Analysis
-
max time kernel
189s -
max time network
191s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-01-2025 04:28
Static task
static1
Behavioral task
behavioral1
Sample
Sapphire cracked.rar
Resource
win10ltsc2021-20250113-en
General
-
Target
Sapphire cracked.rar
-
Size
21.2MB
-
MD5
f608f91e4c33f55ca812f0ea45ea9de5
-
SHA1
e5c6099ecb4508743d2c06ae8c6889b54fb0e413
-
SHA256
2f1e1ddd259e08981adaf33623c97bec1dcf34bd31712cc23fbec49a56c7c019
-
SHA512
5f94f14a34c9b4893ed4363c916ab02dd3949fcfd1e661b379c9849b2f4951a24213f54dc737739aaf2bd3e7d03e3de0b82d669fbdc133bfd2b9cce7328025d6
-
SSDEEP
393216:ZzlUG2B6c9auujELA+n7b7WbdLz4oUQGvN+LMX2f17Dpd+l+ETM1jGI:Z+jBh97uju7nWbdfW/v4eqVVsQ1jR
Malware Config
Extracted
xworm
christian-betting.gl.at.ply.gg:48781
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7242122864:AAGtpRgIM7E1A3mlOYz1ioh5Jyg1HJtYIyg/sendMessage?chat_id=6229207397
Extracted
asyncrat
FUCKED BY CODEX17
105.100.184.221:38672
-
delay
3
-
install
true
-
install_file
Anti Malwer servise.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x002b00000004625e-44.dat family_xworm behavioral1/memory/4684-55-0x00000000001D0000-0x00000000001E6000-memory.dmp family_xworm -
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002a00000004625f-71.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 416 powershell.exe 5100 powershell.exe 4640 powershell.exe 1000 powershell.exe 2312 powershell.exe 4912 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation Anti Malwer service.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation loader.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation Microsoft update.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft update.lnk Microsoft update.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft update.lnk Microsoft update.exe -
Executes dropped EXE 9 IoCs
pid Process 3332 loader.exe 820 loader.exe 4684 Microsoft update.exe 2236 Anti Malwer service.exe 5032 Anti Malwer servise.exe 4480 main.exe 3376 main.exe 3116 main.exe 2316 main.exe -
Loads dropped DLL 38 IoCs
pid Process 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 3376 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe 2316 main.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anti Malwer service = "C:\\Windows\\System32\\Anti Malwer service.exe" loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft update = "C:\\ProgramData\\Microsoft update" Microsoft update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft update = "C:\\Windows\\System32\\Microsoft update.exe" loader.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\Microsoft update.exe loader.exe File opened for modification C:\Windows\System32\Microsoft update.exe loader.exe File created C:\Windows\System32\Anti Malwer service.exe loader.exe File opened for modification C:\Windows\System32\Anti Malwer service.exe loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4784 timeout.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zG.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 7zFM.exe 2180 7zFM.exe 5100 powershell.exe 5100 powershell.exe 4640 powershell.exe 4640 powershell.exe 2180 7zFM.exe 2180 7zFM.exe 1000 powershell.exe 1000 powershell.exe 2312 powershell.exe 2312 powershell.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2236 Anti Malwer service.exe 2180 7zFM.exe 2180 7zFM.exe 4912 powershell.exe 4912 powershell.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 416 powershell.exe 416 powershell.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 5032 Anti Malwer servise.exe 5032 Anti Malwer servise.exe 5032 Anti Malwer servise.exe 5032 Anti Malwer servise.exe 5032 Anti Malwer servise.exe 5032 Anti Malwer servise.exe 5032 Anti Malwer servise.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2180 7zFM.exe 2344 OpenWith.exe 4920 7zG.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2180 7zFM.exe Token: 35 2180 7zFM.exe Token: SeSecurityPrivilege 2180 7zFM.exe Token: SeDebugPrivilege 820 loader.exe Token: SeDebugPrivilege 5100 powershell.exe Token: SeIncreaseQuotaPrivilege 5100 powershell.exe Token: SeSecurityPrivilege 5100 powershell.exe Token: SeTakeOwnershipPrivilege 5100 powershell.exe Token: SeLoadDriverPrivilege 5100 powershell.exe Token: SeSystemProfilePrivilege 5100 powershell.exe Token: SeSystemtimePrivilege 5100 powershell.exe Token: SeProfSingleProcessPrivilege 5100 powershell.exe Token: SeIncBasePriorityPrivilege 5100 powershell.exe Token: SeCreatePagefilePrivilege 5100 powershell.exe Token: SeBackupPrivilege 5100 powershell.exe Token: SeRestorePrivilege 5100 powershell.exe Token: SeShutdownPrivilege 5100 powershell.exe Token: SeDebugPrivilege 5100 powershell.exe Token: SeSystemEnvironmentPrivilege 5100 powershell.exe Token: SeRemoteShutdownPrivilege 5100 powershell.exe Token: SeUndockPrivilege 5100 powershell.exe Token: SeManageVolumePrivilege 5100 powershell.exe Token: 33 5100 powershell.exe Token: 34 5100 powershell.exe Token: 35 5100 powershell.exe Token: 36 5100 powershell.exe Token: SeDebugPrivilege 4684 Microsoft update.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeIncreaseQuotaPrivilege 4640 powershell.exe Token: SeSecurityPrivilege 4640 powershell.exe Token: SeTakeOwnershipPrivilege 4640 powershell.exe Token: SeLoadDriverPrivilege 4640 powershell.exe Token: SeSystemProfilePrivilege 4640 powershell.exe Token: SeSystemtimePrivilege 4640 powershell.exe Token: SeProfSingleProcessPrivilege 4640 powershell.exe Token: SeIncBasePriorityPrivilege 4640 powershell.exe Token: SeCreatePagefilePrivilege 4640 powershell.exe Token: SeBackupPrivilege 4640 powershell.exe Token: SeRestorePrivilege 4640 powershell.exe Token: SeShutdownPrivilege 4640 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeSystemEnvironmentPrivilege 4640 powershell.exe Token: SeRemoteShutdownPrivilege 4640 powershell.exe Token: SeUndockPrivilege 4640 powershell.exe Token: SeManageVolumePrivilege 4640 powershell.exe Token: 33 4640 powershell.exe Token: 34 4640 powershell.exe Token: 35 4640 powershell.exe Token: 36 4640 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeIncreaseQuotaPrivilege 1000 powershell.exe Token: SeSecurityPrivilege 1000 powershell.exe Token: SeTakeOwnershipPrivilege 1000 powershell.exe Token: SeLoadDriverPrivilege 1000 powershell.exe Token: SeSystemProfilePrivilege 1000 powershell.exe Token: SeSystemtimePrivilege 1000 powershell.exe Token: SeProfSingleProcessPrivilege 1000 powershell.exe Token: SeIncBasePriorityPrivilege 1000 powershell.exe Token: SeCreatePagefilePrivilege 1000 powershell.exe Token: SeBackupPrivilege 1000 powershell.exe Token: SeRestorePrivilege 1000 powershell.exe Token: SeShutdownPrivilege 1000 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeSystemEnvironmentPrivilege 1000 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 2180 7zFM.exe 4920 7zG.exe 4920 7zG.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 3332 loader.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe 2344 OpenWith.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3332 2180 7zFM.exe 90 PID 2180 wrote to memory of 3332 2180 7zFM.exe 90 PID 2180 wrote to memory of 3332 2180 7zFM.exe 90 PID 3332 wrote to memory of 820 3332 loader.exe 93 PID 3332 wrote to memory of 820 3332 loader.exe 93 PID 820 wrote to memory of 5100 820 loader.exe 94 PID 820 wrote to memory of 5100 820 loader.exe 94 PID 820 wrote to memory of 4684 820 loader.exe 97 PID 820 wrote to memory of 4684 820 loader.exe 97 PID 820 wrote to memory of 4640 820 loader.exe 98 PID 820 wrote to memory of 4640 820 loader.exe 98 PID 820 wrote to memory of 2236 820 loader.exe 100 PID 820 wrote to memory of 2236 820 loader.exe 100 PID 4684 wrote to memory of 1000 4684 Microsoft update.exe 101 PID 4684 wrote to memory of 1000 4684 Microsoft update.exe 101 PID 4684 wrote to memory of 2312 4684 Microsoft update.exe 103 PID 4684 wrote to memory of 2312 4684 Microsoft update.exe 103 PID 2236 wrote to memory of 2084 2236 Anti Malwer service.exe 105 PID 2236 wrote to memory of 2084 2236 Anti Malwer service.exe 105 PID 2236 wrote to memory of 1736 2236 Anti Malwer service.exe 106 PID 2236 wrote to memory of 1736 2236 Anti Malwer service.exe 106 PID 4684 wrote to memory of 4912 4684 Microsoft update.exe 108 PID 4684 wrote to memory of 4912 4684 Microsoft update.exe 108 PID 1736 wrote to memory of 4784 1736 cmd.exe 111 PID 1736 wrote to memory of 4784 1736 cmd.exe 111 PID 2084 wrote to memory of 984 2084 cmd.exe 112 PID 2084 wrote to memory of 984 2084 cmd.exe 112 PID 4684 wrote to memory of 416 4684 Microsoft update.exe 113 PID 4684 wrote to memory of 416 4684 Microsoft update.exe 113 PID 1736 wrote to memory of 5032 1736 cmd.exe 115 PID 1736 wrote to memory of 5032 1736 cmd.exe 115 PID 2180 wrote to memory of 4480 2180 7zFM.exe 117 PID 2180 wrote to memory of 4480 2180 7zFM.exe 117 PID 4480 wrote to memory of 3376 4480 main.exe 119 PID 4480 wrote to memory of 3376 4480 main.exe 119 PID 3376 wrote to memory of 3016 3376 main.exe 120 PID 3376 wrote to memory of 3016 3376 main.exe 120 PID 3116 wrote to memory of 2316 3116 main.exe 126 PID 3116 wrote to memory of 2316 3116 main.exe 126 PID 2316 wrote to memory of 4588 2316 main.exe 127 PID 2316 wrote to memory of 4588 2316 main.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Sapphire cracked.rar"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\7zO488A1EA7\loader.exe"C:\Users\Admin\AppData\Local\Temp\7zO488A1EA7\loader.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Microsoft update.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\System32\Microsoft update.exe"C:\Windows\System32\Microsoft update.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Microsoft update.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft update.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft update'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft update'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Anti Malwer service.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\System32\Anti Malwer service.exe"C:\Windows\System32\Anti Malwer service.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Anti Malwer servise" /tr '"C:\Users\Admin\AppData\Roaming\Anti Malwer servise.exe"' & exit5⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Anti Malwer servise" /tr '"C:\Users\Admin\AppData\Roaming\Anti Malwer servise.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE72.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:4784
-
-
C:\Users\Admin\AppData\Roaming\Anti Malwer servise.exe"C:\Users\Admin\AppData\Roaming\Anti Malwer servise.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO48829418\main.exe"C:\Users\Admin\AppData\Local\Temp\7zO48829418\main.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\onefile_4480_133821668296329814\main.exe"C:\Users\Admin\AppData\Local\Temp\7zO48829418\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c4⤵PID:3016
-
-
-
-
C:\Users\Admin\Desktop\main.exe"C:\Users\Admin\Desktop\main.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\onefile_3116_133821668596782863\main.exe"C:\Users\Admin\Desktop\main.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c3⤵PID:4588
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2344
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3228
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Sapphire cracked\" -ad -an -ai#7zMap9490:112:7zEvent254641⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4920
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD57c210d26bf2aae0fc96e43bf74413e35
SHA1c65eb19db41e245f20708dca3ca0af6294f2fc92
SHA2567bc74f71af2970cf5dad083b553d9bfa99f3e2cfdf852e58a6535947b161faf3
SHA5124edec3ba971b4044d2f780213e1511598a94547e17bb8124374eabe82bc7bbc9c25710cba704da08d8ff8a368b482377ade8fcf113a77e707eeda14c2ad5b4c3
-
Filesize
1KB
MD514ade977d5aee19d8d43a5545fb17aa4
SHA12f09f41411cd31ea761e878ef477a0a15f037823
SHA256313690a5bea10becc948a438d4197abe7d6116e1f36cc094bfe63ac4b76bc704
SHA512f7bf8a2e6a5fe5e4c60873e8e053227f7fdeb46a7336d95ae08b3aefa3e46c4310ac5185903f9854172604b1f1cdfffa7a9aeeea11464adebe6d999f46f999c9
-
Filesize
1KB
MD57d3fcbd974402bcf07859a7e2867995b
SHA144a1838ee3c43b6fe7995d1d70d9d1c8bd42322e
SHA256b990fd327f9072e44f095f3140b32bbe64cec1e636fc0fbbbe70001b922815dc
SHA51251359315d8924dd46fba66980a2543059ddc6304a416c5a44b48a07426a9efa59a56ba94462e65e35a5f05bd640ea34aaca9aa5ee33f2f1309d64cb753ba6a45
-
Filesize
1KB
MD5c67441dfa09f61bca500bb43407c56b8
SHA15a56cf7cbeb48c109e2128c31b681fac3959157b
SHA25663082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33
SHA512325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8
-
Filesize
1KB
MD50351b6d5385995efd8f0f96e10779d90
SHA11503b8b19f80adf6ff439b97825adc798b5025d5
SHA256cfa345952ebffdddb214c2f7da3b33515841602a93173f9635c9513a6cad685d
SHA51280be5424fc5e3eec6ff41475b05d03b75c80de5f6477c9084f9da374b7197056a84432c17e8cb77e9d3c08fbd01f9fca9c6b4859e2f984d4de70ce704b855cae
-
Filesize
17.5MB
MD592f642212cdbe6ac3a8e6f48243a2489
SHA16c5b3c6fa506dc92cd0bb4aa36dc4ccdac77a727
SHA256ef24286fb0f5c05f739109f955521ae44bc74b52414c05722a06daccc07ca4e6
SHA5120af07851e1d2f014efe2ca6a943999cb746fa595dca564b18d3226bbb4866f4c4c642d6eaa2126297cbcb11fdcaa6c721a24c44d678aa643e1e2a32029480e95
-
Filesize
84KB
MD52c119b471487fae7eebcd22c7746efeb
SHA1b92b287f22632435922efe2709216a18e9ce757e
SHA25658b842fff163e515f57a9a84bc99dd50a04c4239a5ddadd3a50f85bb284bbf80
SHA51209d233982aba3a10798af9a6cc20e3e2b256b3ca69205f547b19b433540a216af4e660a6d57cfb0c8332ae621755ceae375dab073d7039f8f8d2990171838c85
-
Filesize
120KB
MD56114277c6fc040f68d25ca90e25924cd
SHA1028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA51276e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d
-
Filesize
77KB
MD564a6c475f59e5c57b3f4dd935f429f09
SHA1ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973
-
Filesize
771KB
MD564acb046fe68d64ee475e19f67253a3c
SHA1d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766
-
Filesize
17.8MB
MD5181458ffd109573a1cde903e187b0b46
SHA16822c8b9cad8f13f3c0921205ada08efd693d93e
SHA256b177778656455f6b8482154238d323a3de4d74f2a8b7a62bd973251a259edb87
SHA5120f771e01e5f89dd83a8e46d129a7975b6ca395369d82411c9864805f1efa9ab7051e6caa24a5fad121391a25cb84dc991845da976265f3d67f8528aa01a280a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
79KB
MD56facc160d1b1371185d386ceabaf1405
SHA1799e39422e9ff2ef7e5678334ff7570dbbd300b8
SHA25651e3c235469680b64d2e315739d33f0f4f1acc10cf95b62846e4f3d61dfd2a3b
SHA512557f1742ac7d9e15cc88b0bbfc27aa666e137a6b4d76c083353266bf76c7df9efe58e16410fc09d1d78a8342c8a63dbdb246351c0b20b5366532590e29fd3f45
-
Filesize
82KB
MD54438affaaa0ca1df5b9b1cdaa0115ec1
SHA14eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA5126992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6
-
Filesize
247KB
MD5be315973aff9bdeb06629cd90e1a901f
SHA1151f98d278e1f1308f2be1788c9f3b950ab88242
SHA2560f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA5128ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8
-
Filesize
63KB
MD51524882af71247adecf5815a4e55366a
SHA1e25014c793c53503bdff9af046140edda329d01b
SHA2566f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA5125b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a
-
Filesize
155KB
MD5737119a80303ef4eccaa998d500e7640
SHA1328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA2567158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA5121c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c
-
Filesize
31KB
MD58bbed19359892f8c95c802c6ad7598e9
SHA1773fca164965241f63170e7a1f3a8fa17f73ea18
SHA2564e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065
SHA51222ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0
-
Filesize
172KB
MD5a0b40f1f8fc6656c5637eacacf7021f6
SHA138813e25ffde1eee0b8154fa34af635186a243c1
SHA25679d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713
-
Filesize
24KB
MD54faa479423c54d5be2a103b46ecb4d04
SHA1011f6cdbd3badaa5c969595985a9ad18547dd7ec
SHA256c2ad3c1b4333bc388b6a22049c89008505c434b1b85bff0823b19ef0cf48065a
SHA51292d35824c30667af606bba883bf6e275f2a8b5cbfea2e84a77e256d122b91b3ee7e84d9f4e2a4946e903a11293af9648a45e8cfbe247cbdc3bcdea92eb5349c6
-
Filesize
10KB
MD5723ec2e1404ae1047c3ef860b9840c29
SHA18fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA5122e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878
-
Filesize
116KB
MD59ea8098d31adb0f9d928759bdca39819
SHA1e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA2563d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA51286af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707
-
Filesize
4.9MB
MD57a6a8c2a8c379b111cdceb66b18d687d
SHA1f3b8a4c731fa0145f224112f91f046fddf642794
SHA2568e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
15.0MB
MD5b47518a173e1dd0c6064a0e4c19b16dd
SHA163e59684ffe68cf6491fdc8e0ada2beac232456e
SHA256eef1b2d466cfd73df414c4088a7f0b85bec5afc1cb7eedb529223032269704be
SHA512814a00260d125ca08887c5e405eddfa2fee5bb57e155ceb15c20c50d88144ab6c3a3c08c23a9a82e7bcdf0dd3a4199880d2a2d45d7978595dd4fdb174c7c9a8a
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
29KB
MD5653bdccb7af2aa9ccf50cb050fd3be64
SHA1afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA51207e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277
-
Filesize
1.1MB
MD51905b5d0f945499441e8cd58eb123d86
SHA1117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
162B
MD5d7250a30a0eb4d5bc05a7ab0e24fc7f1
SHA175d505d48d1f741fad7e5a6451cd1727c311f6ab
SHA256f85c56e21c7c1d5e6860c2a90f7c4132a6e915ac85df6fd76e7ef1ea62f38f74
SHA51206a676bb2cba34fc47f5793d21ab99c4a87fe5a02d0e1e2b6245e0c1408e68a0a777bae9b9907e1a369c7d815131592e5755a4ab75dda228113722cfbbf1752f
-
Filesize
63KB
MD53765e67cc9717c80aa52b49a76c304a0
SHA129197d4b2451d279c93e29a687813c82ae385a6a
SHA256521aebf8d36328cd45320ee2fd34c0d0abe0083b91a3a7d95898ca01bcc4d57c
SHA512d32108332d1793b7d2603df6a3d0809a1127971ffff33b5d65de5e6e782cb8914202ffcbceb815239bbeb55ce9345b1e80af21a7400ee68829bd3e8c51bf717d
-
Filesize
59KB
MD53b52ac71e533dbb3bbd28dabc0ebb1d2
SHA149842aae543779f3fac7f29b47b65c524d9b4455
SHA256920bab2ecc69073ef556feb6253198c6de51c7f3b4175871e47a2734b1bf95e2
SHA512a911786e6208c018bfeeca85589aa085ccf4de89d3515ff479c4fb2f9d69a573598ed7703e87757d27fcf047437c9e93e5e5e401b1e5c271fc1f04dfdd5c81bc