Analysis
-
max time kernel
240s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-uk -
resource tags
arch:x64arch:x86image:win10v2004-20250211-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
12-02-2025 09:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lakestreetsolar.com/build.zip?mn=6761
Resource
win10v2004-20250211-uk
General
-
Target
https://lakestreetsolar.com/build.zip?mn=6761
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 40 5020 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 4424 client32.exe -
Loads dropped DLL 5 IoCs
pid Process 4424 client32.exe 4424 client32.exe 4424 client32.exe 4424 client32.exe 4424 client32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2484 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2671265011-1578681955-3068118665-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2671265011-1578681955-3068118665-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4688 NOTEPAD.EXE 456 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 4880 msedge.exe 4880 msedge.exe 1928 identity_helper.exe 1928 identity_helper.exe 2588 msedge.exe 2588 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 4936 7zG.exe Token: 35 4936 7zG.exe Token: SeSecurityPrivilege 4936 7zG.exe Token: SeSecurityPrivilege 4936 7zG.exe Token: SeSecurityPrivilege 4424 client32.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4936 7zG.exe 4424 client32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 112 OpenWith.exe 112 OpenWith.exe 112 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3620 4880 msedge.exe 85 PID 4880 wrote to memory of 3620 4880 msedge.exe 85 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2480 4880 msedge.exe 86 PID 4880 wrote to memory of 2308 4880 msedge.exe 87 PID 4880 wrote to memory of 2308 4880 msedge.exe 87 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88 PID 4880 wrote to memory of 5028 4880 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://lakestreetsolar.com/build.zip?mn=67611⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf81f46f8,0x7ffdf81f4708,0x7ffdf81f47182⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=collections --mojo-platform-channel-handle=3436 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17609248066788306132,16822229233574658900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4868
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\build\" -spe -an -ai#7zMap12960:72:7zEvent28501⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4936
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NkE5MjE5MUEtRjEzNC00RDZCLUJERDMtRjFDMjg5MzMyNDE0fSIgdXNlcmlkPSJ7RTU5MDQxQzQtMEI3OS00REMwLTlFQUYtQzZDMzdENEM2RTIwfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7REM5RkVEMTgtQ0MxRi00MjhGLTgxMjAtREUxNEQ1Njg4MzBBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MDYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI3ODAwNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzE1MzQyNzYwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2484
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\build\NSM.ini1⤵
- Opens file in notepad (likely ransom note)
PID:456
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:112
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\build\nsm_vpro.ini1⤵
- Opens file in notepad (likely ransom note)
PID:4688
-
C:\Users\Admin\Downloads\build\client32.exe"C:\Users\Admin\Downloads\build\client32.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5004d3d2aa9e0e8431f47901abb90f0ba
SHA1ce129345619faf962a256a65da4624854a4e7ece
SHA256d3b4ec4d327fc45c09cbf9a0ebf587fe7f031e89bea48b9a9b74230b87d168ab
SHA5123741e30d0d3ac72b645d43e086a294e31091c6b6a80f74b88a1f27e60490a70c17baca25387e0b54f6f90abd1eabdd8ed885bc8d554c7286f07155afdcf01381
-
Filesize
152B
MD54cafc69c423e360fae1761e5c427cae9
SHA13cebbb7de72319b47f2e9111c50a8db628cf4350
SHA256d3b9d572d6851da285d9b31ffab1a8fa414bffc689ee4b2c0118c51e26372175
SHA512549d61aa7a5526bb989de432522a0241e17669c5844b01bc4e6e768398dbe2cc46e3add8f3fc5fc0979f8bd08444ba4a3a1a930958810cd46f2c19f28435c587
-
Filesize
2.0MB
MD5a3438bc1060db9dc6d7d287f43259115
SHA1df33391e922d4ba353dc76c2f38a0bdac56cd591
SHA2566c3dec03149c475e7d69059169d3a944ce67559c33228ee45030ac18a061aac9
SHA5120297a9534795cc47f3dfb30ace3cb77fafa28d8dd2a5843598b71bb7dae3966af645739b6e4056db571322073df3dd23dbe89cddace3471a68f68151cd27fc00
-
Filesize
6KB
MD505f1cf05c67e5ee5328c49403404d126
SHA18926aaa82923ffe952e5a27c7eaac6794433349a
SHA2569cf98dd101c83ac01ece5f5ec8a6f69b5908cd841f81dc6bb80af5badefc73fd
SHA51236c3b35ab6aafff6436d552f32ed910a475a88a0b4f82bba8dade4f6169446e9570ca16e1c881df25336c0829660fa98767294df68028c18bba8883550475929
-
Filesize
6KB
MD552a32ff498df8418ac282c86df56addf
SHA1585cf6dca6980e666d4a8937104e36af92a4d117
SHA256802e1d71096c09325922a09c1d6696a5989c53dc858c776c3ab823996cf6027d
SHA51245173d622044169a5592c32531b5cb1949e7e8df6e6ea1dd8fadfcfa2d6a1f618910343067964b6f613cbccbad99faa6a0233d5e16b66cba5ec7d865d3aaae30
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58a98272320453736bc9f17a69f594012
SHA1a6f87645d322426bdefe70565a1261402941768c
SHA256eb49ef3cf66b65324d29f8f90c30a3695f48ce8f6e831a0cee1dbef696b877fb
SHA512e22d3fd4bc8d87ced753adbc7ff3d25f8871d1ff658ee4711e49eefda96213e145d9401a5624bd702b12b3af04db0144772541b8f4b892abce43721de6f6136b
-
Filesize
11KB
MD59fcab2dbd924e4515dd1831fe7920d17
SHA178c311d8f6a70793b9ed8c455227cfe2dee3dc25
SHA25653f3f934d827faa6659c50c80860660af5b0d5f0385161c2791c044f71790d39
SHA5124c6a20798094fec115552656339b71ffd241d8bdf209bb82ec9f8922ab75a9f30c7417d4af6c193027154f67d1fb776206fe8e029b138c204257145b5cf2f42a
-
Filesize
306KB
MD53eed18b47412d3f91a394ae880b56ed2
SHA11b521a3ed4a577a33cce78eee627ae02445694ab
SHA25613a17f2ad9288aac8941d895251604beb9524fa3c65c781197841ee15480a13f
SHA512835f35af4fd241caa8b6a639626b8762db8525ccceb43afe8fffc24dffad76ca10852a5a8e9fc114bfbf7d1dc1950130a67037fc09b63a74374517a1f5448990
-
Filesize
262B
MD5b9956282a0fed076ed083892e498ac69
SHA1d14a665438385203283030a189ff6c5e7c4bf518
SHA256fcc6afd664a8045bd61c398be3c37a97536a199a48d277e11977f93868ae1acc
SHA5127daa09113c0e8a36c91cc6d657c65851a20dff6b60ac3d2f40c5737c12c1613c553955f84d131ba2139959973fef9fc616ca5e968cb16c25acf2d4739eed87eb
-
Filesize
5KB
MD599f493dce7fab330dc47f0cab8fe6172
SHA116906fb5988303bb462b65ff4ece23539a12f4b5
SHA256e0ed36c897eaa5352fab181c20020b60df4c58986193d6aaf5bf3e3ecdc4c05d
SHA5122c58171c30aec8ae131a7c32162856fce551b55f861d0d9fb0e27a91bd7084388df5860392f80cdbc6df6e64e97d8bf2cae587c3d6b7c142ce711ae8e240bb01
-
Filesize
27KB
MD5e311935a26ee920d5b7176cfa469253c
SHA1eda6c815a02c4c91c9aacd819dc06e32ececf8f0
SHA2560038ab626624fa2df9f65dd5e310b1206a9cd4d8ab7e65fb091cc25f13ebd34e
SHA51248164e8841cfc91f4cbf4d3291d4f359518d081d9079a7995378f970e4085b534f4bafc15b83f4824cc79b5a1e54457b879963589b1acbcfe727a03eb3dffd1c
-
Filesize
3.3MB
MD577b3988cbae5a2550caec42cc5e8ec35
SHA15fa1eeb60e881bfd82eb7c3d9e911587982aaa38
SHA256650382fe6596c8dc0c1739713c2076d4ddff32d5c177210b1241550bb8148cfd
SHA512480f3abef7b799bd604ba9825e2b8cf681e7850373761c579ef181607980d5159c225fb486996e3088f39662f873743d25b52368045d3ae5bd8d45e44d1e8bec
-
Filesize
117KB
MD51c19c2e97c5e6b30de69ee684e6e5589
SHA15734ef7f9e4dba0639c98881e00f03eea35a62ee
SHA256312a0e4db34a40cb95ba1fac8bf87deb45d0c5f048d38ac65eb060273b07df67
SHA512ab7240b81be04f1bced47701a5791bbeedcba6037ee936327478c304aa1ce5ae75856ca7f568f909f847e27db2a6b9c08db7cc1057a18fab14a39a5854f15cba
-
Filesize
731B
MD59ff762ddf8745986af8d1644963d34ff
SHA12d15dca3f43a0b91f87520db813329142452236a
SHA2566859ad91454f4afe277821949caa4172661541b8d02e780c31faaea2ebcafd75
SHA5129990cac92e4671435a964a57cb1e9ee1776a3f605c5be40a258f7058785f7f373bc22b49a427af81c99d096b395bd1a388d443175c5ccfc4a06942019d4fd26d
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
46B
MD53be27483fdcdbf9ebae93234785235e3
SHA1360b61fe19cdc1afb2b34d8c25d8b88a4c843a82
SHA2564bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b
SHA512edbe8cf1cbc5fed80fedf963ade44e08052b19c064e8bca66fa0fe1b332141fbe175b8b727f8f56978d1584baaf27d331947c0b3593aaff5632756199dc470e5
-
Filesize
44KB
MD59daa86d91a18131d5caf49d14fb8b6f2
SHA16b2f7ceb6157909e114a2b05a48a1a2606b5caf1
SHA2561716640cce74322f7ee3e3e02b75cd53b91686f66e389d606dab01bd9f88c557
SHA5129a98e0d9e2dda8aefa54bddb3c7b71501d638dff68863939de6caa117b0e7bf15e581a75419ef8a0da3f1c56a19f1b0f4c86d65f8581773ab88ff5764b9bb3aa