Malware Analysis Report

2025-04-03 09:53

Sample ID 250216-3j9qqasqat
Target b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
SHA256 b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5d
Tags
rat netwire warzonerat botnet discovery infostealer stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5d

Threat Level: Known bad

The file b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe was found to be: Known bad.

Malicious Activity Summary

rat netwire warzonerat botnet discovery infostealer stealer

NetWire RAT payload

Netwire

Netwire family

WarzoneRat, AveMaria

Warzonerat family

Warzone RAT payload

Downloads MZ/PE file

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

AutoIT Executable

Suspicious use of SetThreadContext

Unsigned PE

System Network Configuration Discovery: Internet Connection Discovery

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-16 23:33

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Netwire family

netwire

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-16 23:33

Reported

2025-02-16 23:35

Platform

win7-20240903-en

Max time kernel

120s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe"

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

Netwire family

netwire

WarzoneRat, AveMaria

rat infostealer warzonerat

Warzonerat family

warzonerat

Warzone RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Blasthost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2836 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2836 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2836 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2836 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2744 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2744 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2744 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2744 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2836 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 2836 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 2836 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 2836 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 2836 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 2836 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 2836 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 2836 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 2836 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 2836 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 2588 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 1588 wrote to memory of 2272 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1588 wrote to memory of 2272 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1588 wrote to memory of 2272 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1588 wrote to memory of 2272 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2272 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2272 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2272 wrote to memory of 1444 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2272 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 1592 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2272 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 2272 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 2272 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 2272 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1592 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1592 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1592 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1592 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1592 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1592 wrote to memory of 2128 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1588 wrote to memory of 300 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1588 wrote to memory of 300 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1588 wrote to memory of 300 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1588 wrote to memory of 300 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 300 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 300 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 300 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 300 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 300 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 300 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe

"C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe"

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe

"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"

C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe

"C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {F823542A-156F-489A-9A0B-EAB882A9DAAD} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp

Files

memory/2836-0-0x0000000001240000-0x00000000013AB000-memory.dmp

\Users\Admin\AppData\Roaming\Blasthost.exe

MD5 6087bf6af59b9c531f2c9bb421d5e902
SHA1 8bc0f1596c986179b82585c703bacae6d2a00316
SHA256 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512 c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

memory/2744-24-0x0000000000400000-0x000000000042C000-memory.dmp

memory/2588-29-0x0000000000080000-0x000000000009D000-memory.dmp

memory/2588-39-0x0000000000080000-0x000000000009D000-memory.dmp

memory/2588-36-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2836-26-0x0000000000900000-0x0000000000901000-memory.dmp

memory/2588-27-0x0000000000080000-0x000000000009D000-memory.dmp

memory/2836-41-0x0000000001240000-0x00000000013AB000-memory.dmp

memory/2176-42-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2176-44-0x0000000000260000-0x0000000000261000-memory.dmp

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

MD5 f069a59cc61e58df3719fffba86bb7a1
SHA1 dfea3fcaa878fb47d4edb2e0337fa8b277001a88
SHA256 6adc90da447260df838bd6837d489d80c63caa767b99c08bf090f087f66dcd0f
SHA512 f43bc12786bfd3a5e34e41d38ec4da3b43e1384d55b2839441ab98ddb032d7ab3d7af227c9f912bc211b2e21615bd609d16489fc54ddcfcbcafd6db058198a83

memory/2272-49-0x0000000000C50000-0x0000000000DBB000-memory.dmp

memory/1592-74-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2272-78-0x0000000000C50000-0x0000000000DBB000-memory.dmp

memory/2128-81-0x0000000000120000-0x0000000000121000-memory.dmp

memory/2884-85-0x0000000000400000-0x000000000042C000-memory.dmp

memory/1444-86-0x0000000000400000-0x000000000042C000-memory.dmp

memory/300-113-0x0000000000C50000-0x0000000000DBB000-memory.dmp

memory/1712-117-0x00000000002E0000-0x00000000002E1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-16 23:33

Reported

2025-02-16 23:35

Platform

win10v2004-20250207-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe"

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

Netwire family

netwire

WarzoneRat, AveMaria

rat infostealer warzonerat

Warzonerat family

warzonerat

Warzone RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Downloads MZ/PE file

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Blasthost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3836 wrote to memory of 5052 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 3836 wrote to memory of 5052 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 3836 wrote to memory of 5052 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 5052 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 5052 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 5052 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 3836 wrote to memory of 384 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 3836 wrote to memory of 384 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 3836 wrote to memory of 384 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 3836 wrote to memory of 384 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 3836 wrote to memory of 384 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe
PID 384 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 3836 wrote to memory of 4420 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 3836 wrote to memory of 4420 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 3836 wrote to memory of 4420 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\schtasks.exe
PID 384 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe C:\Windows\SysWOW64\cmd.exe
PID 1968 wrote to memory of 436 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1968 wrote to memory of 436 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1968 wrote to memory of 436 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1968 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1968 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1968 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1968 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1968 wrote to memory of 1764 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1764 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1764 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1764 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1968 wrote to memory of 3316 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1968 wrote to memory of 3316 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1968 wrote to memory of 3316 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1764 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1764 wrote to memory of 3360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 5024 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 5024 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 5024 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 5024 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 5024 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 5024 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 5024 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 5024 wrote to memory of 4264 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 4264 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4264 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4264 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 5024 wrote to memory of 4700 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 5024 wrote to memory of 4700 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 5024 wrote to memory of 4700 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 4264 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4264 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe

"C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe"

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe

"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"

C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe

"C:\Users\Admin\AppData\Local\Temp\b0ac6fffd11e27a439f6521acb07dfc3c6889420028a7b7fefd2b4049190cb5dN.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjAxMzExOTA5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 msedge.api.cdp.microsoft.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
IE 4.245.161.190:443 msedge.api.cdp.microsoft.com tcp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 msedge.b.tlu.dl.delivery.mp.microsoft.com udp
GB 104.77.160.86:80 msedge.b.tlu.dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp

Files

memory/3836-0-0x0000000000C00000-0x0000000000D6B000-memory.dmp

C:\Users\Admin\AppData\Roaming\Blasthost.exe

MD5 6087bf6af59b9c531f2c9bb421d5e902
SHA1 8bc0f1596c986179b82585c703bacae6d2a00316
SHA256 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512 c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

memory/5052-11-0x0000000000400000-0x000000000042C000-memory.dmp

memory/3836-14-0x00000000022B0000-0x00000000022B1000-memory.dmp

memory/384-15-0x0000000000400000-0x000000000041D000-memory.dmp

memory/384-23-0x0000000000400000-0x000000000041D000-memory.dmp

memory/3836-25-0x0000000000C00000-0x0000000000D6B000-memory.dmp

memory/1144-26-0x0000000000D50000-0x0000000000D51000-memory.dmp

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

MD5 2a1760e6bd952229c08fe7e77eefb609
SHA1 13eaae4749ebc94c3735e7742e4214007dae9c3a
SHA256 74b38aae34455b1e242a8763cdf651362cf4f0c828e176d69b0f0c0fdf7f7b60
SHA512 349f1904dd5248ccd7552951e09cb4ad0c2ba1984cc4d4602fdea0bf5ed7fe1a8ebd9cd4430012c5b1d5e9a4efc1dde09810ba4b86b632e2475c1cc1989572f8

memory/1968-29-0x0000000000350000-0x00000000004BB000-memory.dmp

memory/1764-38-0x0000000000E60000-0x0000000000E7D000-memory.dmp

memory/1764-46-0x0000000000E60000-0x0000000000E7D000-memory.dmp

memory/1968-47-0x0000000000350000-0x00000000004BB000-memory.dmp

memory/3360-48-0x00000000007F0000-0x00000000007F1000-memory.dmp

memory/4348-50-0x0000000000400000-0x000000000042C000-memory.dmp

memory/436-52-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4348-55-0x0000000000400000-0x000000000042C000-memory.dmp

memory/436-61-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4264-65-0x0000000000C70000-0x0000000000C8D000-memory.dmp

memory/4264-73-0x0000000000C70000-0x0000000000C8D000-memory.dmp

memory/5024-74-0x0000000000350000-0x00000000004BB000-memory.dmp

memory/4612-76-0x0000000000800000-0x0000000000801000-memory.dmp

memory/5080-79-0x0000000000400000-0x000000000042C000-memory.dmp