Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
Chromestup插件.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Chromestup插件.msi
Resource
win10v2004-20250314-en
General
-
Target
Chromestup插件.msi
-
Size
13.4MB
-
MD5
a476065df4bcac42aad4f3eeab3545b4
-
SHA1
4b60df157d79c4863a8065e149ec6e447d1a3342
-
SHA256
32cf48d0ef7ac450c80fcc9fb9ec28af88370298c36547d2a94ff882b12500ae
-
SHA512
0d5a5e298b145d61f17b6c3376011706535e3441f6b9c2346e67db4ce762fcbbb3da072d98f7bebc5f31885000cc0661951632508784ed7feeb61ff6c0597e95
-
SSDEEP
393216:pBfMDbMkh0n28RmwRRenYtpBRW9AxGq5azUUEC5:vMNSSnsjRaKDGEC5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2144-126-0x0000000000400000-0x0000000000B99000-memory.dmp family_blackmoon -
Fatalrat family
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/732-151-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat -
resource yara_rule behavioral1/files/0x000a000000019240-58.dat vmprotect behavioral1/memory/2428-65-0x000000013FA40000-0x000000013FFEC000-memory.dmp vmprotect behavioral1/files/0x0005000000019c3c-104.dat vmprotect behavioral1/memory/2144-126-0x0000000000400000-0x0000000000B99000-memory.dmp vmprotect behavioral1/memory/2548-116-0x000000013F2D0000-0x000000013F87C000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\Installer\f76d1a1.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID20E.tmp msiexec.exe File created C:\Windows\Installer\f76d1a4.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSID2DA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID377.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID462.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID54D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID657.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76d1a4.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f76d1a1.msi msiexec.exe -
Executes dropped EXE 11 IoCs
pid Process 2168 aa.exe 2428 scrok.exe 2940 TjNkNpAilaYvt.exe 2336 TjNkNpAilaYvt.exe 2804 TjNkNpAilaYvt.exe 1928 TjNkNpAilaYvt.exe 2548 scrok.exe 2144 setup.exe 3024 svchost.exe 828 svchost.exe 732 svchost.exe -
Loads dropped DLL 27 IoCs
pid Process 3020 MsiExec.exe 3020 MsiExec.exe 3020 MsiExec.exe 3020 MsiExec.exe 3020 MsiExec.exe 624 cmd.exe 624 cmd.exe 624 cmd.exe 624 cmd.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 2144 setup.exe 3024 svchost.exe 3024 svchost.exe 3024 svchost.exe 828 svchost.exe 828 svchost.exe 828 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2916 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2856 timeout.exe 792 timeout.exe -
Modifies data under HKEY_USERS 55 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\ svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\InstallTime = "2025-03-15 06:57" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Group = "Fatal" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 2388 msiexec.exe 2388 msiexec.exe 2428 scrok.exe 2428 scrok.exe 1928 TjNkNpAilaYvt.exe 2548 scrok.exe 2144 setup.exe 2548 scrok.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe 732 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2916 msiexec.exe Token: SeIncreaseQuotaPrivilege 2916 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeSecurityPrivilege 2388 msiexec.exe Token: SeCreateTokenPrivilege 2916 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2916 msiexec.exe Token: SeLockMemoryPrivilege 2916 msiexec.exe Token: SeIncreaseQuotaPrivilege 2916 msiexec.exe Token: SeMachineAccountPrivilege 2916 msiexec.exe Token: SeTcbPrivilege 2916 msiexec.exe Token: SeSecurityPrivilege 2916 msiexec.exe Token: SeTakeOwnershipPrivilege 2916 msiexec.exe Token: SeLoadDriverPrivilege 2916 msiexec.exe Token: SeSystemProfilePrivilege 2916 msiexec.exe Token: SeSystemtimePrivilege 2916 msiexec.exe Token: SeProfSingleProcessPrivilege 2916 msiexec.exe Token: SeIncBasePriorityPrivilege 2916 msiexec.exe Token: SeCreatePagefilePrivilege 2916 msiexec.exe Token: SeCreatePermanentPrivilege 2916 msiexec.exe Token: SeBackupPrivilege 2916 msiexec.exe Token: SeRestorePrivilege 2916 msiexec.exe Token: SeShutdownPrivilege 2916 msiexec.exe Token: SeDebugPrivilege 2916 msiexec.exe Token: SeAuditPrivilege 2916 msiexec.exe Token: SeSystemEnvironmentPrivilege 2916 msiexec.exe Token: SeChangeNotifyPrivilege 2916 msiexec.exe Token: SeRemoteShutdownPrivilege 2916 msiexec.exe Token: SeUndockPrivilege 2916 msiexec.exe Token: SeSyncAgentPrivilege 2916 msiexec.exe Token: SeEnableDelegationPrivilege 2916 msiexec.exe Token: SeManageVolumePrivilege 2916 msiexec.exe Token: SeImpersonatePrivilege 2916 msiexec.exe Token: SeCreateGlobalPrivilege 2916 msiexec.exe Token: SeBackupPrivilege 2708 vssvc.exe Token: SeRestorePrivilege 2708 vssvc.exe Token: SeAuditPrivilege 2708 vssvc.exe Token: SeBackupPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 3044 DrvInst.exe Token: SeLoadDriverPrivilege 3044 DrvInst.exe Token: SeLoadDriverPrivilege 3044 DrvInst.exe Token: SeLoadDriverPrivilege 3044 DrvInst.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe Token: SeTakeOwnershipPrivilege 2388 msiexec.exe Token: SeRestorePrivilege 2388 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2916 msiexec.exe 2916 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 2388 wrote to memory of 3020 2388 msiexec.exe 34 PID 3020 wrote to memory of 624 3020 MsiExec.exe 36 PID 3020 wrote to memory of 624 3020 MsiExec.exe 36 PID 3020 wrote to memory of 624 3020 MsiExec.exe 36 PID 3020 wrote to memory of 624 3020 MsiExec.exe 36 PID 624 wrote to memory of 2856 624 cmd.exe 38 PID 624 wrote to memory of 2856 624 cmd.exe 38 PID 624 wrote to memory of 2856 624 cmd.exe 38 PID 624 wrote to memory of 2856 624 cmd.exe 38 PID 624 wrote to memory of 2168 624 cmd.exe 39 PID 624 wrote to memory of 2168 624 cmd.exe 39 PID 624 wrote to memory of 2168 624 cmd.exe 39 PID 624 wrote to memory of 2168 624 cmd.exe 39 PID 624 wrote to memory of 2428 624 cmd.exe 40 PID 624 wrote to memory of 2428 624 cmd.exe 40 PID 624 wrote to memory of 2428 624 cmd.exe 40 PID 624 wrote to memory of 2428 624 cmd.exe 40 PID 2428 wrote to memory of 596 2428 scrok.exe 9 PID 624 wrote to memory of 2940 624 cmd.exe 41 PID 624 wrote to memory of 2940 624 cmd.exe 41 PID 624 wrote to memory of 2940 624 cmd.exe 41 PID 624 wrote to memory of 2940 624 cmd.exe 41 PID 624 wrote to memory of 2336 624 cmd.exe 42 PID 624 wrote to memory of 2336 624 cmd.exe 42 PID 624 wrote to memory of 2336 624 cmd.exe 42 PID 624 wrote to memory of 2336 624 cmd.exe 42 PID 624 wrote to memory of 792 624 cmd.exe 43 PID 624 wrote to memory of 792 624 cmd.exe 43 PID 624 wrote to memory of 792 624 cmd.exe 43 PID 624 wrote to memory of 792 624 cmd.exe 43 PID 624 wrote to memory of 2804 624 cmd.exe 44 PID 624 wrote to memory of 2804 624 cmd.exe 44 PID 624 wrote to memory of 2804 624 cmd.exe 44 PID 624 wrote to memory of 2804 624 cmd.exe 44 PID 624 wrote to memory of 2548 624 cmd.exe 46 PID 624 wrote to memory of 2548 624 cmd.exe 46 PID 624 wrote to memory of 2548 624 cmd.exe 46 PID 624 wrote to memory of 2548 624 cmd.exe 46 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 1928 wrote to memory of 2144 1928 TjNkNpAilaYvt.exe 47 PID 2548 wrote to memory of 596 2548 scrok.exe 9 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 3024 2144 setup.exe 48 PID 2144 wrote to memory of 732 2144 setup.exe 49 PID 2144 wrote to memory of 732 2144 setup.exe 49 PID 2144 wrote to memory of 732 2144 setup.exe 49 PID 2144 wrote to memory of 732 2144 setup.exe 49 PID 2144 wrote to memory of 732 2144 setup.exe 49 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:596
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E0" "0000000000000488"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chromestup插件.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2916
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 33DF438E4ED0DF8510312915C1A1A37A2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 74⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2856
-
-
C:\ProgramData\setup\aa.exeC:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData4⤵
- Executes dropped EXE
PID:2168
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
PID:2940
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
PID:2336
-
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:792
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe start4⤵
- Executes dropped EXE
PID:2804
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exe"C:\ProgramData\Smart\TjNkNpAilaYvt.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\ProgramData\Smart\setup.exe"C:\ProgramData\Smart\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c4a07f96388b13a490212ae7bfe1657
SHA1d3da36386855bd3105200c0792b4fa5728acdd93
SHA256b36e3503ce5bacbc71ae666a0d21170801110b369000c88182d16c701c8890fb
SHA5125388cb47e7f1d442869d8195dbf8bee48449ce6161db5cdd1c99a7b098cb19425f98f1c4e862410561c25db4d810fc8890284bbb7171e1004b0dfd9e675f0f9b
-
Filesize
2.7MB
MD5ac30909929056007eaf0fbcf53c3a21f
SHA17046d48c84748b246ebaa1c0153e8f81d3b0acc1
SHA256f11baf3657a9bbfeb5d140a37d456573f589212447446a1519033ad010b9f58f
SHA51271a40652f3cdfbd33cfc539855d6cbb1fba601e83bbd4b3e4f5e397144b3abfed5d148b486aec4eec17136e063609f93beae72a5e78d12d876dd79ccd3c9c849
-
Filesize
1009B
MD5a636e08d134d3d006b0ebea7a8c3077e
SHA16f2c1d308cab3b6832b1caa0c3c276e6a54fae78
SHA2563305efbde7448bc2da354b490db13fe954d9b2625320619afef0a47cbeaf4465
SHA512eb419a57a045e01c82861b47f8aa2fa2e473626289583988ec586904d845a31dd427b6e05605e06751f7dc913172868b76107ba6722911e2cc42f6ee86c8da91
-
Filesize
266B
MD555e5cbedd794a0c23bd1f9ea3dbde956
SHA1df8feddece867cdf6f00d8550de76928864b2ce8
SHA256c60b80c9c8a04140beae864f1b6ea30567b567a647accaa927fe58903e3c3e44
SHA512d4f3fadc7f5114fb7bf4a1f2f6aab6cead2a4eddc26e075d8fe5407885fb4dd38778d33b808edf4873849809095050c12858e09db99156bd34e49615f391b6aa
-
Filesize
613B
MD59bad328625e0227a521358354d2349aa
SHA16fbdb95155f82963ce038c79bdf3e12bc0c50b25
SHA25629a719778c12aae64873a1f22fa1dcf2c95410cd34f135fe51ad3ef1aea5a997
SHA512d42e8fca5eea3aaa4d1680c95c32c81bd63e36ecfb5d2f4199a1333f2f334c2a3e03a7cef435bb95d7490af8b332225472eb22df3131bc9347c1c9745a789862
-
Filesize
769B
MD55c3d01ff3320eb758034c7c53063c0c0
SHA1b809d14461be10f1d394bb10c1b544a7ab5a0f11
SHA25697fefe99b7334925f8add3e0730a57f6e15a8a8377f4cd8318c7aee464f1dc55
SHA51295540e94b07d187ab605f15c36ccf53aceeebd2a534f69cdd55ea87c9bcce4252f116f12bfc3a1f8ce610fdaa4e8611d8fc230282f54a4e0339472a6f9a30f8b
-
Filesize
935B
MD5881ac84fcf3256628ae5e8a6a862967f
SHA14375d721497d22944a5bdacac2bff4330d344157
SHA25694f5004c6271ab41f43b8c6414da8bf12203f9af7bab82d68f5538b5c7058578
SHA512b5cc33f36476a249bd6eaf734d1d8d93bb5a1ae001f8175d13dd0019207edef5528cd146f9ec15c0109acd763f5a410b497c66f1a0a8a1de429bc7da19a3e409
-
Filesize
298B
MD52c706293a3cfff8cc184a8e9a3b3da08
SHA1873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d
SHA256ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067
SHA5124aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043
-
Filesize
4.7MB
MD5113f2ba0cb86477d66f1d8c85a1babfc
SHA1b5501c19f3fe899565df3bead0580fa3fee54856
SHA2566cc5816529c56e5b0c871accbbb3de9abf83ac541645f587da4607d60d3b0e11
SHA51250617759533ca626d79bb19764da0a44774ced9d59a4a6386eda46ad6c21dc54189605b7555fee870059e447c5d4dde28c7c68dc185ab5cd53002f68f4c27d40
-
Filesize
10.7MB
MD582caf2f7b43286317bd12b703c63670f
SHA19aed1ac05263c1ae297966862a60ca8007aa93e1
SHA256e5f84ec6545e825601ff3510a1847d0554640851969aaeba53af2fc74c68dc20
SHA5124c060a2bbb35e80831ca5008c80ffeb5c703fbba37f9bd9f0ddcb660628bb50c8ce9f4035fdc31da705bb019224926ac30276fd54333c70f5d496a82007d1f39
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
1.1MB
MD5ae463676775a1dd0b7a28ddb265b4065
SHA1dff64c17885c7628b22631a2cdc9da83e417d348
SHA25683fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22
SHA512e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6
-
Filesize
3.4MB
MD5e67516972f762b64b2dc4b03ba8296b3
SHA115a764f0dd0f0e98b1dbc2e54858ea4228123853
SHA256f23fc1c9fc311388f659a3c3c839c8c2be94b74837b5af19afcfc0df9e8b25e1
SHA512e1e29ae8854932944377039ec681a443b7528366568991f89845c62d6d65503355a5e76a22c2495209cacd1f64e8346c41671d3af1e691a7b64183c5734f40da
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
1.0MB
MD509c448be7e7d84e6e544cc03afbb05d8
SHA1ddc13e71a72bc49c60f89b98cbb79c2449cfa07e
SHA256a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5
SHA512e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12