Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
Chromestup插件.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Chromestup插件.msi
Resource
win10v2004-20250314-en
General
-
Target
Chromestup插件.msi
-
Size
13.4MB
-
MD5
a476065df4bcac42aad4f3eeab3545b4
-
SHA1
4b60df157d79c4863a8065e149ec6e447d1a3342
-
SHA256
32cf48d0ef7ac450c80fcc9fb9ec28af88370298c36547d2a94ff882b12500ae
-
SHA512
0d5a5e298b145d61f17b6c3376011706535e3441f6b9c2346e67db4ce762fcbbb3da072d98f7bebc5f31885000cc0661951632508784ed7feeb61ff6c0597e95
-
SSDEEP
393216:pBfMDbMkh0n28RmwRRenYtpBRW9AxGq5azUUEC5:vMNSSnsjRaKDGEC5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/2000-117-0x0000000000400000-0x0000000000B99000-memory.dmp family_blackmoon -
Fatalrat family
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/2216-131-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat behavioral2/memory/2144-138-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat -
resource yara_rule behavioral2/files/0x000800000002423c-65.dat vmprotect behavioral2/memory/5124-68-0x00007FF651140000-0x00007FF6516EC000-memory.dmp vmprotect behavioral2/files/0x0009000000024245-110.dat vmprotect behavioral2/memory/3572-113-0x00007FF651140000-0x00007FF6516EC000-memory.dmp vmprotect behavioral2/memory/2000-117-0x0000000000400000-0x0000000000B99000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TjNkNpAilaYvt.exe.log TjNkNpAilaYvt.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI925F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92CD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI93E8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9437.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{DBB56E52-B2C8-4BD0-96DC-EE1D75DE3BAC} msiexec.exe File created C:\Windows\Installer\e57901a.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9069.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI937A.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9513.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57901a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI91C1.tmp msiexec.exe -
Executes dropped EXE 11 IoCs
pid Process 4132 aa.exe 5124 scrok.exe 3012 TjNkNpAilaYvt.exe 4940 TjNkNpAilaYvt.exe 1992 TjNkNpAilaYvt.exe 5516 TjNkNpAilaYvt.exe 3572 scrok.exe 2000 setup.exe 2216 svchost.exe 2144 svchost.exe 2148 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 4632 MsiExec.exe 4632 MsiExec.exe 4632 MsiExec.exe 4632 MsiExec.exe 4632 MsiExec.exe 4632 MsiExec.exe 4632 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 5652 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4176 timeout.exe 2096 timeout.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\InstallTime = "2025-03-15 06:57" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Group = "Fatal" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5168 msiexec.exe 5168 msiexec.exe 5124 scrok.exe 5124 scrok.exe 5124 scrok.exe 5124 scrok.exe 5516 TjNkNpAilaYvt.exe 3572 scrok.exe 3572 scrok.exe 3572 scrok.exe 3572 scrok.exe 2000 setup.exe 2000 setup.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe 2216 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5652 msiexec.exe Token: SeIncreaseQuotaPrivilege 5652 msiexec.exe Token: SeSecurityPrivilege 5168 msiexec.exe Token: SeCreateTokenPrivilege 5652 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5652 msiexec.exe Token: SeLockMemoryPrivilege 5652 msiexec.exe Token: SeIncreaseQuotaPrivilege 5652 msiexec.exe Token: SeMachineAccountPrivilege 5652 msiexec.exe Token: SeTcbPrivilege 5652 msiexec.exe Token: SeSecurityPrivilege 5652 msiexec.exe Token: SeTakeOwnershipPrivilege 5652 msiexec.exe Token: SeLoadDriverPrivilege 5652 msiexec.exe Token: SeSystemProfilePrivilege 5652 msiexec.exe Token: SeSystemtimePrivilege 5652 msiexec.exe Token: SeProfSingleProcessPrivilege 5652 msiexec.exe Token: SeIncBasePriorityPrivilege 5652 msiexec.exe Token: SeCreatePagefilePrivilege 5652 msiexec.exe Token: SeCreatePermanentPrivilege 5652 msiexec.exe Token: SeBackupPrivilege 5652 msiexec.exe Token: SeRestorePrivilege 5652 msiexec.exe Token: SeShutdownPrivilege 5652 msiexec.exe Token: SeDebugPrivilege 5652 msiexec.exe Token: SeAuditPrivilege 5652 msiexec.exe Token: SeSystemEnvironmentPrivilege 5652 msiexec.exe Token: SeChangeNotifyPrivilege 5652 msiexec.exe Token: SeRemoteShutdownPrivilege 5652 msiexec.exe Token: SeUndockPrivilege 5652 msiexec.exe Token: SeSyncAgentPrivilege 5652 msiexec.exe Token: SeEnableDelegationPrivilege 5652 msiexec.exe Token: SeManageVolumePrivilege 5652 msiexec.exe Token: SeImpersonatePrivilege 5652 msiexec.exe Token: SeCreateGlobalPrivilege 5652 msiexec.exe Token: SeBackupPrivilege 2820 vssvc.exe Token: SeRestorePrivilege 2820 vssvc.exe Token: SeAuditPrivilege 2820 vssvc.exe Token: SeBackupPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeRestorePrivilege 5168 msiexec.exe Token: SeTakeOwnershipPrivilege 5168 msiexec.exe Token: SeDebugPrivilege 5124 scrok.exe Token: SeDebugPrivilege 3012 TjNkNpAilaYvt.exe Token: SeDebugPrivilege 4940 TjNkNpAilaYvt.exe Token: SeBackupPrivilege 5316 srtasks.exe Token: SeRestorePrivilege 5316 srtasks.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5652 msiexec.exe 5652 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2000 setup.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 5168 wrote to memory of 5316 5168 msiexec.exe 91 PID 5168 wrote to memory of 5316 5168 msiexec.exe 91 PID 5168 wrote to memory of 4632 5168 msiexec.exe 93 PID 5168 wrote to memory of 4632 5168 msiexec.exe 93 PID 5168 wrote to memory of 4632 5168 msiexec.exe 93 PID 4632 wrote to memory of 1104 4632 MsiExec.exe 94 PID 4632 wrote to memory of 1104 4632 MsiExec.exe 94 PID 4632 wrote to memory of 1104 4632 MsiExec.exe 94 PID 1104 wrote to memory of 4176 1104 cmd.exe 96 PID 1104 wrote to memory of 4176 1104 cmd.exe 96 PID 1104 wrote to memory of 4176 1104 cmd.exe 96 PID 1104 wrote to memory of 4132 1104 cmd.exe 97 PID 1104 wrote to memory of 4132 1104 cmd.exe 97 PID 1104 wrote to memory of 4132 1104 cmd.exe 97 PID 1104 wrote to memory of 5124 1104 cmd.exe 98 PID 1104 wrote to memory of 5124 1104 cmd.exe 98 PID 5124 wrote to memory of 780 5124 scrok.exe 8 PID 5124 wrote to memory of 780 5124 scrok.exe 8 PID 5124 wrote to memory of 780 5124 scrok.exe 8 PID 1104 wrote to memory of 3012 1104 cmd.exe 99 PID 1104 wrote to memory of 3012 1104 cmd.exe 99 PID 1104 wrote to memory of 4940 1104 cmd.exe 100 PID 1104 wrote to memory of 4940 1104 cmd.exe 100 PID 1104 wrote to memory of 2096 1104 cmd.exe 101 PID 1104 wrote to memory of 2096 1104 cmd.exe 101 PID 1104 wrote to memory of 2096 1104 cmd.exe 101 PID 1104 wrote to memory of 1992 1104 cmd.exe 102 PID 1104 wrote to memory of 1992 1104 cmd.exe 102 PID 1104 wrote to memory of 3572 1104 cmd.exe 104 PID 1104 wrote to memory of 3572 1104 cmd.exe 104 PID 5516 wrote to memory of 2000 5516 TjNkNpAilaYvt.exe 105 PID 5516 wrote to memory of 2000 5516 TjNkNpAilaYvt.exe 105 PID 5516 wrote to memory of 2000 5516 TjNkNpAilaYvt.exe 105 PID 3572 wrote to memory of 780 3572 scrok.exe 8 PID 3572 wrote to memory of 780 3572 scrok.exe 8 PID 3572 wrote to memory of 780 3572 scrok.exe 8 PID 2000 wrote to memory of 2216 2000 setup.exe 106 PID 2000 wrote to memory of 2216 2000 setup.exe 106 PID 2000 wrote to memory of 2216 2000 setup.exe 106 PID 2000 wrote to memory of 2144 2000 setup.exe 107 PID 2000 wrote to memory of 2144 2000 setup.exe 107 PID 2000 wrote to memory of 2144 2000 setup.exe 107 PID 2000 wrote to memory of 2148 2000 setup.exe 108 PID 2000 wrote to memory of 2148 2000 setup.exe 108 PID 2000 wrote to memory of 2148 2000 setup.exe 108 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:780
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chromestup插件.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5652
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5168 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:5316
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 14B8FA7F16A47DBFC00F4441DEDA468D2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 74⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4176
-
-
C:\ProgramData\setup\aa.exeC:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4132
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5124
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2096
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe start4⤵
- Executes dropped EXE
PID:1992
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3572
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exe"C:\ProgramData\Smart\TjNkNpAilaYvt.exe"1⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5516 -
C:\ProgramData\Smart\setup.exe"C:\ProgramData\Smart\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d2ca59d06774c674109a9b833337ce26
SHA166551a2b2683707a96d9dfe7dfa9fbe17d145879
SHA256145c7b07b94d7587acaff542c66c1b1171c907edf9f06eb06a9c9f1af26e7161
SHA512446fb5bfa68c1e9cb4da098f4ce6217442c368b6952efee96c547f7975df0b5f1fddf464f05b43d905dd89dc289a18acd4c07fca248255343a830b0ac1825b1a
-
Filesize
3.4MB
MD5e67516972f762b64b2dc4b03ba8296b3
SHA115a764f0dd0f0e98b1dbc2e54858ea4228123853
SHA256f23fc1c9fc311388f659a3c3c839c8c2be94b74837b5af19afcfc0df9e8b25e1
SHA512e1e29ae8854932944377039ec681a443b7528366568991f89845c62d6d65503355a5e76a22c2495209cacd1f64e8346c41671d3af1e691a7b64183c5734f40da
-
Filesize
2.7MB
MD5ac30909929056007eaf0fbcf53c3a21f
SHA17046d48c84748b246ebaa1c0153e8f81d3b0acc1
SHA256f11baf3657a9bbfeb5d140a37d456573f589212447446a1519033ad010b9f58f
SHA51271a40652f3cdfbd33cfc539855d6cbb1fba601e83bbd4b3e4f5e397144b3abfed5d148b486aec4eec17136e063609f93beae72a5e78d12d876dd79ccd3c9c849
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
935B
MD5b4da37eb807685a8882f25687a5dcdf4
SHA10c6aea5c7d744c1086d835b22ab26fd1d89e31b1
SHA25616d8415a93d1375e200efedc8222c542253b3872e5c1bfad17848db44a0eb5bc
SHA512477eb374c08aba15e8d3c3a57542d33874d3003b46e8fd10ad59f96869ab737c4f467557360c7e33949c9d16eb964d6fcc16356940c19feda834ba19d854c33e
-
Filesize
1009B
MD58a361d4f7d98cc4231f295afaaf5d52a
SHA1c2f6cee227920ff880a86aa5e2c8b0320dd50cb1
SHA2568b555b1bbed56b25ffd9685f566ffba3c9dc98b9e119bce54592124e215ab036
SHA512599a21aa7ce7dcacb05877218733da2dcb319fbf21ae0a6f9ae893c78290a7cb7bf4641990e882fe96ca4d3d138e0c44f8fcf83644fa5a7ab538182c36fcd3b9
-
Filesize
330B
MD5d6d1080b8fe3aeff26f27e9fcbdf0389
SHA17802c9cbaffaa9b22f248fea9b75ee4b9a1fa955
SHA256ba20c0ec19230ec0729efab9c14d429285a895e22ed5e778f11ce87b1ddb9e2c
SHA512711432d4d1abec00120baa4c40db8d7b10d8e586790d47fdc22e040e7a22e5de40e2ad7948ccd46b304c701173a8fa6b96ade00e625ec87f5ad3856f06706ac2
-
Filesize
613B
MD53bf378482a1f9bc41e1dff24bd2bed88
SHA1d61b14faa67de7b28dfe20ebfda130cae93e51d5
SHA2560103409028d6cc959f669e0af39318d6081ab57a6e08bbf41e3cfafa1d51226d
SHA5121beb4e74ed40c0c6712bc5b1aa1fd3e8438bedcdff747395b163e5ff33cd3c7464fcf63f7f9bd799ab8efe7a1f67081a83ec34518386e14dbcd02d8209badc9d
-
Filesize
769B
MD5ca53c5fb996c425fae2c1f7331af07dd
SHA1d9c8d893ddd4eac17a32bb6c75770673f13515e1
SHA2564cbb3fa44b5096c8dd66786863c25f7b89811d78db16e26fb5e293eff0d6b352
SHA5128f9968caafd4be897a553f3ea5cecdda803d5846c18e076009d2b9b0d686d90a55cdd005ee9a1e0ec7bae91df15970980b1f873d773a6ee0e4c2b3897e6b2028
-
Filesize
298B
MD52c706293a3cfff8cc184a8e9a3b3da08
SHA1873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d
SHA256ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067
SHA5124aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043
-
Filesize
4.7MB
MD5113f2ba0cb86477d66f1d8c85a1babfc
SHA1b5501c19f3fe899565df3bead0580fa3fee54856
SHA2566cc5816529c56e5b0c871accbbb3de9abf83ac541645f587da4607d60d3b0e11
SHA51250617759533ca626d79bb19764da0a44774ced9d59a4a6386eda46ad6c21dc54189605b7555fee870059e447c5d4dde28c7c68dc185ab5cd53002f68f4c27d40
-
Filesize
1.0MB
MD509c448be7e7d84e6e544cc03afbb05d8
SHA1ddc13e71a72bc49c60f89b98cbb79c2449cfa07e
SHA256a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5
SHA512e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12
-
Filesize
10.7MB
MD582caf2f7b43286317bd12b703c63670f
SHA19aed1ac05263c1ae297966862a60ca8007aa93e1
SHA256e5f84ec6545e825601ff3510a1847d0554640851969aaeba53af2fc74c68dc20
SHA5124c060a2bbb35e80831ca5008c80ffeb5c703fbba37f9bd9f0ddcb660628bb50c8ce9f4035fdc31da705bb019224926ac30276fd54333c70f5d496a82007d1f39
-
Filesize
1KB
MD5122cf3c4f3452a55a92edee78316e071
SHA1f2caa36d483076c92d17224cf92e260516b3cbbf
SHA25642f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0
SHA512c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
1.1MB
MD5ae463676775a1dd0b7a28ddb265b4065
SHA1dff64c17885c7628b22631a2cdc9da83e417d348
SHA25683fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22
SHA512e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6
-
Filesize
24.1MB
MD5ec6c866c668842789fce48960e0d979c
SHA1470087c6eb04bd8a9df80cb9de9cf4f056be4e81
SHA256c5eccb9fa62fd1db46e92403e5e5f21ac982924e98492c3e75b28fa987fecb8c
SHA512fa503befde2a03aed65914a2edaa39330e614b3880443e8a52438364f2e07ff070ecc37a4507d393de6e6debe96f55a6922e87d0ae4bf50530e8e05271267f34
-
\??\Volume{2c2b4495-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ba0c6822-1b01-47d9-b905-f1356e4a961e}_OnDiskSnapshotProp
Filesize6KB
MD5ca95e3afaa65225c59c93eab4c3b5764
SHA1636cf0423dcf25cd60e49774cc97d2af166938b1
SHA25656c6bf9248fcca10f191fb7c5c3232f465dd42db1ff33ccfaa94d79606b0d84c
SHA512e27efd13f029efec99c988c66747ce8e2481675c1595b1e3bb896579b5dc494d844dbfa1a59bc975eb0d1e4d5e69763b58a91b99a0b9d2f0650559a554cf5486