Malware Analysis Report

2025-04-03 09:53

Sample ID 250217-gqbxdasqcw
Target c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c
SHA256 c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c
Tags
rat netwire warzonerat botnet discovery infostealer stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c

Threat Level: Known bad

The file c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c was found to be: Known bad.

Malicious Activity Summary

rat netwire warzonerat botnet discovery infostealer stealer

Netwire family

Warzonerat family

NetWire RAT payload

WarzoneRat, AveMaria

Netwire

Warzone RAT payload

Downloads MZ/PE file

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Suspicious use of SetThreadContext

AutoIT Executable

Unsigned PE

System Network Configuration Discovery: Internet Connection Discovery

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-17 06:00

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Netwire family

netwire

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-17 06:00

Reported

2025-02-17 06:02

Platform

win7-20240729-en

Max time kernel

148s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe"

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

Netwire family

netwire

WarzoneRat, AveMaria

rat infostealer warzonerat

Warzonerat family

warzonerat

Warzone RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Blasthost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2120 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2120 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2120 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2120 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2152 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2152 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2152 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2152 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 2120 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 2120 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 2120 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 2120 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 2120 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 2120 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 2748 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 2748 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 2748 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 2748 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 2120 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2120 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2120 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2120 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 2748 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 2748 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 1680 wrote to memory of 1892 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1680 wrote to memory of 1892 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1680 wrote to memory of 1892 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1680 wrote to memory of 1892 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1892 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1892 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1892 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1892 wrote to memory of 448 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1892 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1892 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1892 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1892 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1892 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1892 wrote to memory of 1408 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1408 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1408 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1408 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1408 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1892 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1892 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1892 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1892 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 1408 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1408 wrote to memory of 2868 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 1680 wrote to memory of 1996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1680 wrote to memory of 1996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1680 wrote to memory of 1996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1680 wrote to memory of 1996 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1996 wrote to memory of 388 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1996 wrote to memory of 388 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1996 wrote to memory of 388 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1996 wrote to memory of 388 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 1996 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1996 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1996 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1996 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1996 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 1996 wrote to memory of 2980 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2980 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 2980 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe

"C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe"

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe

"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"

C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe

"C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Windows\system32\taskeng.exe

taskeng.exe {1DC1D15C-0732-46AF-9B90-46DA418C6C82} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp

Files

memory/2120-0-0x0000000000C40000-0x0000000000DAB000-memory.dmp

\Users\Admin\AppData\Roaming\Blasthost.exe

MD5 6087bf6af59b9c531f2c9bb421d5e902
SHA1 8bc0f1596c986179b82585c703bacae6d2a00316
SHA256 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512 c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

memory/2152-24-0x0000000000400000-0x000000000042C000-memory.dmp

memory/2120-26-0x0000000000A30000-0x0000000000A31000-memory.dmp

memory/2748-27-0x0000000000080000-0x000000000009D000-memory.dmp

memory/2748-36-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2748-39-0x0000000000080000-0x000000000009D000-memory.dmp

memory/2748-30-0x0000000000080000-0x000000000009D000-memory.dmp

memory/2120-41-0x0000000000C40000-0x0000000000DAB000-memory.dmp

memory/2664-42-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2664-44-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2192-47-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

MD5 92625519d360760c661e92668cef8be3
SHA1 ec31fd70090cc8c76768a827538f9bbf46d99d35
SHA256 a56fa31df1af6c03d9debd2c191390eb63eefa4f7c01d654103c152072a19dc3
SHA512 8394bf5cdca99ee3101de8b7d96f42ac193ad8e67969ed138c4e328de993ee30f8fd8ed5f116b0742f9f40517abd07235fd921437b66b3c9233b5df2389aa1a1

memory/1892-54-0x0000000000390000-0x00000000004FB000-memory.dmp

memory/1408-79-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/1892-83-0x0000000000390000-0x00000000004FB000-memory.dmp

memory/2868-86-0x0000000000160000-0x0000000000161000-memory.dmp

memory/2192-90-0x0000000000400000-0x000000000042C000-memory.dmp

memory/448-91-0x0000000000400000-0x000000000042C000-memory.dmp

memory/1996-118-0x0000000000390000-0x00000000004FB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-17 06:00

Reported

2025-02-17 06:02

Platform

win10v2004-20250211-en

Max time kernel

147s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe"

Signatures

NetWire RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Netwire

botnet stealer netwire

Netwire family

netwire

WarzoneRat, AveMaria

rat infostealer warzonerat

Warzonerat family

warzonerat

Warzone RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Downloads MZ/PE file

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Blasthost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4056 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 4056 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 4056 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 3212 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 3212 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 3212 wrote to memory of 3324 N/A C:\Users\Admin\AppData\Roaming\Blasthost.exe C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
PID 4056 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 4056 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 4056 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 4056 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 4056 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe
PID 388 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 388 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 388 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 4056 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 4056 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 4056 wrote to memory of 2152 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\schtasks.exe
PID 388 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 388 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe C:\Windows\SysWOW64\cmd.exe
PID 2224 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2224 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2224 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 2224 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2224 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2224 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2224 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2224 wrote to memory of 4944 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 2224 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 2224 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 2224 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 4944 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4944 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4944 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4944 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4944 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4760 wrote to memory of 4104 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 4760 wrote to memory of 4104 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 4760 wrote to memory of 4104 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\Blasthost.exe
PID 4760 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 4760 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 4760 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 4760 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 4760 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
PID 4348 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4348 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4348 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4760 wrote to memory of 4428 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 4760 wrote to memory of 4428 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 4760 wrote to memory of 4428 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\schtasks.exe
PID 4348 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe
PID 4348 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe

"C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe"

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe

"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"

C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe

"C:\Users\Admin\AppData\Local\Temp\c53cfc1df2307e828e05c506ce2d7930a522f96b480129e78d5793e5bb6a3f6c.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjY3Mzc3NTI5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

C:\Users\Admin\AppData\Roaming\Blasthost.exe

"C:\Users\Admin\AppData\Roaming\Blasthost.exe"

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F

Network

Country Destination Domain Proto
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 msedge.api.cdp.microsoft.com udp
US 172.169.87.222:443 msedge.api.cdp.microsoft.com tcp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 msedge.b.tlu.dl.delivery.mp.microsoft.com udp
IT 91.80.49.20:80 msedge.b.tlu.dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 wealthyme.ddns.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp
US 8.8.8.8:53 Wealthy2019.com.strangled.net udp
US 8.8.8.8:53 wealth.warzonedns.com udp

Files

memory/4056-0-0x0000000000FD0000-0x000000000113B000-memory.dmp

C:\Users\Admin\AppData\Roaming\Blasthost.exe

MD5 6087bf6af59b9c531f2c9bb421d5e902
SHA1 8bc0f1596c986179b82585c703bacae6d2a00316
SHA256 3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512 c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

memory/3212-12-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4056-14-0x0000000001280000-0x0000000001281000-memory.dmp

memory/388-15-0x0000000000400000-0x000000000041D000-memory.dmp

memory/388-23-0x0000000000400000-0x000000000041D000-memory.dmp

memory/4056-25-0x0000000000FD0000-0x000000000113B000-memory.dmp

memory/2116-26-0x0000000001490000-0x0000000001491000-memory.dmp

memory/3324-28-0x0000000000400000-0x000000000042C000-memory.dmp

memory/3324-32-0x0000000000400000-0x000000000042C000-memory.dmp

C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

MD5 eecb8a9ac6e5087c89aadfaf7e7cdcfb
SHA1 e8015da930fb7170e6b7e3e58e3c00a8059902cb
SHA256 28924735119d92490179dab0e53334a6d0fef069d5b1ced32aad8be8a76e4c75
SHA512 58665da71e9093d6d1b3d1a49fb31d48c8b9024120f4cfee26e96d9607081596fdb587915333d8e5d426436607b25cdacf130158aed529278a71ccb7654dc752

memory/2224-35-0x0000000000FB0000-0x000000000111B000-memory.dmp

memory/4944-44-0x0000000000890000-0x00000000008AD000-memory.dmp

memory/4944-52-0x0000000000FB0000-0x000000000111B000-memory.dmp

memory/4944-53-0x0000000000890000-0x00000000008AD000-memory.dmp

memory/2224-54-0x0000000000FB0000-0x000000000111B000-memory.dmp

memory/4360-55-0x0000000000630000-0x0000000000631000-memory.dmp

memory/4248-59-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4248-65-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4760-81-0x0000000000FB0000-0x000000000111B000-memory.dmp

memory/4560-82-0x0000000000E30000-0x0000000000E31000-memory.dmp

memory/4104-86-0x0000000000400000-0x000000000042C000-memory.dmp

memory/4104-89-0x0000000000400000-0x000000000042C000-memory.dmp