Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 18:18 UTC
Behavioral task
behavioral1
Sample
iamsupersmart.exe
Resource
win7-20241010-en
General
-
Target
iamsupersmart.exe
-
Size
3.1MB
-
MD5
dda3d825becc420ec452daaff079f6b4
-
SHA1
903ab84afdb605cb965f087d10c2ec84f6facbc3
-
SHA256
0492d6d567045871e1ee3c888f02e38848020a07a261615a931782419bd3cbe3
-
SHA512
4ab3cc498ae01aa2ecf1b351746a7bb35cbae4975a1f24805a070c6421415972c0b443fb92f5f6e61d7362921c86e37e2983fd77f62d61ec229c941cd3d4209e
-
SSDEEP
49152:Nv+lL26AaNeWgPhlmVqvMQ7XSK5qOH9oGdRjvTHHB72eh2NT:NvuL26AaNeWgPhlmVqkQ7XSKkOd
Malware Config
Extracted
quasar
1.4.1
Office04
meming-28826.portmap.host:28826
6396d47d-b301-4dbd-a1c2-f92271440b4b
-
encryption_key
B323B6B4414256836290414EF6F85AFA580A2B68
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System Notification Tray
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2320-1-0x0000000000470000-0x0000000000796000-memory.dmp family_quasar behavioral2/files/0x0007000000023ca5-6.dat family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 15 IoCs
pid Process 3980 Client.exe 2796 Client.exe 4876 Client.exe 1416 Client.exe 2504 Client.exe 2396 Client.exe 4020 Client.exe 2984 Client.exe 3008 Client.exe 2344 Client.exe 3120 Client.exe 3876 Client.exe 3448 Client.exe 2712 Client.exe 2192 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3064 PING.EXE 3936 PING.EXE 2072 PING.EXE 4776 PING.EXE 3628 PING.EXE 4924 PING.EXE 2792 PING.EXE 4276 PING.EXE 992 PING.EXE 2184 PING.EXE 4776 PING.EXE 4972 PING.EXE 4644 PING.EXE 1412 PING.EXE 3556 PING.EXE -
Runs ping.exe 1 TTPs 15 IoCs
pid Process 3628 PING.EXE 2792 PING.EXE 4644 PING.EXE 4276 PING.EXE 4776 PING.EXE 1412 PING.EXE 4972 PING.EXE 2072 PING.EXE 992 PING.EXE 4776 PING.EXE 2184 PING.EXE 4924 PING.EXE 3064 PING.EXE 3936 PING.EXE 3556 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe 832 schtasks.exe 4132 schtasks.exe 4720 schtasks.exe 1748 schtasks.exe 3656 schtasks.exe 4708 schtasks.exe 3024 schtasks.exe 992 schtasks.exe 2232 schtasks.exe 3540 schtasks.exe 3052 schtasks.exe 4628 schtasks.exe 4292 schtasks.exe 3780 schtasks.exe 4624 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2320 iamsupersmart.exe Token: SeDebugPrivilege 3980 Client.exe Token: SeDebugPrivilege 2796 Client.exe Token: SeDebugPrivilege 4876 Client.exe Token: SeDebugPrivilege 1416 Client.exe Token: SeDebugPrivilege 2504 Client.exe Token: SeDebugPrivilege 2396 Client.exe Token: SeDebugPrivilege 4020 Client.exe Token: SeDebugPrivilege 2984 Client.exe Token: SeDebugPrivilege 3008 Client.exe Token: SeDebugPrivilege 2344 Client.exe Token: SeDebugPrivilege 3120 Client.exe Token: SeDebugPrivilege 3876 Client.exe Token: SeDebugPrivilege 3448 Client.exe Token: SeDebugPrivilege 2712 Client.exe Token: SeDebugPrivilege 2192 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4628 2320 iamsupersmart.exe 83 PID 2320 wrote to memory of 4628 2320 iamsupersmart.exe 83 PID 2320 wrote to memory of 3980 2320 iamsupersmart.exe 85 PID 2320 wrote to memory of 3980 2320 iamsupersmart.exe 85 PID 3980 wrote to memory of 4132 3980 Client.exe 87 PID 3980 wrote to memory of 4132 3980 Client.exe 87 PID 3980 wrote to memory of 3040 3980 Client.exe 89 PID 3980 wrote to memory of 3040 3980 Client.exe 89 PID 3040 wrote to memory of 4904 3040 cmd.exe 91 PID 3040 wrote to memory of 4904 3040 cmd.exe 91 PID 3040 wrote to memory of 4776 3040 cmd.exe 92 PID 3040 wrote to memory of 4776 3040 cmd.exe 92 PID 3040 wrote to memory of 2796 3040 cmd.exe 101 PID 3040 wrote to memory of 2796 3040 cmd.exe 101 PID 2796 wrote to memory of 3024 2796 Client.exe 104 PID 2796 wrote to memory of 3024 2796 Client.exe 104 PID 2796 wrote to memory of 4548 2796 Client.exe 107 PID 2796 wrote to memory of 4548 2796 Client.exe 107 PID 4548 wrote to memory of 1108 4548 cmd.exe 109 PID 4548 wrote to memory of 1108 4548 cmd.exe 109 PID 4548 wrote to memory of 3628 4548 cmd.exe 110 PID 4548 wrote to memory of 3628 4548 cmd.exe 110 PID 4548 wrote to memory of 4876 4548 cmd.exe 115 PID 4548 wrote to memory of 4876 4548 cmd.exe 115 PID 4876 wrote to memory of 2508 4876 Client.exe 116 PID 4876 wrote to memory of 2508 4876 Client.exe 116 PID 4876 wrote to memory of 1548 4876 Client.exe 119 PID 4876 wrote to memory of 1548 4876 Client.exe 119 PID 1548 wrote to memory of 3972 1548 cmd.exe 121 PID 1548 wrote to memory of 3972 1548 cmd.exe 121 PID 1548 wrote to memory of 3064 1548 cmd.exe 122 PID 1548 wrote to memory of 3064 1548 cmd.exe 122 PID 1548 wrote to memory of 1416 1548 cmd.exe 125 PID 1548 wrote to memory of 1416 1548 cmd.exe 125 PID 1416 wrote to memory of 4292 1416 Client.exe 127 PID 1416 wrote to memory of 4292 1416 Client.exe 127 PID 1416 wrote to memory of 2976 1416 Client.exe 130 PID 1416 wrote to memory of 2976 1416 Client.exe 130 PID 2976 wrote to memory of 1736 2976 cmd.exe 132 PID 2976 wrote to memory of 1736 2976 cmd.exe 132 PID 2976 wrote to memory of 2184 2976 cmd.exe 133 PID 2976 wrote to memory of 2184 2976 cmd.exe 133 PID 2976 wrote to memory of 2504 2976 cmd.exe 135 PID 2976 wrote to memory of 2504 2976 cmd.exe 135 PID 2504 wrote to memory of 992 2504 Client.exe 136 PID 2504 wrote to memory of 992 2504 Client.exe 136 PID 2504 wrote to memory of 3092 2504 Client.exe 139 PID 2504 wrote to memory of 3092 2504 Client.exe 139 PID 3092 wrote to memory of 2840 3092 cmd.exe 141 PID 3092 wrote to memory of 2840 3092 cmd.exe 141 PID 3092 wrote to memory of 4776 3092 cmd.exe 142 PID 3092 wrote to memory of 4776 3092 cmd.exe 142 PID 3092 wrote to memory of 2396 3092 cmd.exe 144 PID 3092 wrote to memory of 2396 3092 cmd.exe 144 PID 2396 wrote to memory of 2232 2396 Client.exe 145 PID 2396 wrote to memory of 2232 2396 Client.exe 145 PID 2396 wrote to memory of 3656 2396 Client.exe 148 PID 2396 wrote to memory of 3656 2396 Client.exe 148 PID 3656 wrote to memory of 3768 3656 cmd.exe 150 PID 3656 wrote to memory of 3768 3656 cmd.exe 150 PID 3656 wrote to memory of 4924 3656 cmd.exe 151 PID 3656 wrote to memory of 4924 3656 cmd.exe 151 PID 3656 wrote to memory of 4020 3656 cmd.exe 153 PID 3656 wrote to memory of 4020 3656 cmd.exe 153 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\iamsupersmart.exe"C:\Users\Admin\AppData\Local\Temp\iamsupersmart.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4628
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oIcVIfV4s9Kx.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4904
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4776
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OlD9SxNwKavA.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3628
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Si55dqhwbJYW.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:3972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3064
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:4292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ktOdRji7XDHx.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2184
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xtFzmz0JtqkY.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:2840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4776
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\auuJTO2IbR6K.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3768
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4924
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DG8dali1YQzC.bat" "15⤵PID:1160
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:5024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3936
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3Ug0PBAYuEvo.bat" "17⤵PID:4592
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:5012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1412
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tT6ZwAdzVW9d.bat" "19⤵PID:4976
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:988
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4972
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:4624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xf63haTDP9YN.bat" "21⤵PID:4232
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2072
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:4720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sbp4Yf5se25E.bat" "23⤵PID:3612
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:2476
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:3656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pFXhuHrOYYHQ.bat" "25⤵PID:4736
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:5024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4644
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:4708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7SNKRfmP8IVe.bat" "27⤵PID:4860
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:4916
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3556
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:3052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y5QzQgw6fWQe.bat" "29⤵PID:4608
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:3984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4276
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System Notification Tray" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:1748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J2K8IGsR06h2.bat" "31⤵PID:3292
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request98.250.22.2.in-addr.arpaIN PTRResponse98.250.22.2.in-addr.arpaIN PTRa2-22-250-98deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Request5.114.82.104.in-addr.arpaIN PTRResponse5.114.82.104.in-addr.arpaIN PTRa104-82-114-5deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Request83.137.101.95.in-addr.arpaIN PTRResponse83.137.101.95.in-addr.arpaIN PTRa95-101-137-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Request214.72.21.2.in-addr.arpaIN PTRResponse214.72.21.2.in-addr.arpaIN PTRa2-21-72-214deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Request24.113.50.184.in-addr.arpaIN PTRResponse24.113.50.184.in-addr.arpaIN PTRa184-50-113-24deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
Remote address:8.8.8.8:53Requestmeming-28826.portmap.hostIN AResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
98.250.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 135 B 1 1
DNS Request
5.114.82.104.in-addr.arpa
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
72 B 137 B 1 1
DNS Request
83.137.101.95.in-addr.arpa
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
70 B 133 B 1 1
DNS Request
214.72.21.2.in-addr.arpa
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
72 B 137 B 1 1
DNS Request
24.113.50.184.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
-
71 B 164 B 1 1
DNS Request
meming-28826.portmap.host
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58f0271a63446aef01cf2bfc7b7c7976b
SHA1b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7
SHA256da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c
SHA51278a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5
-
Filesize
207B
MD540c3af791077764f5ab701f75069e734
SHA126ef8e50b605b26d4b6b9e56c2e7df54d4d5e7d8
SHA25652591bb09609d73e87c0e11e511a5b1e160067fddfa72df7c3439bdb9cda610d
SHA5128eb5dbbfe6a89adfcb4ac131944ae1f0c2517da2746668e65668f12d800a7602b4fd45d21e8652bf3ebad3d9737d5d0bf06a999af571c94d6beb3d6ce018fbec
-
Filesize
207B
MD5697b9445f8924006e3cb8a631fb5d96d
SHA157731cec49aa38c641275cef82a511ad6a4864ab
SHA256aa6586f224ae7b4e2efac6fe1f52b7b094de6c0c076c3bd81773090c064d9b6b
SHA51273bf24503c6f2269c4a5609daf82976509dd8c9faede033bf4942ae7bcb073b40314e85776a7565e1c7490b73de7d718c49c6392bb231d8dce8f97ca6a1b23fb
-
Filesize
207B
MD58f2a1a154cae0e77c5cc80b7280510ba
SHA14366f007a7bcf1bc46f2f63d526513727fe1a9f7
SHA256cbfc699e0eac94b73e18f50d6eef0c5284b65a26ebbfc15254de99d1d9636900
SHA512254b36d77c3af43d3216cdd03f4b268ac23bdef2d55668cd2ec596b6eb2077b9a4c309102e9a2e227f35c92ad63e0066a1a26df77d80be2f6bd5ad06e9a33f71
-
Filesize
207B
MD5c0b01a3376165c94a02b64db0e3409a0
SHA1531e664050d198b28cb46cbb583d697480617a44
SHA2567e57fb158c7edb1fe8726a37f646ce4267535fa1d39dc16c591b8be5eae94cf6
SHA5125f169886b9d0a03adf80c93d510f8fd09af1c13e007dd68d3ebdde7c926ebccfbf740a2d283a148a5d7e4956699ab87c91a669cbb2c5e215b6022ef2b06a8bf4
-
Filesize
207B
MD5b32653ca30d0af87c6688c1dd738f6f1
SHA100dc7aa100464aa5d44c912cc33de4aefc83bcce
SHA256ae61513038782c1f6f550598e780446daaad6c48b0574412a670ce9349d7a96e
SHA5121e4cc912b6ba0c1fed9fc5282a56aa7d53c77a0f3c4564d82d872a285bda6547d89deddf799814c55f7c43f6d47f420f5d49a95d34eff744c29566cd626721fc
-
Filesize
207B
MD5911e8f0a405b5ac92a965a67f6395d0f
SHA1d3445d064e438756b8fb853b200b87b4f11494da
SHA25667cceb18455f8b81f11f732ae865e35f989d85d0a1c418a4560cdc157f82b758
SHA5124e5b4e8281d4672302ba28f035a5aa76be874d6f2337bea49b634e2d6c11e302561b1157c019df17f335e0dfbae16fd2605385297c040e6ebe15327075a5bb43
-
Filesize
207B
MD5b9c981d5897a0fb2ce757eaf1b6af48e
SHA17f4a3fb5a36e2f31e43b1ee0327cd883e860df9c
SHA25669e3deabfe2dccb7569e917a9681a7db1bb1b3260bbf52ff002a2670a9c2968e
SHA51201ef554e86eb4eb0ce58d78d91c6ac2fbcf4bb23e634dbf23cff1a00dcfa1cbb9bea3c048d9c1c141a24d006029d65e0d2cae82467e82d758b4eda799a98a180
-
Filesize
207B
MD5cf135e791e569acf215c5666d5b6880f
SHA1026d0e98df8f3ddc1a92b33957af3905da36ae2a
SHA2563fb457e3f5c91eeaa012625caeea59cc89622f29d95b9d8ff82c0af87cedcbe6
SHA5125210f9e24b0bdb3375df4664262de5d2416076898151ab5af036b1e5f3939c9962f58a166aa1fcb5ae3e7e1f261c4f606b5f7b4597ba699c222308f0f39135f9
-
Filesize
207B
MD5c9ec7f8e6e00e86e219393491c62d974
SHA18d488c15a5ad1c99d3519899ff7ef4d522a95099
SHA2567268fb52c10f693e1f46f99290dec22b8959c266ce474f56691a8040923539b9
SHA5122c342b7f0fcfc15c7e373edca38f24d61fc8ff1d094bc37575834fa6713dc81e1376a505929d447044b3b3c03b82580628f9b145c39d61e1dc0807bb1037e307
-
Filesize
207B
MD58959c5d75077dab60595daa344dcd85a
SHA1e8f65880ebd554ccc1b752665b1fbc9c30d60c71
SHA256ae3b3a034e04c41ff5e62eb6d255c22775e8b9e3f04c9d3b6a8f3dc3487fc602
SHA5120bb7843c8930e6604970d01d9e8d690e092a557adf26f66efbd8a8bd0f1e2312fc74022cbb1c9f859851e1eb18c9043c2a52c8ee845a3dbb0f2a250665446146
-
Filesize
207B
MD5cac691d6aff3ec9fde0e5609e911a69c
SHA1071d8242ad96fafaa2d1488cfa7edbed156502d5
SHA256d16fec18971386eea46878162101731233d72b882ea3199ff204ed4d6cfcc8f8
SHA5129532f036a28141c99827fa54437eb08be227490413788757ca3f3ba95f9e6b286f03903879ae2087f6821b81f1f27982bc7905f6dfa97d8f45260df9b190d385
-
Filesize
207B
MD5e8c625e05ae6f17a3346187c7226d032
SHA12515fd5a877b8ac74f27016e132ae87ad6d6d03c
SHA25615f039df5aea6f98f19133b12ecbec0312a1e6a048fc3ae902c6ac239d564c21
SHA512f2db2d69dd633c0b301149c55a2b7eaef59f3ad77fb5a29915f3467fe3e85afbc06f8a2893c6449bb0fd650c441fbc8d77b561f79daa9e2c07d5ba63b0e03f1d
-
Filesize
207B
MD5887a47eacf0954f114d62f659d27cff3
SHA1d042db024217309e23756bc343496a5fbf502d02
SHA2567254211c6345587971bea22736105847ac4fcfa14c3e61f914b731efc0d0be2b
SHA512690f611c0a8d74279c77aad74172d33bcaa560776a6d49048aade6ea6fa96239d0c9dcf35b535fbaa399d8693b2480e82e9b67e06e5f63876a2a66fe9ab68c3e
-
Filesize
207B
MD5ce1764ac43e1c6d925c0a743aeb7576e
SHA1262e3d514666794a46c2d71ee37a99ecbb27c953
SHA25624722f6249124289d6f9e09eb8240023a0a18c84061902c5ff3ee96bf4a5158c
SHA512a144f17bc0787daf2d5317b79ba65032f797aec892d1f7e2af954b972a53e1f38e67eb6e41a81c0433a63500afd58e75345a2d6ad77a887fb736962b47f259a9
-
Filesize
207B
MD53a8958b61a73688552bccb683178ca1d
SHA1a931e452390e48d6e6641f5d3fd10826e4447881
SHA256b0f0c61cad2d6097a5de2cd75bbde3d5abb67f1b7e46f595d37e2a4e30f8fa43
SHA512433b809876f48291257e304a8fa08add708dabe0a9bcf02a2c8748ffbbcfe4f7c5648d732fdcb06078601adcd9dcc1ca21bbe1683e94f0bd3ba5e810aa957e87
-
Filesize
3.1MB
MD5dda3d825becc420ec452daaff079f6b4
SHA1903ab84afdb605cb965f087d10c2ec84f6facbc3
SHA2560492d6d567045871e1ee3c888f02e38848020a07a261615a931782419bd3cbe3
SHA5124ab3cc498ae01aa2ecf1b351746a7bb35cbae4975a1f24805a070c6421415972c0b443fb92f5f6e61d7362921c86e37e2983fd77f62d61ec229c941cd3d4209e