Analysis
-
max time kernel
100s -
max time network
100s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20/01/2025, 22:36
Static task
static1
General
-
Target
data-Setup.7z
-
Size
116.3MB
-
MD5
3152ed0815d3eb095c6e9c8469d99b77
-
SHA1
addf193abcafc1d6099b787ae7be873c79b4f365
-
SHA256
b99fa29a917eb26f7dd60427f9d4e261e95e06354e570b0e7f7c759672b9ebe7
-
SHA512
b7eae4d1cd9c6c3edce37f2601e1f3528689d459c1780558a17ccaa770d189f6413f6b51105dac595d3afb9d95a28c24b7e5a7d0bdcdfd3cb1788fe672e918b4
-
SSDEEP
3145728:+bjzx3kP0uuE0SWwn8lkUXljGeHS4RG9MGbVOKHntLCJCIXrd:Yz9kP0ut0Pwno1jGeySG9JVgJCIXrd
Malware Config
Extracted
https://micfriosogprodnorthghostcom.top/kjgkjlKLkjfjkrhjHRGHKLNMREJGHKJnlGKL3454345BFJKKJnVBEKERJKRGEGREGRGERGERWBFDGGBTfgfbergsc4334ggd/lice
https://micfriosogprodnorthghostcom.top/kjgkjlKLkjfjkrhjHRGHKLNMREJGHKJnlGKL3454345BFJKKJnVBEKERJKRGEGREGRGERGERWBFDGGBTfgfbergsc4334ggd/lice
Extracted
vidar
fc0stn
https://t.me/w0ctzn
https://steamcommunity.com/profiles/76561199817305251
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Signatures
-
Vidar family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 41 4924 powershell.exe 43 4924 powershell.exe -
pid Process 4924 powershell.exe 4444 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4420 Setup.exe 4072 7za.exe 1636 JEHQLI9D.exe 4536 JEHQLI9D.exe 4776 EJRB2QN5.exe -
Loads dropped DLL 1 IoCs
pid Process 4420 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1636 set thread context of 4536 1636 JEHQLI9D.exe 112 -
resource yara_rule behavioral1/files/0x00280000000462a8-361.dat upx behavioral1/memory/4776-367-0x00007FF6B0870000-0x00007FF6B08B4000-memory.dmp upx behavioral1/memory/3572-371-0x00007FF6B0870000-0x00007FF6B08B5000-memory.dmp upx behavioral1/memory/4776-373-0x00007FF6B0870000-0x00007FF6B08B4000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1016 1636 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JEHQLI9D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JEHQLI9D.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3448 timeout.exe 812 timeout.exe -
Modifies registry class 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy!Se Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy!Se = "0" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\ApplicationFrame Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy!Se = f4010000f4010000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SplashScreen Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy!Se = 2c0000000000000001000000ffffffffffffffffffffffffffffffff280000002000000058030000a1020000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4924 powershell.exe 4924 powershell.exe 4924 powershell.exe 4444 powershell.exe 4444 powershell.exe 4776 EJRB2QN5.exe 4776 EJRB2QN5.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3816 7zFM.exe 3572 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3816 7zFM.exe Token: 35 3816 7zFM.exe Token: SeSecurityPrivilege 3816 7zFM.exe Token: SeRestorePrivilege 4072 7za.exe Token: 35 4072 7za.exe Token: SeSecurityPrivilege 4072 7za.exe Token: SeSecurityPrivilege 4072 7za.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeIncreaseQuotaPrivilege 4444 powershell.exe Token: SeSecurityPrivilege 4444 powershell.exe Token: SeTakeOwnershipPrivilege 4444 powershell.exe Token: SeLoadDriverPrivilege 4444 powershell.exe Token: SeSystemProfilePrivilege 4444 powershell.exe Token: SeSystemtimePrivilege 4444 powershell.exe Token: SeProfSingleProcessPrivilege 4444 powershell.exe Token: SeIncBasePriorityPrivilege 4444 powershell.exe Token: SeCreatePagefilePrivilege 4444 powershell.exe Token: SeBackupPrivilege 4444 powershell.exe Token: SeRestorePrivilege 4444 powershell.exe Token: SeShutdownPrivilege 4444 powershell.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeSystemEnvironmentPrivilege 4444 powershell.exe Token: SeRemoteShutdownPrivilege 4444 powershell.exe Token: SeUndockPrivilege 4444 powershell.exe Token: SeManageVolumePrivilege 4444 powershell.exe Token: 33 4444 powershell.exe Token: 34 4444 powershell.exe Token: 35 4444 powershell.exe Token: 36 4444 powershell.exe Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE Token: SeShutdownPrivilege 3572 Explorer.EXE Token: SeCreatePagefilePrivilege 3572 Explorer.EXE -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3816 7zFM.exe 3816 7zFM.exe 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE 3572 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3572 Explorer.EXE 4648 SecHealthUI.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2892 4420 Setup.exe 96 PID 4420 wrote to memory of 2892 4420 Setup.exe 96 PID 2892 wrote to memory of 4072 2892 cmd.exe 98 PID 2892 wrote to memory of 4072 2892 cmd.exe 98 PID 2892 wrote to memory of 4072 2892 cmd.exe 98 PID 2892 wrote to memory of 3448 2892 cmd.exe 99 PID 2892 wrote to memory of 3448 2892 cmd.exe 99 PID 2892 wrote to memory of 4300 2892 cmd.exe 101 PID 2892 wrote to memory of 4300 2892 cmd.exe 101 PID 2892 wrote to memory of 812 2892 cmd.exe 103 PID 2892 wrote to memory of 812 2892 cmd.exe 103 PID 4300 wrote to memory of 1476 4300 cmd.exe 104 PID 4300 wrote to memory of 1476 4300 cmd.exe 104 PID 1476 wrote to memory of 1956 1476 net.exe 105 PID 1476 wrote to memory of 1956 1476 net.exe 105 PID 4300 wrote to memory of 4924 4300 cmd.exe 106 PID 4300 wrote to memory of 4924 4300 cmd.exe 106 PID 4924 wrote to memory of 4444 4924 powershell.exe 108 PID 4924 wrote to memory of 4444 4924 powershell.exe 108 PID 4924 wrote to memory of 1636 4924 powershell.exe 111 PID 4924 wrote to memory of 1636 4924 powershell.exe 111 PID 4924 wrote to memory of 1636 4924 powershell.exe 111 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 1636 wrote to memory of 4536 1636 JEHQLI9D.exe 112 PID 4924 wrote to memory of 4776 4924 powershell.exe 116 PID 4924 wrote to memory of 4776 4924 powershell.exe 116 PID 4776 wrote to memory of 3572 4776 EJRB2QN5.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3572 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\data-Setup.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3816
-
-
C:\Users\Admin\Desktop\data-Setup\Setup.exe"C:\Users\Admin\Desktop\data-Setup\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Desktop\data-Setup\data\extract_and_run.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\Desktop\data-Setup\data\7za.exe7za.exe e bin.zip -pYOUR_PASSWORD -oextracted_107984⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:3448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "extracted_10798\sss.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\net.exenet session5⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session6⤵PID:1956
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\Desktop\data-Setup\data\extracted_10798\script.ps1"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\AppData\Roaming\JEHQLI9D.exe"C:\Users\Admin\AppData\Roaming\JEHQLI9D.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\JEHQLI9D.exe"C:\Users\Admin\AppData\Roaming\JEHQLI9D.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 8247⤵
- Program crash
PID:1016
-
-
-
C:\Users\Admin\AppData\Roaming\EJRB2QN5.exe"C:\Users\Admin\AppData\Roaming\EJRB2QN5.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776
-
-
-
-
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:812
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1636 -ip 16361⤵PID:1936
-
C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe"C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4648
-
C:\Windows\System32\SecurityHealthHost.exeC:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding1⤵PID:1016
-
C:\Windows\System32\SecurityHealthHost.exeC:\Windows\System32\SecurityHealthHost.exe {E041C90B-68BA-42C9-991E-477B73A75C90} -Embedding1⤵PID:896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5df6406cd9dd08d4c3a98406429014919
SHA10ee31fc0cf7e3869eb129ddb0beec3c986f98679
SHA256b2f9eb7ce9315eb0df084d113846b6ddbecf5aa5a69e502ff2d705690e5a14a6
SHA512942c718b4faa8d96ea12c48411cf4d79edf528e582f77e13d03a0775e6b7544b7f72cfa226b649bb6354fd82287bbe6afa9ca723c0a1ddff3bfb5facf30e6d45
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
75KB
MD5d13676d884225dd662b6789ec20c145e
SHA1b3858094c110eda769715c5367163b04849d2d7f
SHA256a3e36e02d09862c67f41684c729456d8437cfe0ae31ce791e72602632135fdfa
SHA512906bc0de46831730f65d5ca7534e7ae3a6655058f70624b57ba4cce553f82fd7537277af40fe5866615bf4507e9a852594f74b7ab03ad8967f1bbaa82a159d39
-
Filesize
397KB
MD54dc8411aa4571161e5f6bc4e96ddb094
SHA16252ab9adc1cf93d2918ff6286f936958e7e6a22
SHA2561df05a570b28509499093d3a23a9af6127bc1edf4866b6cc8dc3152484922891
SHA51207700d830029cd4f078d6d6f02598d24bdc8db07e07d6251c1ac75580ee67c31f27296ba18b7cb54b2b197ac7c5c1e55830c7e9a30d961d45b5591266697afae
-
Filesize
44KB
MD5f86507ff0856923a8686d869bbd0aa55
SHA1d561b9cdbba69fdafb08af428033c4aa506802f8
SHA25694f4fd6f2cb781ae7839ad2ee0322df732c8c7297e62834457662f8cde29dcbb
SHA5126c1c073fc09498407b2c6b46d7a7e04c2db3c6f8d68c0dc0775211864c4508c48c2bd92e3849dc3805caacc856f9e31e1eea118661a55f526bfa61638f88c3da
-
Filesize
828KB
MD5426ccb645e50a3143811cfa0e42e2ba6
SHA13c17e212a5fdf25847bc895460f55819bf48b11d
SHA256cf878bfbd9ed93dc551ac038aff8a8bba4c935ddf8d48e62122bddfdb3e08567
SHA5121ab13e8e6e0ca4ca2039f104d53a5286c4196e930319c4fe374fa3bf415214bb7c7d2a9d8ca677a29c911a356cca19a1cecae16dd4bf840bce725f20de4c8ff2
-
Filesize
1KB
MD521489353fdeeb875137d1a4f63695edc
SHA1c002d1a161e1912f6de52af4fb90cc3cfe4e1a01
SHA256382acdf2a33e5c09d9c679997bdbc1c9d0cd1a2abd903846c66a55517aa9ce00
SHA51257a5abacbf69c21c3c836185df1ca4a319226c71d1d4101189e4cedaf5475fad1101a7c75d35bc1e2b2b59f40104de6f7d06e4cd114d948cc829e7c509e96034
-
Filesize
952B
MD5fae61599308bbc78cae99ebdcb666f43
SHA1de0a1d2344b09b29b1040bd4904f604a47a6d8c6
SHA256f65af4a3d9d7f4464de4f7c136122f548c3b662a389e569d842be7e3a60d7863
SHA5128e3d8d8ed97e65acd719d60624fa5c5506696e6fbbad5b0466748cccc24832e130bdf584fe0ce55f14628c68ca0a602310f7cb964cd38cf56735a6c64e4ddbf3
-
Filesize
2KB
MD5d11c3a63c5ba659b5fe7b5534cb03df5
SHA1d08b1e6af9e5c66454236e5ba64e4c3659db4c47
SHA25602fba22cf32e907760e64c7e4bc4803e2b5395a7eef2091f3f0c9c103aaa3187
SHA512a62a807f7ec5ca51ae392f10b68f3b6a326ae596ee2fdd4da662e58662142d5842d8e8abf1f7a84aba85ef2b067803733301b769024ae8c7bc3ce625c485b4ec
-
Filesize
405B
MD59ca3883fd45a5a455e64704ac6151ac9
SHA1e7f89032ce544253a51020d7e894f6919fc35839
SHA256c981688479756c987d6207e5804ed2b97fb50dfc80469309646c3f79d5ed05b4
SHA512e5746faaae0680f68295db94f3865a7ec56663553d7401f996cce18bdc67ade23aef10c81018da28992e82a8178dc8a567b5b355479c7ceedfb87e46be9efa5a
-
Filesize
218KB
MD519f2358e19e6216a1c869fd86cd38df6
SHA1ec475b62bd4162615509ed1bf597b670392965e6
SHA256fc67d0ecb73cc51baa0f0f1e2a13fc18d8a9bdfca6f5ffaedd61d2c2eb9cb864
SHA512c009f5a2a917cd3a4159ac895d0621b433e73997c87cbf50a80e43d55a743aec7ba0681c29066e35afc25c1fa60c6f5a7257c9b6667f8e13722e314e75e0dd48