Analysis
-
max time kernel
125s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 14:38
Behavioral task
behavioral1
Sample
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
Resource
win10v2004-20250313-en
General
-
Target
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
-
Size
1.7MB
-
MD5
aaf6a5281734233732b8d9bc038ee684
-
SHA1
1585ef28a6ef1495e3ddecf8e382c046307e4335
-
SHA256
1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed
-
SHA512
f134b2553222e3254d6203bd316d02956a533e8b970d983822b586dd53d4e8b8bda4253d88f3200a9bad806841d9428179bc0146f62a9c134abc43827b153d1a
-
SSDEEP
49152:Wv9SvM4c6bEgejrfFG0A5g8homh6+y6W3qMqs4y4qT8p6C+Kx5:WEvM4c6bEgejrfFG0A5gWoHX6W6nhZqY
Malware Config
Signatures
-
Downloads MZ/PE file 2 IoCs
flow pid Process 24 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 25 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
Executes dropped EXE 3 IoCs
pid Process 112 KB8697411D9777BD96.exe 1204 KB8697411D9777BD96.exe 2072 KB57D08FF360EC9FC4.exe -
Loads dropped DLL 3 IoCs
pid Process 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 112 KB8697411D9777BD96.exe 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-3-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-9-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-8-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-4-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-7-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-11-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-12-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-17-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-18-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-19-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-22-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-23-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-24-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-25-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-26-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-27-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-28-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect behavioral1/memory/2804-29-0x0000000000400000-0x000000000090A000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\T: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\U: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\V: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\X: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\Y: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\Z: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\W: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\E: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\N: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\P: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\Q: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\G: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\H: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\I: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\K: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\L: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\M: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\R: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\S: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe File opened (read-only) \??\J: 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB57D08FF360EC9FC4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB8697411D9777BD96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB8697411D9777BD96.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 4c003100000000002359da2a10204c6f63616c00380008000400efbe2359ac292359da2a2a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c004346534616003100000000002359ac29122041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe2359ac292359ac292a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000042000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a003100000000007c5acb74102054656d700000360008000400efbe2359ac297c5acb742a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2804 wrote to memory of 112 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 32 PID 2804 wrote to memory of 112 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 32 PID 2804 wrote to memory of 112 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 32 PID 2804 wrote to memory of 112 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 32 PID 112 wrote to memory of 1204 112 KB8697411D9777BD96.exe 33 PID 112 wrote to memory of 1204 112 KB8697411D9777BD96.exe 33 PID 112 wrote to memory of 1204 112 KB8697411D9777BD96.exe 33 PID 112 wrote to memory of 1204 112 KB8697411D9777BD96.exe 33 PID 2804 wrote to memory of 2072 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 34 PID 2804 wrote to memory of 2072 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 34 PID 2804 wrote to memory of 2072 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 34 PID 2804 wrote to memory of 2072 2804 1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe"C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe"1⤵
- Downloads MZ/PE file
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\KB8697411D9777BD96.exe"C:\Users\Admin\AppData\Local\Temp\KB8697411D9777BD96.exe" --silent --make_default=1 --rfr=800437 --ua_rfr=CHANNEL_800437 "--partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800437&aux=66668674" "--partner_firstonline_url=http://horses.jacketrescue.ru/v_touch?guid=$__GUID&sig=$__SIG"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\loader_ldir_112_26397\KB8697411D9777BD96.exeC:\Users\Admin\AppData\Local\Temp\loader_ldir_112_26397\KB8697411D9777BD96.exe --silent --rfr=800437 --ua_rfr=CHANNEL_800437 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800437&aux=66668674 --cp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\KB57D08FF360EC9FC4.exe"C:\Users\Admin\AppData\Local\Temp\KB57D08FF360EC9FC4.exe" "--silent" "--without-updater" "--rfr=hp.1:802811,dse.1:802821,vbm.1:802831,hp.2:802851,dse.2:802861,vbm.2:802871,any.2:802801,any:802841" "--pay_browser_class=0" "--install_callback=http://horses.jacketrescue.ru/v_install?aux=66668674&hash=juQFvcSND95z96IC&sig=6c46d97dabf7647e884878d2b8b3c47a&guid={guid}&browser={browser}&{component}=1&browserclass1={browserClass1}&browserclass2={browserClass2}&paid={paid}&pb={paidBrowser}&pa={paidAction}&ibc={installBrowserClass}&pbc={payBrowserClass}&ur={unpaidActionReason}&sid=16045&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871" "--partner_product_online=http://horses.jacketrescue.ru/affect?guid={guid}&sid=16045&homesearch=1&label=811008&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5a29c9f523b47027fb97190b908c18979
SHA1203ca880efa5e1c883f37ad56a4b0e832b813a15
SHA25625ceeaed228c2d7c08bad41362ad6619c243324ad8a0e05c75d3672e96373bed
SHA5122d5383fd32060064843ff66be6f0477d36bb8eb0d348305700563fbb737ceddc14e0589ec78f922e9baa96e00c1487512f32fe92951229d5277db3701936d8c3
-
Filesize
128KB
MD54a8a7eae2a28831d101e754b125ce042
SHA1a9a4cbe2e7a3ea02d952506954c472517f58d383
SHA2565a864f47af1cded89dd57fd6dad3b46c8fa4769363ab1fa560092b557df449b9
SHA5125a35816b40c4659150023d0413f2440619b0202aca2772151c7b6d34d8007d65745b769cbc2ce85d8c30c9a0a9056e440b47ba930859904bd4829b69e05e9ada
-
Filesize
554KB
MD5b2b97b5f2ffe8603788a49b7105baa82
SHA198b854520f4fe748a9ae54c8abe710f99da6acbc
SHA256fe03edbc99e3728745e19e800195fbd795476cd503903eef3714eee5e675f760
SHA512207608bd5529aaeab90b800beacdea9e2700c7a22117e2866c8809f3018d1f42694c50fe379e6d355db49dc93206f340b998d4b9ae2d30cab95fdebdfe549c56