Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
YH.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
YH.msi
Resource
win10v2004-20250314-en
General
-
Target
YH.msi
-
Size
13.4MB
-
MD5
e41527007d14c7f084a0b702b283e1e5
-
SHA1
e51d10f9918816e9f7abbf289ff4f9a271d4f1af
-
SHA256
dd847b7624e96514b2ee1c6b942867b69e1281d76802244917cda997776d8a2e
-
SHA512
1aaafc3992bc6a0e57c6316288cf6fbc0ecdb11f78c8eb38cf99a77fd33f834a79727d1cad1eb48be938b0a1733c1b5251430b564968022eac15d9d5979ce999
-
SSDEEP
196608:pBfMDJ9/wXYZUpMqJsfvgfKJ10PlJc3DN2ZlcLB0kS731:pBfMDJ9+pMq4vcKPElJmZ2/c9A
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/1932-127-0x0000000000400000-0x0000000000B99000-memory.dmp family_blackmoon -
Fatalrat family
-
Fatal Rat payload 1 IoCs
resource yara_rule behavioral1/memory/3016-150-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat -
resource yara_rule behavioral1/files/0x00080000000193e8-58.dat vmprotect behavioral1/memory/2520-65-0x000000013FD90000-0x000000014033C000-memory.dmp vmprotect behavioral1/files/0x000500000001a41d-105.dat vmprotect behavioral1/memory/1560-117-0x000000013FBB0000-0x000000014015C000-memory.dmp vmprotect behavioral1/memory/1932-127-0x0000000000400000-0x0000000000B99000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI54B8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5620.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5797.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f785310.msi msiexec.exe File opened for modification C:\Windows\Installer\f785310.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI536D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI541A.tmp msiexec.exe File created C:\Windows\Installer\f785313.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f785313.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI5459.tmp msiexec.exe -
Executes dropped EXE 11 IoCs
pid Process 572 aa.exe 2520 scrok.exe 1740 TjNkNpAilaYvt.exe 2316 TjNkNpAilaYvt.exe 1168 TjNkNpAilaYvt.exe 2440 TjNkNpAilaYvt.exe 1560 scrok.exe 1932 setup.exe 2196 svchost.exe 3016 svchost.exe 860 svchost.exe -
Loads dropped DLL 27 IoCs
pid Process 2892 MsiExec.exe 2892 MsiExec.exe 2892 MsiExec.exe 2892 MsiExec.exe 2892 MsiExec.exe 1632 cmd.exe 1632 cmd.exe 1632 cmd.exe 1632 cmd.exe 1932 setup.exe 1932 setup.exe 1932 setup.exe 1932 setup.exe 1932 setup.exe 1932 setup.exe 1932 setup.exe 2196 svchost.exe 3016 svchost.exe 2196 svchost.exe 3016 svchost.exe 3016 svchost.exe 2196 svchost.exe 1932 setup.exe 1932 setup.exe 860 svchost.exe 860 svchost.exe 860 svchost.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 1712 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1944 timeout.exe 1544 timeout.exe -
Modifies data under HKEY_USERS 54 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\Group = "Fatal" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\InstallTime = "2025-03-21 01:17" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 1192 msiexec.exe 1192 msiexec.exe 2520 scrok.exe 2520 scrok.exe 2440 TjNkNpAilaYvt.exe 1560 scrok.exe 1560 scrok.exe 1932 setup.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe 3016 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1712 msiexec.exe Token: SeIncreaseQuotaPrivilege 1712 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeSecurityPrivilege 1192 msiexec.exe Token: SeCreateTokenPrivilege 1712 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1712 msiexec.exe Token: SeLockMemoryPrivilege 1712 msiexec.exe Token: SeIncreaseQuotaPrivilege 1712 msiexec.exe Token: SeMachineAccountPrivilege 1712 msiexec.exe Token: SeTcbPrivilege 1712 msiexec.exe Token: SeSecurityPrivilege 1712 msiexec.exe Token: SeTakeOwnershipPrivilege 1712 msiexec.exe Token: SeLoadDriverPrivilege 1712 msiexec.exe Token: SeSystemProfilePrivilege 1712 msiexec.exe Token: SeSystemtimePrivilege 1712 msiexec.exe Token: SeProfSingleProcessPrivilege 1712 msiexec.exe Token: SeIncBasePriorityPrivilege 1712 msiexec.exe Token: SeCreatePagefilePrivilege 1712 msiexec.exe Token: SeCreatePermanentPrivilege 1712 msiexec.exe Token: SeBackupPrivilege 1712 msiexec.exe Token: SeRestorePrivilege 1712 msiexec.exe Token: SeShutdownPrivilege 1712 msiexec.exe Token: SeDebugPrivilege 1712 msiexec.exe Token: SeAuditPrivilege 1712 msiexec.exe Token: SeSystemEnvironmentPrivilege 1712 msiexec.exe Token: SeChangeNotifyPrivilege 1712 msiexec.exe Token: SeRemoteShutdownPrivilege 1712 msiexec.exe Token: SeUndockPrivilege 1712 msiexec.exe Token: SeSyncAgentPrivilege 1712 msiexec.exe Token: SeEnableDelegationPrivilege 1712 msiexec.exe Token: SeManageVolumePrivilege 1712 msiexec.exe Token: SeImpersonatePrivilege 1712 msiexec.exe Token: SeCreateGlobalPrivilege 1712 msiexec.exe Token: SeBackupPrivilege 2248 vssvc.exe Token: SeRestorePrivilege 2248 vssvc.exe Token: SeAuditPrivilege 2248 vssvc.exe Token: SeBackupPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 2640 DrvInst.exe Token: SeLoadDriverPrivilege 2640 DrvInst.exe Token: SeLoadDriverPrivilege 2640 DrvInst.exe Token: SeLoadDriverPrivilege 2640 DrvInst.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe Token: SeTakeOwnershipPrivilege 1192 msiexec.exe Token: SeRestorePrivilege 1192 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1712 msiexec.exe 1712 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1932 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 1192 wrote to memory of 2892 1192 msiexec.exe 33 PID 2892 wrote to memory of 1632 2892 MsiExec.exe 34 PID 2892 wrote to memory of 1632 2892 MsiExec.exe 34 PID 2892 wrote to memory of 1632 2892 MsiExec.exe 34 PID 2892 wrote to memory of 1632 2892 MsiExec.exe 34 PID 1632 wrote to memory of 1944 1632 cmd.exe 36 PID 1632 wrote to memory of 1944 1632 cmd.exe 36 PID 1632 wrote to memory of 1944 1632 cmd.exe 36 PID 1632 wrote to memory of 1944 1632 cmd.exe 36 PID 1632 wrote to memory of 572 1632 cmd.exe 37 PID 1632 wrote to memory of 572 1632 cmd.exe 37 PID 1632 wrote to memory of 572 1632 cmd.exe 37 PID 1632 wrote to memory of 572 1632 cmd.exe 37 PID 1632 wrote to memory of 2520 1632 cmd.exe 38 PID 1632 wrote to memory of 2520 1632 cmd.exe 38 PID 1632 wrote to memory of 2520 1632 cmd.exe 38 PID 1632 wrote to memory of 2520 1632 cmd.exe 38 PID 2520 wrote to memory of 596 2520 scrok.exe 9 PID 1632 wrote to memory of 1740 1632 cmd.exe 39 PID 1632 wrote to memory of 1740 1632 cmd.exe 39 PID 1632 wrote to memory of 1740 1632 cmd.exe 39 PID 1632 wrote to memory of 1740 1632 cmd.exe 39 PID 1632 wrote to memory of 2316 1632 cmd.exe 40 PID 1632 wrote to memory of 2316 1632 cmd.exe 40 PID 1632 wrote to memory of 2316 1632 cmd.exe 40 PID 1632 wrote to memory of 2316 1632 cmd.exe 40 PID 1632 wrote to memory of 1544 1632 cmd.exe 41 PID 1632 wrote to memory of 1544 1632 cmd.exe 41 PID 1632 wrote to memory of 1544 1632 cmd.exe 41 PID 1632 wrote to memory of 1544 1632 cmd.exe 41 PID 1632 wrote to memory of 1168 1632 cmd.exe 42 PID 1632 wrote to memory of 1168 1632 cmd.exe 42 PID 1632 wrote to memory of 1168 1632 cmd.exe 42 PID 1632 wrote to memory of 1168 1632 cmd.exe 42 PID 1632 wrote to memory of 1560 1632 cmd.exe 44 PID 1632 wrote to memory of 1560 1632 cmd.exe 44 PID 1632 wrote to memory of 1560 1632 cmd.exe 44 PID 1632 wrote to memory of 1560 1632 cmd.exe 44 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 2440 wrote to memory of 1932 2440 TjNkNpAilaYvt.exe 45 PID 1560 wrote to memory of 596 1560 scrok.exe 9 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 2196 1932 setup.exe 46 PID 1932 wrote to memory of 3016 1932 setup.exe 47 PID 1932 wrote to memory of 3016 1932 setup.exe 47 PID 1932 wrote to memory of 3016 1932 setup.exe 47 PID 1932 wrote to memory of 3016 1932 setup.exe 47 PID 1932 wrote to memory of 3016 1932 setup.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:596
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A0" "000000000000038C"2⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\YH.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1712
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A79612A44E32C4C07D4371AD4224F40E2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 74⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1944
-
-
C:\ProgramData\setup\aa.exeC:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData4⤵
- Executes dropped EXE
PID:572
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
PID:1740
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
PID:2316
-
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1544
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe start4⤵
- Executes dropped EXE
PID:1168
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exe"C:\ProgramData\Smart\TjNkNpAilaYvt.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\ProgramData\Smart\setup.exe"C:\ProgramData\Smart\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57f91347abe52434d3c6111da370e832f
SHA18b53d1f47a86031a337e677dafb0288c065bbb42
SHA256023ac0545b6bf3e5ddc5218e53d3f4d5c504e2365de4e6e95058cca4af77b405
SHA51225a6a4284c3a433ead41e83130345288568d94bea100f51c9101bc0c5914c1a600027a6f28c9a295f62c13fe6b372774e463d712882af89a8d037ce3408e196f
-
Filesize
2.7MB
MD5ac30909929056007eaf0fbcf53c3a21f
SHA17046d48c84748b246ebaa1c0153e8f81d3b0acc1
SHA256f11baf3657a9bbfeb5d140a37d456573f589212447446a1519033ad010b9f58f
SHA51271a40652f3cdfbd33cfc539855d6cbb1fba601e83bbd4b3e4f5e397144b3abfed5d148b486aec4eec17136e063609f93beae72a5e78d12d876dd79ccd3c9c849
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
1009B
MD54c2cdc4e316d09456f15a4e31484b32d
SHA1b3bf4dee4f00a16f436828f0dd348974d1811dfa
SHA256e9e74ce3225d07c9001c096b5f52e6efbf2ba5afb8e73cb2c8106315187fba4d
SHA5122047c402cbc9320c28b1f375a578e0527099867f2e7f00ec84cca24393ea4d914b4b1ea3d633e3c3add21fee6589b7db05d4a231c697c6810b13c4e4f7380899
-
Filesize
266B
MD5eb89d5d281df3b3c9d59ce40a2961483
SHA14479dd705ef5b4b9402276b837a7e333dc63e4b2
SHA2565fc3632440177408b824d7dcc4b3e5c0c4fe80efe9a583a085e8f29a0ecbcbc3
SHA512784bbe43605e92f2f0e11ff5bf8b9e37a18ec256320e25432d797986f7f9d8b17fb7b1a621ea84014e5396e7b6938dc411d84d45a75b66841c0284bc34127d2b
-
Filesize
613B
MD5253521abecacf37abca48ee19a661030
SHA1198ded5aa5fa30fa447a5f48cf9d30a76e7df1f8
SHA2566b7ee95b5c8dd517cfa781ca7617d261889fc1d6347824b8f617c0892a3a4993
SHA512c938f82fd05ca17fd674b2b8cf2b6d7211146ca5d93087624cc8d9d68d143301c67a41662178b19441c442d48f2083867e664a8d7ab1dbb74f5dc83ca21059e8
-
Filesize
769B
MD5afefb5408963eb215a4e3c9bc0cb5632
SHA18a0d24c7b52a6f0fe8aa7f54a20896bc780382dc
SHA2561f2aaffc50b54f650a3e63e8d3dd06ec5e7aaea9f12d9d53a9963b17f628e756
SHA512b7bed55b1fc2414e1bed9f1767e26da1d3f076db9ed428dc8d21927d6928508ae705680dfb9481787e8409ef96d701257d948ba7a1d258a6b98b9d95f708becb
-
Filesize
935B
MD5869bc713f227a3b7b34dc3fd5ef84187
SHA1e6d90ad15f2a5cabbbaf44e9c4279e8fcb5e8cf8
SHA2561d7ebbc00f3ab83b5cf5e5e2766e8163817e11219a34cc711da00175114ad0d6
SHA512f35a42cbc2e5cb0ae6e63e3384c4fdd1a5abc05e9cff687538b522df75a3c4cdff6d9e9ba49bc46777429dbe53ee36747790b9a02bb00039ef47e3421e78dda0
-
Filesize
298B
MD52c706293a3cfff8cc184a8e9a3b3da08
SHA1873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d
SHA256ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067
SHA5124aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043
-
Filesize
4.7MB
MD5113f2ba0cb86477d66f1d8c85a1babfc
SHA1b5501c19f3fe899565df3bead0580fa3fee54856
SHA2566cc5816529c56e5b0c871accbbb3de9abf83ac541645f587da4607d60d3b0e11
SHA51250617759533ca626d79bb19764da0a44774ced9d59a4a6386eda46ad6c21dc54189605b7555fee870059e447c5d4dde28c7c68dc185ab5cd53002f68f4c27d40
-
Filesize
10.7MB
MD5719e58569397eae6dcd46b0fbddfcb32
SHA1a383266b8014c52d92e87a510c9ab5f6f4b7c0bc
SHA2560c8e0665a47d1d912fff8db473ee93e33631b68af70fa7fb03bcebc2d887226f
SHA512e349321ca84a08f99e6d85a7a39090990a25f5dd012d87b31a354975c0cacdf9452147fede97fa48eca761214de0e4c839898e0e1b36f1175e6114508c134b70
-
Filesize
1.1MB
MD5ae463676775a1dd0b7a28ddb265b4065
SHA1dff64c17885c7628b22631a2cdc9da83e417d348
SHA25683fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22
SHA512e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6
-
Filesize
3.4MB
MD5e67516972f762b64b2dc4b03ba8296b3
SHA115a764f0dd0f0e98b1dbc2e54858ea4228123853
SHA256f23fc1c9fc311388f659a3c3c839c8c2be94b74837b5af19afcfc0df9e8b25e1
SHA512e1e29ae8854932944377039ec681a443b7528366568991f89845c62d6d65503355a5e76a22c2495209cacd1f64e8346c41671d3af1e691a7b64183c5734f40da
-
Filesize
1.0MB
MD509c448be7e7d84e6e544cc03afbb05d8
SHA1ddc13e71a72bc49c60f89b98cbb79c2449cfa07e
SHA256a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5
SHA512e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a