3Archive.zi...3e.exe
windows10-ltsc 2021-x64
8DiskIntern...en.exe
windows10-ltsc 2021-x64
3ForceOp 2....ce.exe
windows10-ltsc 2021-x64
7HYDRA.exe
windows10-ltsc 2021-x64
10KLwC6vii.exe
windows10-ltsc 2021-x64
1Keygen.exe
windows10-ltsc 2021-x64
10Lonelyscre...ox.exe
windows10-ltsc 2021-x64
3LtHv0O2KZDK4M637.exe
windows10-ltsc 2021-x64
10Magic_File...ja.exe
windows10-ltsc 2021-x64
3OnlineInstaller.exe
windows10-ltsc 2021-x64
8Remouse.Mi...cg.exe
windows10-ltsc 2021-x64
3SecuriteIn...dE.exe
windows10-ltsc 2021-x64
10SecuriteIn...ee.dll
windows10-ltsc 2021-x64
10SecurityTa...up.exe
windows10-ltsc 2021-x64
4Treasure.V...ox.exe
windows10-ltsc 2021-x64
3VyprVPN.exe
windows10-ltsc 2021-x64
10WSHSetup[1].exe
windows10-ltsc 2021-x64
3Yard.dll
windows10-ltsc 2021-x64
10b2bd3de3e5...2).exe
windows10-ltsc 2021-x64
10Resubmissions
16-02-2025 01:02
250216-bd8gxstmfr 1013-02-2025 19:41
250213-yd78gssrap 1011-02-2025 00:12
250211-ahcqdasrbz 10Analysis
-
max time kernel
220s -
max time network
210s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-01-2025 20:27
Static task
static1
Behavioral task
behavioral1
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
0di3x.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
2019-09-02_22-41-10.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
31.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
3DMark 11 Advanced Edition.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
42f972925508a82236e8533567487761.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral9
Sample
5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral10
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral11
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral12
Sample
948340be97cc69c2cf8e5c8327ee52a89eeb50095f978696c710ad773a46b654.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral13
Sample
95560f1a465e8ba87a73f8e60a6657545073d55c3b5cfc2ffdaf3d69d46afcf9.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral14
Sample
Archive.zip__ccacaxs2tbz2t6ob3e.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral15
Sample
DiskInternals_Uneraser_v5_keygen.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral16
Sample
ForceOp 2.8.7 - By RaiSence.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral17
Sample
HYDRA.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral18
Sample
KLwC6vii.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral19
Sample
Keygen.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral20
Sample
Lonelyscreen.1.2.9.keygen.by.Paradox.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral21
Sample
LtHv0O2KZDK4M637.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral22
Sample
Magic_File_v3_keygen_by_KeygenNinja.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral23
Sample
OnlineInstaller.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral24
Sample
Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral26
Sample
SecuriteInfo.com.Generic.mg.cde56cf0169830ee.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral27
Sample
SecurityTaskManager_Setup.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral28
Sample
Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral29
Sample
VyprVPN.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral30
Sample
WSHSetup[1].exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral31
Sample
Yard.dll
Resource
win10ltsc2021-20250113-en
General
-
Target
VyprVPN.exe
-
Size
1.6MB
-
MD5
f1d5f022e71b8bc9e3241fbb72e87be2
-
SHA1
1b8abac6f9ffc3571b14c68ae1bc5e7568b4106c
-
SHA256
08fb58bfaee81d99cbb71bf71ba8f2ab4f107563c5b0c3f20484d096b337e50d
-
SHA512
f16130958a3ff33b21623881cbdeec018dd031b4aeb01bbb676c4bdeb1ec1d4f7d312efab48b4125eaaf6ea1c8b0aa4e037b1959af1f10c2a55fbc2da9f3924f
-
SSDEEP
24576:nTadGsNY1i8fWCsSpqq5M0bOk61uyG2CWm3U9X+Y0ttcN0sH2U9:nsGsm1qSp/MzRuI19X+Y0w39
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\WinService.exe" Clipper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\WinService.exe" Clipper.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation joinResult.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation Clipper.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation 1111.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation VyprVPN.exe -
Executes dropped EXE 6 IoCs
pid Process 4612 joinResult.exe 220 VyprVPN.exe 3708 1111.exe 4080 Clipper.exe 1624 WinService.exe 3136 WinService.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 VyprVPN.exe 4612 joinResult.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3708 1111.exe 3708 1111.exe 3708 1111.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VyprVPN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joinResult.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VyprVPN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4952 cmd.exe 1968 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral29/files/0x0028000000046141-9.dat nsis_installer_1 behavioral29/files/0x0028000000046141-9.dat nsis_installer_2 -
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff VyprVPN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings VyprVPN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" VyprVPN.exe Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 VyprVPN.exe Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 VyprVPN.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags VyprVPN.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1968 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3708 1111.exe 3708 1111.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4080 Clipper.exe Token: SeDebugPrivilege 1624 WinService.exe Token: SeDebugPrivilege 3136 WinService.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3708 1111.exe 220 VyprVPN.exe 220 VyprVPN.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4612 2564 VyprVPN.exe 81 PID 2564 wrote to memory of 4612 2564 VyprVPN.exe 81 PID 2564 wrote to memory of 4612 2564 VyprVPN.exe 81 PID 2564 wrote to memory of 220 2564 VyprVPN.exe 82 PID 2564 wrote to memory of 220 2564 VyprVPN.exe 82 PID 2564 wrote to memory of 220 2564 VyprVPN.exe 82 PID 4612 wrote to memory of 3708 4612 joinResult.exe 83 PID 4612 wrote to memory of 3708 4612 joinResult.exe 83 PID 4612 wrote to memory of 3708 4612 joinResult.exe 83 PID 4612 wrote to memory of 4080 4612 joinResult.exe 84 PID 4612 wrote to memory of 4080 4612 joinResult.exe 84 PID 4080 wrote to memory of 4828 4080 Clipper.exe 86 PID 4080 wrote to memory of 4828 4080 Clipper.exe 86 PID 4080 wrote to memory of 1624 4080 Clipper.exe 88 PID 4080 wrote to memory of 1624 4080 Clipper.exe 88 PID 3708 wrote to memory of 4952 3708 1111.exe 89 PID 3708 wrote to memory of 4952 3708 1111.exe 89 PID 3708 wrote to memory of 4952 3708 1111.exe 89 PID 4952 wrote to memory of 1968 4952 cmd.exe 91 PID 4952 wrote to memory of 1968 4952 cmd.exe 91 PID 4952 wrote to memory of 1968 4952 cmd.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VyprVPN.exe"C:\Users\Admin\AppData\Local\Temp\VyprVPN.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\1337\joinResult.exe"C:\Users\Admin\AppData\Roaming\1337\joinResult.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\1337\1111.exe"C:\Users\Admin\AppData\Roaming\1337\1111.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 3 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\1337\1111.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 3 -w 30005⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1968
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\Clipper.exe"C:\Users\Admin\AppData\Roaming\1337\Clipper.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Service" /tr "C:\Users\Admin\WinService.exe" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4828
-
-
C:\Users\Admin\WinService.exe"C:\Users\Admin\WinService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
-
C:\Users\Admin\AppData\Roaming\1337\VyprVPN.exe"C:\Users\Admin\AppData\Roaming\1337\VyprVPN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Users\Admin\WinService.exe"C:\Users\Admin\WinService.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
1.4MB
MD532373185ece79936dfd0fd41d2848a2e
SHA1591f92bcaeeea85e8bba6988ef0d1afcea35fbbd
SHA2565390fc20629a4a350dc8f0482472f9962f50364b7818b2d510beb4e520581ad4
SHA512443b8df46dd6009285500148d2c4e0654e20e24b897fb29a9eded1cb21da6c495feaa1df81043ed4818f6ea511813c926e9f645b3ec4c8ab5c2c79f0fb5859dc
-
Filesize
18KB
MD5c7e43ab36c3da3371fc915de9dc5106f
SHA1f1bb12ae485853c1a28a8306604ef3eb3939068d
SHA2564ff04b9be72efe982594832d51681c08334f4d8512c3560c646c21f88fd5e532
SHA512383a02a7a338ca66077f5d577ae7f63f95cf1b711f1338e9dd11867a62d6dc298e0fd01878adc273669f5f1e8cffb0aa4ea3efa75ffb870616a0d3fef3cb454e
-
Filesize
3.2MB
MD525e9776bb3965060ac5d9234fd25a11d
SHA15df6e261a930c0068c94542ef5180722a513e4fb
SHA2568321b2785893442efeedddc40f0979563e8e2fc1a51cc3e4ee93d6f36d4e154d
SHA5128735acb4bad98ad06b9cee96cda9a3c5026e5f584bd4efb782cf9a8a6f3ea9e39f7d280497dabbb5f6662a6a63bb9a6674c4c020bc73669517b05d0e708d0d7c
-
Filesize
1.8MB
MD579022fbafee9fe740a5230f87bd33171
SHA142bf0f7bf41009fd0009535a8b1162cbe60dce6f
SHA256640c30cfa519be11c02c4e51bf18979a93266887cc9ef19076b3d0f1f20528b6
SHA51248e0d4a18d99dce4398de73895a157e13293115b52ee5158f9ea6fc73c4d5f4133e1cebba14ff5482b8c4f7dfeebfe3b003df1caf351314f1cc16944818df4b3