Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 14:03
Static task
static1
General
-
Target
Crack Launcher.exe
-
Size
3.7MB
-
MD5
95e8f2ac083ffa44bd5eb4011a5bc4ef
-
SHA1
a88990feafe0a9955121608d92eb9156cb6621a0
-
SHA256
706cac0b64738427fc45831e2d7cb548268adf36e6111e0f9aac71f48e6091eb
-
SHA512
72bb43b6ee2a4fb9ab42aabd73f8eb064cc40bf575403afab4a161c69f6e9144ef62f40d3f0eca9e26864cf71729b5e4154d3dc93f2e94caa742fd2f629014ee
-
SSDEEP
98304:8DaQ4jINZ/bE6Jg9iw0QLZ+8WK1mzJxN/NEneQNEf:F5INJ1w0UNWsm7+eQNM
Malware Config
Extracted
xworm
5.0
Idlerkik-51025.portmap.host:51025
39nuvgE8f15qGIgl
-
Install_directory
%AppData%
-
install_file
svhost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2212-43-0x0000000000710000-0x0000000000762000-memory.dmp family_xworm -
Xworm family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x001900000002ae7a-203.dat Nirsoft behavioral1/files/0x001c00000002ae79-202.dat Nirsoft behavioral1/files/0x001900000002ae78-201.dat Nirsoft behavioral1/memory/1452-311-0x000000000C540000-0x000000000D1BE000-memory.dmp Nirsoft -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 848 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 1216 SandeLLoCHECKER_Installer.exe 2212 Nurik 1.4.exe 1452 SandeLLo CHECKER.exe -
Loads dropped DLL 29 IoCs
pid Process 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 4672 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 3440 MsiExec.exe 1452 SandeLLo CHECKER.exe 1452 SandeLLo CHECKER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nurik 1.4 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Nurik 1.4.exe" Crack Launcher.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\X: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\G: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\N: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\P: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\W: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\S: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\Z: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\O: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\Q: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\V: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\Y: SandeLLoCHECKER_Installer.exe File opened (read-only) \??\I: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 9 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
resource yara_rule behavioral1/files/0x001900000002ae81-206.dat upx behavioral1/files/0x001900000002ae7b-204.dat upx -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI21F5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI234E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI241B.tmp msiexec.exe File created C:\Windows\Installer\e5818a4.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e5818a6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI23FB.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5818a4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI19FD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI19FE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2175.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2205.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFB0C85F336C54BB46.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF59A4F2A064827539.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI1930.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1ACA.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF535640CF5A72F73A.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{F123046A-2CBF-4743-A59B-E3D2751B5780} msiexec.exe File created C:\Windows\SystemTemp\~DF725493523A8459D5.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI21A4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI21D4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI19DD.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2153.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2164.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SandeLLo CHECKER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SandeLLoCHECKER_Installer.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000\Control Panel\Colors SandeLLoCHECKER_Installer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 848 powershell.exe 848 powershell.exe 2208 msiexec.exe 2208 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 2212 Nurik 1.4.exe Token: SeSecurityPrivilege 2208 msiexec.exe Token: SeCreateTokenPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeAssignPrimaryTokenPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeLockMemoryPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeIncreaseQuotaPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeMachineAccountPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeTcbPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSecurityPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeTakeOwnershipPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeLoadDriverPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSystemProfilePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSystemtimePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeProfSingleProcessPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeIncBasePriorityPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreatePagefilePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreatePermanentPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeBackupPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeRestorePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeShutdownPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeDebugPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeAuditPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSystemEnvironmentPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeChangeNotifyPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeRemoteShutdownPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeUndockPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSyncAgentPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeEnableDelegationPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeManageVolumePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeImpersonatePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreateGlobalPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreateTokenPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeAssignPrimaryTokenPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeLockMemoryPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeIncreaseQuotaPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeMachineAccountPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeTcbPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSecurityPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeTakeOwnershipPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeLoadDriverPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSystemProfilePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSystemtimePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeProfSingleProcessPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeIncBasePriorityPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreatePagefilePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreatePermanentPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeBackupPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeRestorePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeShutdownPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeDebugPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeAuditPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSystemEnvironmentPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeChangeNotifyPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeRemoteShutdownPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeUndockPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeSyncAgentPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeEnableDelegationPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeManageVolumePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeImpersonatePrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreateGlobalPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeCreateTokenPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeAssignPrimaryTokenPrivilege 1216 SandeLLoCHECKER_Installer.exe Token: SeLockMemoryPrivilege 1216 SandeLLoCHECKER_Installer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1216 SandeLLoCHECKER_Installer.exe 3344 msiexec.exe 3344 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1216 2192 Crack Launcher.exe 78 PID 2192 wrote to memory of 1216 2192 Crack Launcher.exe 78 PID 2192 wrote to memory of 1216 2192 Crack Launcher.exe 78 PID 2192 wrote to memory of 848 2192 Crack Launcher.exe 79 PID 2192 wrote to memory of 848 2192 Crack Launcher.exe 79 PID 2192 wrote to memory of 2212 2192 Crack Launcher.exe 81 PID 2192 wrote to memory of 2212 2192 Crack Launcher.exe 81 PID 2208 wrote to memory of 2864 2208 msiexec.exe 85 PID 2208 wrote to memory of 2864 2208 msiexec.exe 85 PID 2208 wrote to memory of 2864 2208 msiexec.exe 85 PID 1216 wrote to memory of 3344 1216 SandeLLoCHECKER_Installer.exe 86 PID 1216 wrote to memory of 3344 1216 SandeLLoCHECKER_Installer.exe 86 PID 1216 wrote to memory of 3344 1216 SandeLLoCHECKER_Installer.exe 86 PID 2208 wrote to memory of 4672 2208 msiexec.exe 87 PID 2208 wrote to memory of 4672 2208 msiexec.exe 87 PID 2208 wrote to memory of 4672 2208 msiexec.exe 87 PID 2208 wrote to memory of 3776 2208 msiexec.exe 95 PID 2208 wrote to memory of 3776 2208 msiexec.exe 95 PID 2208 wrote to memory of 3440 2208 msiexec.exe 97 PID 2208 wrote to memory of 3440 2208 msiexec.exe 97 PID 2208 wrote to memory of 3440 2208 msiexec.exe 97 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crack Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Crack Launcher.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\SandeLLoCHECKER_Installer.exe"C:\Users\Admin\AppData\Local\Temp\SandeLLoCHECKER_Installer.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\SandeLLoCHECKER_Installer.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\SandeLLoCHECKER_Installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1741029183 "3⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3344
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Nurik 1.4.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\Nurik 1.4.exe"C:\Users\Admin\AppData\Local\Temp\Nurik 1.4.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1E28F76632E42E191B3F361DAF603C8C C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 61E67C14E30C601552B4FD0B6E75A185 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3776
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AAC7264FEFA4448AEEB7233AF4B2C1FE2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3716
-
C:\Users\Admin\AppData\Roaming\SandeLLo CHECKER\SandeLLo CHECKER.exe"C:\Users\Admin\AppData\Roaming\SandeLLo CHECKER\SandeLLo CHECKER.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5247ba1d1494e424acfc8b4e74e000ae5
SHA1daade780d65315df6ce5efe3671754b661f7958f
SHA2563473322a5dc7f40752282935d4984cb79c915bebdde5cc82bb9d0306ed4ba060
SHA51201aec5475df58977c71197233d6fd67c3e018a6d5992a2c90cad84815be9569e21ff22f5038c7b68b0cf3cd237892130a11ceca7fa4d331ce971d0eb2b6310d2
-
Filesize
587KB
MD59e0aef52f6c03b2fea067342d9d4f22f
SHA1d4431a858c8a7a79315829ec7aa82e838c2714f4
SHA25642b8adafcb4e8496d9822a0c504f449e56456528a9251c153381d3f63d197e5b
SHA51242858a6695d7906b3df4dc97f3b1fac737633a51ffb52e8ec8eddeb21f8cdb53c199bb698e54c4a931155eafd879de6fff114b84f298c84436b776e286ebeeb1
-
Filesize
1.1MB
MD5c04ed00ddcb3518e8cf6db24db294a50
SHA1cc98cc3ab9c4371f85ea227d9f761bab4aa76baa
SHA2563c21e1f3bb3ebeb5f0ff68658db8abd18b62f8b195288c4bf87936fc51f8ae9e
SHA512736946a3130f294878ea51145960017babcc1b8ac2c96afd8b9e2a4d120f173afb84bbd04b6f0113f286d4bc671befecd4e92c582f1de1a0d5bc8738c3cae9c5
-
Filesize
709KB
MD5eb7811666ac7be6477e23af68511424f
SHA11623579c5a3710dcc694a2fd49defa27d56d9175
SHA256ad706739b04256b9215e80d2d030863a37f0d7fd0e4071d0a3a73d6704d8bd8f
SHA5123055baa15c92f476513c66a423043dc4b8c5f83f47643ad77665d6a2f823f4655bf4ae241d8af4bc34d53630df1c35989f0b11b934a631960668fcc7a8c81a7b
-
Filesize
26.0MB
MD54ce1c78396ce2beeea1562f888f8ba20
SHA1a027884eecacebb946ce8c4313fa2fa441653bda
SHA256d250d01bf0a0a4c89af10202b6b33d4e3788424ce7bf24c0b6c184c3bc5237e7
SHA512922c364bb3e6e9f71b6676b8ecd52a87f67041a4fbc3eb53c4c363aa8ba8c8cef14ee926134c6f5be3a5cd5c487ca3e26c7ced3e2bc12cacf5b2cd5977dbe2a9
-
Filesize
5.7MB
MD58a0591a6b534e32fa179f2d781b79026
SHA161e1aff6f862cbce0e1f6e9e70d186e5013d9846
SHA2564df8350850592b587c4d2aaabddc8454bc4652df0082b85c3336139a9c6ea53e
SHA5120a261afd07a152e0f4e7d4df8ad0d57c53e9690b0b4f7ed13614b60c55466bafa7ac70472f6b1b5b41e49b249f080ad3c4d440b655b631b17c3c7e1cea3055bd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\BrowserDownloadsView.cfg
Filesize1KB
MD52808115146d3886750a27994323846d8
SHA14d1a069ff9c2b623f7cab49ae9b1ce147a8fa176
SHA2568beacde0a805e86a70e460517f317cc966b7cb57336fe46e01c8f785d668038a
SHA512fd4660a93e69f0a0bf4a763c9d11272da7d699256e20ae1788ff7a0bd13597b6f3c2211bef8951d3e67b3997b72d631a431bc9e1055b754c57424b3e0f935925
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\BrowserDownloadsView.exe
Filesize478KB
MD5118968b09619b304e29d77c7b41402b7
SHA1d372d9a9af1b622bc2337d3a1b505b96ce736ac4
SHA2567034ebfb236c1cdf85cdac041bc80f6143a55680af32cc4af22a3379c9a71b4a
SHA512f2225639457007b7590ebc3ca4665214413568b68c502325ea5e98a7c00aa66a413c3ba59f8bf0d49e9cbd6cf89a28e25d7bf18a95791717343dcbd97b77c44f
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\DevManView.exe
Filesize163KB
MD59aa355d3d48e8a811a226f7320ad5aec
SHA1358d2aa0be69f282dbea5d73962d2810b6a1c241
SHA256642393ce850a4d47f749d280240d087c1e78f7321345c2db8a50984ef44f00af
SHA512a3829f0f132f90789bad5c111b727426830f53d74e1f3794803274adbaa1e8a99c6be84c637c526978d56b563adc11056f946ea2e2cc328a99774a45a48786d1
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\ExecutedProgramsList.cfg
Filesize439B
MD54edc075d18603600c3b30206fcc058f4
SHA130067b3a52faae00b5f0f0713c80afa348004980
SHA2564c360620c1604390812dc65da362ff2d53b9f7a636379415a41f5b4cee1c33f5
SHA512a1e612a4ed5608ec18f04ef67ed219163d6043c344a460fb202e0aca0f15daf65b341622db6aef534db8862d88655827e55f1d97065314e2a5b81fdfe1582e0e
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\ExecutedProgramsList.exe
Filesize81KB
MD57366668cc7eaa1068a38cc2761217fc4
SHA1a6790473129e7298185ef4ee4e0badbdecc50040
SHA256e3af98717bf1cda7dc4aacb5b34d111ac237604161cd96f7929ec33f2ff260b6
SHA5125af36447a1d29c2024b83cf08bb9cfc2c360e02d819eb7b238e1e9f774aef6e5930f5f33b9f64d62e4e958911493338a0d95b58b22b076c4e9025abe6f3f0b4a
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\JumpListsView.cfg
Filesize593B
MD54ccd997c204b66073d071546be6273ab
SHA1b1bd7b547b47b72c92dc44bb057f4c4074cbf7ed
SHA25603de29954da8e66d7dd5db1f4f9edb4036bcaacc79bcac8dfb01fc7e35c6477f
SHA512bbae587c070a79a97bb2c533f598df3c9ad1618b9a3bc4c67d1ee3ce8016bbf3a003f6651d56d818fddbc0249c0cd46d5b19ea140c4950cb210eaba7b941718f
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\JumpListsView.exe
Filesize93KB
MD51a7524a3f7443c3e041774d5f372142c
SHA1b7f4ce125731505cb4961df217465ef6a94c31df
SHA256e000c782af989e016efcef1664b9d652b0fee59b011e28154072f7b6001b124d
SHA5123a3e4412727086bdfea85cb9da8d8994ff2f37aa4c761458ba0006dfd7e6fb72b313940eec5ad197b1026e6af4d10d72cbe85c99e3a245ba2c18141fa633ec19
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\MUICacheView.cfg
Filesize263B
MD5d42eb06e18177a8fbac1c51775a29d75
SHA1828cf630faffccb25094f48b47ef6c0b76bbabe9
SHA2564b997de7fe27892b96fd0b94f07b29935ca0a8d1ef13044c846c88050e71f932
SHA5128924703203b51f13618b1096e7ed976e7c7b2caf5eeea8b4e0f574183e2aa610788d67113fecc852127d10289cd72e27a74d779a6972e3d45c39111aa8fdff27
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\MUICacheView.exe
Filesize29KB
MD5e999c811b919c420d5657a484cecdd61
SHA1a61ab3db7d9aa92c309956c8a033a7c5ce4edeb9
SHA25602e28fa849121a1ffce2cccdfaed4974636253c3a8d5f16207d0fd13c0ea72d5
SHA512caeb0693a02154195d2421786a7b39559ac605c06371a8f7ed95535f75296e7f3a99de0a72d9ff7570d4b7d0bd3a2c2bb7ff37813f1fefbc4be1ad792ba41d8a
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Apps\UserAssistView.exe
Filesize30KB
MD5f36530f46a34516be38521ee9a134d28
SHA147f0553e0a0febbef59fd9a32149497bbdd5229c
SHA256bc11c4150bbc6f8b2cf7bc96bedbb183c61d53ab8e4052b15d58bad6b6d1befa
SHA5125c1a1282ffc25409d0044770c80e92f7a89fb40567dbb24f64f46750083bb30b842a63ef58b8b9433fa5a5903a5aa7bf71ee941709365c6bc17a9f4d85b1ad5d
-
Filesize
1.6MB
MD5463058236a0d84f8f8982d946eed0e07
SHA1800ab71ed3b3bf4fb67fc9e1628e59d0aab8b124
SHA256c93a0f4c6b5f24ee31cddb92b0ea3337021b5fb91faae8a381d3bd2c9b6add54
SHA51218bd9aea8489c5e873a679da92c83d2739de9532f5751bd23aea9eda226b9a95909f8fd525b0ce47859492997002aee32ecf37bb79e07f24b512287b8fd58a53
-
Filesize
133B
MD571c2ab4ba40883fbf4713878a29ebcae
SHA161a7f6b7ecde461a22e8336f8ff77b7658a9d5cc
SHA256d4f4b6d1008fc2dc4edbcdd359088781f6457fd157320a9eac4d1c189f12c21e
SHA512f563791621eb4c7aae8d90f4d667e637e415bce65677b69539b89209f9d619c61777a11210076d2786382afd770385c18f02cdd8eacbfebfbe56be82c55c76e1
-
Filesize
134B
MD5847e532991368d9cb63efacd08bcc2fe
SHA1fb7249c194d37a7563900995d9707d139d16e9bd
SHA2560aae2258ca7ef40ed82a69afe27f869384ecd954132f37ee4a5f9cc96b2d670c
SHA512a37071368b1f0c549171915bf49c968cb52ea0d192462eb5acffbadcc269ed65a90973b2ac841b43d509f5ddc02b6c50d30d721a41106d4eed9f1ec617dee4f0
-
Filesize
119B
MD5bba9311f50d2704b6197520a99b1bf77
SHA13ad9b05f0be552c7a778a8138a1aed644963b01f
SHA256848e550ad046f91748e7c129e09192bdf1055c56fea95f5a971273ecde348366
SHA5121d9752c4af443672cc4778f2e01254d885843fc7cbf55580eefd3fcee61c3ef241fef58e8d7a20352c4e2cd081bbeb802106eaed766a54419637c5aa57d740f6
-
Filesize
357KB
MD50754f552bf43d0ea03e7ffae3764f76c
SHA1003a0cee6fdcdba86ccd2241213d827f462fcb7c
SHA256d9b8b767e7dd8253d4eb6883ed168f0c6ac89a7ea589a67d9fad1d04fb9acbab
SHA5123901126a6c8826df816d76c37759c8a09b46bfd54a31abb3f1e55396aeae6f21e5afb78da9520dfeb2d63099269e7c7258288862fbde5a8a16b08e5a55e23d88
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\Newtonsoft.Json.dll
Filesize685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\SandeLLo CHECKER.exe
Filesize10.2MB
MD52e644c16b1bf1ecba38e1b2204beae98
SHA1b4e7be74c313c32292a0bda758198f8a18d71be8
SHA256acf0f79a3ccffc7690811e7e3a19ae6bd0f6a829dbc3a2d52d5df2f8a5c337e9
SHA5120bfe3c21b215eba5b5265b41804bc91922e37478782c4645d1bd0e8a444ddce25f68520ab43d2c4945db38adfd2722cef5d55792ab096721cb486f2529713270
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\SandeLLoCHECKER_Installer.msi
Filesize3.9MB
MD5e47c6582751cdc22d8c0eeac60de6d0b
SHA14c057d98754b09c95fcae46162673d1b241ccea4
SHA256c645a247c399ae2e8ccf8f826415e7287b52080fcae3dac203e7e543fe792ccb
SHA5122e2dc24e4cc1314f17506c0007f1e5c1200af1a2b14820968e7a1019c29b60913701beb5498a6c13e7cef938e98efa464b1cae2f5a8cc59c493caebfd158da5b
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\SelfUpdate\AppUpdater.exe
Filesize15KB
MD5d559499e96b45ef1abdd4f35c89663d7
SHA12d46b980342ab0c44e820ff6ab736b601fd46704
SHA256e4227d32f34cdfa3e3e06dc3c80995a4bae4c128b466580f187348d5bd94fd1e
SHA51227c0185291178b7c3c25f7459f9bafc5e96757c8f61b6f48d028ec10a8d1cf769a20d59ff7c533f6ae8601181d2555357fa66036b78c12e075f71c0b1c69d74d
-
C:\Users\Admin\AppData\Local\Temp\{F123046A-2CBF-4743-A59B-E3D2751B5780}\51B5780\SelfUpdate\DotNetZip.dll
Filesize461KB
MD5a999d7f3807564cc816c16f862a60bbe
SHA11ee724daaf70c6b0083bf589674b6f6d8427544f
SHA2568e9c0362e9bfb3c49af59e1b4d376d3e85b13aed0fbc3f5c0e1ebc99c07345f3
SHA5126f1f73314d86ae324cc7f55d8e6352e90d4a47f0200671f7069daa98592daaceea34cf89b47defbecdda7d3b3e4682de70e80a5275567b82aa81b002958e4414
-
Filesize
271KB
MD5c5b797a84429fb737e8a09846e3a6901
SHA1f215a52370f0861475e9933ae3d22b72b2cb1381
SHA2561f901d2d7163c7a5be1b66fbe03ba22184933886c2959f9dd87393d3bd67cabd
SHA5124e60355bc6b26f85481eb5972a966ea3c50592904de3c226f5b004b127c356f990afc8084cc335d79e0f4c0b7eb32dada2daf0eca249856bf03577429070aa03
-
Filesize
22KB
MD5d711daf0138d35bdb878e397e0abb7c0
SHA192ad5ed3d195fa60b493948f86caadc6ba6d5076
SHA25681110d44256397f0f3c572a20ca94bb4c669e5de89f9348abad263fbd81c54b9
SHA5126302420686f2968a0b00e24d7333bf86ecff62efe7598faaa06b51797d95f667b0c5cbbb3fcb5bc84d322c049249679340d373b807b39431ff5c6a16413f95cd
-
Filesize
219KB
MD5fe8e00c889a156836d57919ca23cde50
SHA17aba06d474175bd0d7f672e101b0a05104580bb1
SHA256af17df745250d1814eaa274fff7b0faeb43381e6762e026267e5859778477abd
SHA512bdd89b54381da6faf50c9e18d9941f68b8d300d952bea84bd785ca00d617eef6dbdf7d9589adfb14e1dcbe6d836bb2d7785ccc9529e781a64f3125bfc4ce091c
-
Filesize
3B
MD5d5cfead94f5350c12c322b5b664544c1
SHA116a9efea4885a86a6c0e036b52e0b0bad6da1845
SHA25661182f39851829ca78c919a83ecbfa045fc0686bff16d0cfa3e643988d9dfecd
SHA5127a9b38db77b85e5a3de5c649ddf2017184b87ca947d0034565307a07c243256d080cdb2a9faf38595f8d153861abe4b64ef61fc695481b4498a5a19ccaaf170f
-
Filesize
301KB
MD52b72b867ce06b51132af8e6b5bd9c6d2
SHA148c12b24588a2513a847a9d934dfd88f22044f9a
SHA25642e4ba85c71a2c275d4682e3d137ceb5b1b9993541191176e71b2c9e98ae496d
SHA51200f47e884b0853029420d82368376548b02d77b2683d28a5420b6a5e5d764f1fb9121087edfad3a1bdca0a21ed7bd47a47817cd153d0abc1705a7643fb79bb6a
-
Filesize
734KB
MD5f411c8f0959e997b4e38b432d7060fb1
SHA1d5efa9977eaf8b25cfaa819d646f3f5839333fd5
SHA25616f1d29416044f4c737a0746d65665b312cdd7ec42d8901bea92834d2fedaf85
SHA512b000b21ab1f39b9524f45421051095bdbbf3049dc6bea718a6bc2a0178f25004ec19ec642f5823fff874a6b7029c97dbf244052a30b4ec5e1bb7efa58300046c