Analysis
-
max time kernel
125s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
Chromestup.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Chromestup.msi
Resource
win10v2004-20250314-en
General
-
Target
Chromestup.msi
-
Size
13.4MB
-
MD5
a476065df4bcac42aad4f3eeab3545b4
-
SHA1
4b60df157d79c4863a8065e149ec6e447d1a3342
-
SHA256
32cf48d0ef7ac450c80fcc9fb9ec28af88370298c36547d2a94ff882b12500ae
-
SHA512
0d5a5e298b145d61f17b6c3376011706535e3441f6b9c2346e67db4ce762fcbbb3da072d98f7bebc5f31885000cc0661951632508784ed7feeb61ff6c0597e95
-
SSDEEP
393216:pBfMDbMkh0n28RmwRRenYtpBRW9AxGq5azUUEC5:vMNSSnsjRaKDGEC5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/5880-117-0x0000000000400000-0x0000000000B99000-memory.dmp family_blackmoon -
Fatalrat family
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral2/memory/3144-138-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat behavioral2/memory/1344-133-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat -
resource yara_rule behavioral2/files/0x00080000000242ea-65.dat vmprotect behavioral2/memory/4312-68-0x00007FF7687E0000-0x00007FF768D8C000-memory.dmp vmprotect behavioral2/files/0x00090000000242f3-111.dat vmprotect behavioral2/memory/3696-113-0x00007FF7687E0000-0x00007FF768D8C000-memory.dmp vmprotect behavioral2/memory/5880-117-0x0000000000400000-0x0000000000B99000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TjNkNpAilaYvt.exe.log TjNkNpAilaYvt.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\Installer\SourceHash{DBB56E52-B2C8-4BD0-96DC-EE1D75DE3BAC} msiexec.exe File opened for modification C:\Windows\Installer\MSIA37B.tmp msiexec.exe File created C:\Windows\Installer\e579e53.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA019.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA1B2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA221.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA251.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\e579e53.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9EB1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA0A7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA144.tmp msiexec.exe -
Executes dropped EXE 11 IoCs
pid Process 5168 aa.exe 4312 scrok.exe 620 TjNkNpAilaYvt.exe 3528 TjNkNpAilaYvt.exe 3020 TjNkNpAilaYvt.exe 3040 TjNkNpAilaYvt.exe 3696 scrok.exe 5880 setup.exe 1344 svchost.exe 3144 svchost.exe 656 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 4684 MsiExec.exe 4684 MsiExec.exe 4684 MsiExec.exe 4684 MsiExec.exe 4684 MsiExec.exe 4684 MsiExec.exe 4684 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2948 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3416 timeout.exe 3656 timeout.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Group = "Fatal" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\InstallTime = "2025-03-15 07:10" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 msiexec.exe 2408 msiexec.exe 4312 scrok.exe 4312 scrok.exe 4312 scrok.exe 4312 scrok.exe 3040 TjNkNpAilaYvt.exe 3696 scrok.exe 3696 scrok.exe 3696 scrok.exe 3696 scrok.exe 5880 setup.exe 5880 setup.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe 1344 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2948 msiexec.exe Token: SeIncreaseQuotaPrivilege 2948 msiexec.exe Token: SeSecurityPrivilege 2408 msiexec.exe Token: SeCreateTokenPrivilege 2948 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2948 msiexec.exe Token: SeLockMemoryPrivilege 2948 msiexec.exe Token: SeIncreaseQuotaPrivilege 2948 msiexec.exe Token: SeMachineAccountPrivilege 2948 msiexec.exe Token: SeTcbPrivilege 2948 msiexec.exe Token: SeSecurityPrivilege 2948 msiexec.exe Token: SeTakeOwnershipPrivilege 2948 msiexec.exe Token: SeLoadDriverPrivilege 2948 msiexec.exe Token: SeSystemProfilePrivilege 2948 msiexec.exe Token: SeSystemtimePrivilege 2948 msiexec.exe Token: SeProfSingleProcessPrivilege 2948 msiexec.exe Token: SeIncBasePriorityPrivilege 2948 msiexec.exe Token: SeCreatePagefilePrivilege 2948 msiexec.exe Token: SeCreatePermanentPrivilege 2948 msiexec.exe Token: SeBackupPrivilege 2948 msiexec.exe Token: SeRestorePrivilege 2948 msiexec.exe Token: SeShutdownPrivilege 2948 msiexec.exe Token: SeDebugPrivilege 2948 msiexec.exe Token: SeAuditPrivilege 2948 msiexec.exe Token: SeSystemEnvironmentPrivilege 2948 msiexec.exe Token: SeChangeNotifyPrivilege 2948 msiexec.exe Token: SeRemoteShutdownPrivilege 2948 msiexec.exe Token: SeUndockPrivilege 2948 msiexec.exe Token: SeSyncAgentPrivilege 2948 msiexec.exe Token: SeEnableDelegationPrivilege 2948 msiexec.exe Token: SeManageVolumePrivilege 2948 msiexec.exe Token: SeImpersonatePrivilege 2948 msiexec.exe Token: SeCreateGlobalPrivilege 2948 msiexec.exe Token: SeBackupPrivilege 2968 vssvc.exe Token: SeRestorePrivilege 2968 vssvc.exe Token: SeAuditPrivilege 2968 vssvc.exe Token: SeBackupPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeRestorePrivilege 2408 msiexec.exe Token: SeTakeOwnershipPrivilege 2408 msiexec.exe Token: SeDebugPrivilege 4312 scrok.exe Token: SeDebugPrivilege 620 TjNkNpAilaYvt.exe Token: SeDebugPrivilege 3528 TjNkNpAilaYvt.exe Token: SeBackupPrivilege 3616 srtasks.exe Token: SeRestorePrivilege 3616 srtasks.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2948 msiexec.exe 2948 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5880 setup.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2408 wrote to memory of 3616 2408 msiexec.exe 92 PID 2408 wrote to memory of 3616 2408 msiexec.exe 92 PID 2408 wrote to memory of 4684 2408 msiexec.exe 94 PID 2408 wrote to memory of 4684 2408 msiexec.exe 94 PID 2408 wrote to memory of 4684 2408 msiexec.exe 94 PID 4684 wrote to memory of 4892 4684 MsiExec.exe 95 PID 4684 wrote to memory of 4892 4684 MsiExec.exe 95 PID 4684 wrote to memory of 4892 4684 MsiExec.exe 95 PID 4892 wrote to memory of 3416 4892 cmd.exe 97 PID 4892 wrote to memory of 3416 4892 cmd.exe 97 PID 4892 wrote to memory of 3416 4892 cmd.exe 97 PID 4892 wrote to memory of 5168 4892 cmd.exe 98 PID 4892 wrote to memory of 5168 4892 cmd.exe 98 PID 4892 wrote to memory of 5168 4892 cmd.exe 98 PID 4892 wrote to memory of 4312 4892 cmd.exe 99 PID 4892 wrote to memory of 4312 4892 cmd.exe 99 PID 4312 wrote to memory of 784 4312 scrok.exe 8 PID 4312 wrote to memory of 784 4312 scrok.exe 8 PID 4312 wrote to memory of 784 4312 scrok.exe 8 PID 4892 wrote to memory of 620 4892 cmd.exe 100 PID 4892 wrote to memory of 620 4892 cmd.exe 100 PID 4892 wrote to memory of 3528 4892 cmd.exe 101 PID 4892 wrote to memory of 3528 4892 cmd.exe 101 PID 4892 wrote to memory of 3656 4892 cmd.exe 102 PID 4892 wrote to memory of 3656 4892 cmd.exe 102 PID 4892 wrote to memory of 3656 4892 cmd.exe 102 PID 4892 wrote to memory of 3020 4892 cmd.exe 103 PID 4892 wrote to memory of 3020 4892 cmd.exe 103 PID 4892 wrote to memory of 3696 4892 cmd.exe 105 PID 4892 wrote to memory of 3696 4892 cmd.exe 105 PID 3040 wrote to memory of 5880 3040 TjNkNpAilaYvt.exe 106 PID 3040 wrote to memory of 5880 3040 TjNkNpAilaYvt.exe 106 PID 3040 wrote to memory of 5880 3040 TjNkNpAilaYvt.exe 106 PID 3696 wrote to memory of 784 3696 scrok.exe 8 PID 3696 wrote to memory of 784 3696 scrok.exe 8 PID 3696 wrote to memory of 784 3696 scrok.exe 8 PID 5880 wrote to memory of 1344 5880 setup.exe 107 PID 5880 wrote to memory of 1344 5880 setup.exe 107 PID 5880 wrote to memory of 1344 5880 setup.exe 107 PID 5880 wrote to memory of 3144 5880 setup.exe 108 PID 5880 wrote to memory of 3144 5880 setup.exe 108 PID 5880 wrote to memory of 3144 5880 setup.exe 108 PID 5880 wrote to memory of 656 5880 setup.exe 109 PID 5880 wrote to memory of 656 5880 setup.exe 109 PID 5880 wrote to memory of 656 5880 setup.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:784
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chromestup.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2948
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 78AF0B3C1D11D155E04BC764B15BB8052⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 74⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3416
-
-
C:\ProgramData\setup\aa.exeC:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5168
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3656
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe start4⤵
- Executes dropped EXE
PID:3020
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exe"C:\ProgramData\Smart\TjNkNpAilaYvt.exe"1⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\ProgramData\Smart\setup.exe"C:\ProgramData\Smart\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5880 -
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3144
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ef99e085a9e335073e809c6e0070ec8
SHA16168bc705bfe2d043397b6172d37dbaf3ef2b13d
SHA25644706b924a6dd8c215ba14ae7723c02df9cc37bd20737f0479d026164c2b3e7c
SHA5122f59e4070280672bf9be978dcb88e8eeb0aaf0725b49618d4c3c63a4b018e9f9af3a575f1f615736051def7613773de7e6a7893586490a853646a45dbbed0b16
-
Filesize
3.4MB
MD5e67516972f762b64b2dc4b03ba8296b3
SHA115a764f0dd0f0e98b1dbc2e54858ea4228123853
SHA256f23fc1c9fc311388f659a3c3c839c8c2be94b74837b5af19afcfc0df9e8b25e1
SHA512e1e29ae8854932944377039ec681a443b7528366568991f89845c62d6d65503355a5e76a22c2495209cacd1f64e8346c41671d3af1e691a7b64183c5734f40da
-
Filesize
2.7MB
MD5ac30909929056007eaf0fbcf53c3a21f
SHA17046d48c84748b246ebaa1c0153e8f81d3b0acc1
SHA256f11baf3657a9bbfeb5d140a37d456573f589212447446a1519033ad010b9f58f
SHA51271a40652f3cdfbd33cfc539855d6cbb1fba601e83bbd4b3e4f5e397144b3abfed5d148b486aec4eec17136e063609f93beae72a5e78d12d876dd79ccd3c9c849
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
935B
MD5800f6a8e7db6875828e3ccd3a727ac70
SHA16dffa759e3ad855e14e8c048f1a7ade114fe0d2e
SHA256d02dd55378f7a138ebf86a351e2ab54e07bf17af37b70014434a07004ca98f5c
SHA512087a8e1bcb129e4d0af3b9267f60431af9b23e3491b0391509a7d6926e5cf02230a687a4a4a577df6819dc09b54d1fd4ed50ca47743383672c6610be889ad890
-
Filesize
1009B
MD57042cfaa6c98aba2c27f16953c1ad87d
SHA111768f996e2e882d3d32f73fcc70b480d34e60c0
SHA25672813747a14587374848b41218c1399f315d2402bdf72ad571f262121a0a0137
SHA5127518e656c830265930566a3be6b617cf4ec921d2116e80c55e6a1549c43b8ebe922104d8f7a59d9260e7c572a26538899816300f1c4cdb40eabca06bd489a632
-
Filesize
424B
MD5f89151164342c6544098ef91e6fecad6
SHA1cf96be5b28617bf1f9cb73a67e31b691903deac9
SHA2565d8f50ae6823148918824fd89c7a7f7b9a82fd64a99e09653ffeee7a3d6e0b86
SHA51234f4f75abe13583d18bb8177aa7b518c9c881dab800b46fc128900a2978a03640c6ef289ec05d9b81701f8b87afe6d9424726dc98b115065f7ddadf9a5e91f3b
-
Filesize
677B
MD5d9e12ec4193c056b10dcdf30f58441b6
SHA1552176b94f8f3e16f175448e9ee7325be5df49bd
SHA256a32c26ac1568887e192ee14dd652a81978066acf55a8d5734b13f02b67886352
SHA5129ec0e82ce11549908360770f4e3cc9aa8793f832b96e617c5abcdbf88cc409184a3bf54bffc6905482d0600778fd3e87d68c1e580630276f2660cd4b9d94ca13
-
Filesize
769B
MD5eeaa4df402b90ef059d96281379b7e05
SHA19e2a4226c6b2aefd1434a8eacf2303b8fa8a136c
SHA2562b0b5eab1699674b5ca7ebf94bd77028dd1ecaef6160bce994b40ad4ecddff68
SHA512923f4fa00364306b534cf5620d551350cc46c9f3c25ce99fc6a36ddb1a565ee24001fc260629baf2875df6b74307c6512969d3d2abd394ed1c62f3c510d63c42
-
Filesize
298B
MD52c706293a3cfff8cc184a8e9a3b3da08
SHA1873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d
SHA256ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067
SHA5124aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043
-
Filesize
4.7MB
MD5113f2ba0cb86477d66f1d8c85a1babfc
SHA1b5501c19f3fe899565df3bead0580fa3fee54856
SHA2566cc5816529c56e5b0c871accbbb3de9abf83ac541645f587da4607d60d3b0e11
SHA51250617759533ca626d79bb19764da0a44774ced9d59a4a6386eda46ad6c21dc54189605b7555fee870059e447c5d4dde28c7c68dc185ab5cd53002f68f4c27d40
-
Filesize
1.0MB
MD509c448be7e7d84e6e544cc03afbb05d8
SHA1ddc13e71a72bc49c60f89b98cbb79c2449cfa07e
SHA256a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5
SHA512e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12
-
Filesize
10.7MB
MD582caf2f7b43286317bd12b703c63670f
SHA19aed1ac05263c1ae297966862a60ca8007aa93e1
SHA256e5f84ec6545e825601ff3510a1847d0554640851969aaeba53af2fc74c68dc20
SHA5124c060a2bbb35e80831ca5008c80ffeb5c703fbba37f9bd9f0ddcb660628bb50c8ce9f4035fdc31da705bb019224926ac30276fd54333c70f5d496a82007d1f39
-
Filesize
1KB
MD5122cf3c4f3452a55a92edee78316e071
SHA1f2caa36d483076c92d17224cf92e260516b3cbbf
SHA25642f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0
SHA512c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
1.1MB
MD5ae463676775a1dd0b7a28ddb265b4065
SHA1dff64c17885c7628b22631a2cdc9da83e417d348
SHA25683fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22
SHA512e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6
-
Filesize
24.1MB
MD5b6c3beadfa8571b4c0a049193e41b1fd
SHA16add00b1ed46d9e462f5c37c17e1bd60c8b565d7
SHA2561c9504b34928e0758ae1981c2bc08383cb0401e3bbd98ce58890a775ac2a406c
SHA51212e6e7e825530f2f094f04272843b4addd5f43516b9b170c2a6fd9c8756302e87275a77625013f66189ec12134e70be662d996aa2e24142acbc9a9c21d98a216
-
\??\Volume{28d8005c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b5a36326-c034-4319-8fc2-0012ac073134}_OnDiskSnapshotProp
Filesize6KB
MD5e0a6cd7da7f03c119d5f221ab71298f3
SHA183c21a0ac885dba7c03568d758bf86cf2ea3f0de
SHA2564e89797ba4a7d914a0c7e6b2d64e3f6ed591b5f0d949901d7e475d5e3cdeef43
SHA512c3a1df633ee0b7da3279e9227b036c28c2340850d76d378f3b5521ae8fd7874dc090f8c5d3d591f1a529b06d10ffc25eeb3b9ee9be451b02096b29fd7aebb76b