Analysis
-
max time kernel
38s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 08:04
Behavioral task
behavioral1
Sample
USDT Flasher Private v2.2.exe
Resource
win10v2004-20250314-en
General
-
Target
USDT Flasher Private v2.2.exe
-
Size
1.9MB
-
MD5
051d7528b34a6a04c5a99ebde64adcb4
-
SHA1
4ceee7ca158359a5ac373442c83b3942d97c5124
-
SHA256
acb84a0336a45dc387209935852c267abba63b86d820c6a8ea5cbcce0dd7d5e4
-
SHA512
15cfe52738281764625e04cbb65ab1143d63587fa5a7546d2b016e93801584e82506871bb2810738583ecdb88a92e2bc60ceb106db696028f1f22221a8449c5b
-
SSDEEP
24576:gPgvWGZl9tJ5Mo2QhG3aMUFgEsNj9dfF2b6OZBfebd6bIt3MZ2N6zKnBDB+obJwK:0+hZd0Nj9vi6WGkb43uz49B+obC+/v
Malware Config
Extracted
svcstealer
176.113.115.149
185.81.68.156
Signatures
-
Detects SvcStealer Payload 52 IoCs
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
resource yara_rule behavioral1/files/0x00040000000227cb-10.dat family_svcstealer behavioral1/memory/3312-17-0x00007FF6171C0000-0x00007FF6172C5000-memory.dmp family_svcstealer behavioral1/memory/3312-44-0x00007FF6171C0000-0x00007FF6172C5000-memory.dmp family_svcstealer behavioral1/memory/3416-43-0x0000000007370000-0x00000000073B1000-memory.dmp family_svcstealer behavioral1/memory/2576-52-0x00007FF637670000-0x00007FF637775000-memory.dmp family_svcstealer behavioral1/memory/4244-60-0x00007FF637670000-0x00007FF637775000-memory.dmp family_svcstealer behavioral1/memory/5928-58-0x00007FF6171C0000-0x00007FF6172C5000-memory.dmp family_svcstealer behavioral1/memory/2576-50-0x00007FF637670000-0x00007FF637775000-memory.dmp family_svcstealer behavioral1/memory/3416-42-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/3416-34-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/3416-30-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/3416-19-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/3416-35-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/3416-31-0x0000000004F20000-0x0000000004F53000-memory.dmp family_svcstealer behavioral1/memory/3416-25-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/1456-75-0x00007FF666FF0000-0x00007FF6670F5000-memory.dmp family_svcstealer behavioral1/memory/1456-74-0x00007FF666FF0000-0x00007FF6670F5000-memory.dmp family_svcstealer behavioral1/memory/3416-78-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/1200-93-0x00007FF7C68F0000-0x00007FF7C69F5000-memory.dmp family_svcstealer behavioral1/files/0x000e00000002405e-92.dat family_svcstealer behavioral1/memory/3416-88-0x0000000008EB0000-0x0000000008FBB000-memory.dmp family_svcstealer behavioral1/memory/1952-101-0x00007FF7E3500000-0x00007FF7E3605000-memory.dmp family_svcstealer behavioral1/memory/1952-102-0x00007FF7E3500000-0x00007FF7E3605000-memory.dmp family_svcstealer behavioral1/memory/2792-109-0x00007FF6A70A0000-0x00007FF6A71A5000-memory.dmp family_svcstealer behavioral1/memory/5488-116-0x00007FF7E9E50000-0x00007FF7E9F55000-memory.dmp family_svcstealer behavioral1/memory/5488-117-0x00007FF7E9E50000-0x00007FF7E9F55000-memory.dmp family_svcstealer behavioral1/memory/1256-124-0x00007FF6E07B0000-0x00007FF6E08B5000-memory.dmp family_svcstealer behavioral1/memory/1256-125-0x00007FF6E07B0000-0x00007FF6E08B5000-memory.dmp family_svcstealer behavioral1/memory/4056-132-0x00007FF6BC480000-0x00007FF6BC585000-memory.dmp family_svcstealer behavioral1/memory/4056-133-0x00007FF6BC480000-0x00007FF6BC585000-memory.dmp family_svcstealer behavioral1/memory/4372-140-0x00007FF795230000-0x00007FF795335000-memory.dmp family_svcstealer behavioral1/memory/4372-141-0x00007FF795230000-0x00007FF795335000-memory.dmp family_svcstealer behavioral1/memory/4256-148-0x00007FF731780000-0x00007FF731885000-memory.dmp family_svcstealer behavioral1/memory/4256-149-0x00007FF731780000-0x00007FF731885000-memory.dmp family_svcstealer behavioral1/memory/2476-157-0x00007FF708680000-0x00007FF708785000-memory.dmp family_svcstealer behavioral1/memory/2476-156-0x00007FF708680000-0x00007FF708785000-memory.dmp family_svcstealer behavioral1/memory/5348-164-0x00007FF6532E0000-0x00007FF6533E5000-memory.dmp family_svcstealer behavioral1/memory/5348-165-0x00007FF6532E0000-0x00007FF6533E5000-memory.dmp family_svcstealer behavioral1/memory/5304-172-0x00007FF63A810000-0x00007FF63A915000-memory.dmp family_svcstealer behavioral1/memory/5304-173-0x00007FF63A810000-0x00007FF63A915000-memory.dmp family_svcstealer behavioral1/memory/4648-180-0x00007FF6FB0B0000-0x00007FF6FB1B5000-memory.dmp family_svcstealer behavioral1/memory/4648-181-0x00007FF6FB0B0000-0x00007FF6FB1B5000-memory.dmp family_svcstealer behavioral1/memory/4516-188-0x00007FF6881C0000-0x00007FF6882C5000-memory.dmp family_svcstealer behavioral1/memory/4516-189-0x00007FF6881C0000-0x00007FF6882C5000-memory.dmp family_svcstealer behavioral1/memory/3836-196-0x00007FF6F44A0000-0x00007FF6F45A5000-memory.dmp family_svcstealer behavioral1/memory/3836-197-0x00007FF6F44A0000-0x00007FF6F45A5000-memory.dmp family_svcstealer behavioral1/memory/5944-204-0x00007FF66FB30000-0x00007FF66FC35000-memory.dmp family_svcstealer behavioral1/memory/5944-205-0x00007FF66FB30000-0x00007FF66FC35000-memory.dmp family_svcstealer behavioral1/memory/5416-212-0x00007FF61DAD0000-0x00007FF61DBD5000-memory.dmp family_svcstealer behavioral1/memory/5416-213-0x00007FF61DAD0000-0x00007FF61DBD5000-memory.dmp family_svcstealer behavioral1/memory/980-221-0x00007FF6E2840000-0x00007FF6E2945000-memory.dmp family_svcstealer behavioral1/memory/980-220-0x00007FF6E2840000-0x00007FF6E2945000-memory.dmp family_svcstealer -
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation USDT Flasher Private v2.2.exe -
Executes dropped EXE 27 IoCs
pid Process 3312 uyghgvf.exe 4864 bnbnjhc.exe 5692 bvbvcdd.exe 2576 ffdcdbadbafbec.exe 5928 uyghgvf.exe 4244 ffdcdbadbafbec.exe 4472 bvbvcdd.exe 4636 winserv.exe 1456 ffdcdbadbafbec.exe 1200 ffdcdbadbafbec.exe 3920 ffdcdbadbafbec.exe 1952 ffdcdbadbafbec.exe 2792 ffdcdbadbafbec.exe 5488 ffdcdbadbafbec.exe 1256 ffdcdbadbafbec.exe 4056 ffdcdbadbafbec.exe 4372 ffdcdbadbafbec.exe 4256 ffdcdbadbafbec.exe 2476 ffdcdbadbafbec.exe 5348 ffdcdbadbafbec.exe 5304 ffdcdbadbafbec.exe 4648 ffdcdbadbafbec.exe 4516 ffdcdbadbafbec.exe 3836 ffdcdbadbafbec.exe 5944 ffdcdbadbafbec.exe 5416 ffdcdbadbafbec.exe 980 ffdcdbadbafbec.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffdcdbadbafbec = "\"C:\\ProgramData\\ffdcdbadbafbec.exe\"" uyghgvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffdcdbadbafbec = "\"C:\\Users\\Admin\\AppData\\Roaming\\uyghgvf.exe\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffdcdbadbafbec = "\"C:\\ProgramData\\ffdcdbadbafbec.exe\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemServices = "C:\\Users\\Admin\\AppData\\Roaming\\bvbvcdd.exe" bvbvcdd.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemServices = "C:\\Users\\Admin\\AppData\\Roaming\\Winserv\\winserv.exe" bvbvcdd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvbvcdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvbvcdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winserv.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3312 uyghgvf.exe 3312 uyghgvf.exe 3416 Explorer.EXE 3416 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3416 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 3312 2464 USDT Flasher Private v2.2.exe 85 PID 2464 wrote to memory of 3312 2464 USDT Flasher Private v2.2.exe 85 PID 2464 wrote to memory of 4864 2464 USDT Flasher Private v2.2.exe 86 PID 2464 wrote to memory of 4864 2464 USDT Flasher Private v2.2.exe 86 PID 3312 wrote to memory of 3416 3312 uyghgvf.exe 56 PID 3416 wrote to memory of 5652 3416 Explorer.EXE 87 PID 3416 wrote to memory of 5652 3416 Explorer.EXE 87 PID 3416 wrote to memory of 968 3416 Explorer.EXE 88 PID 3416 wrote to memory of 968 3416 Explorer.EXE 88 PID 3416 wrote to memory of 5868 3416 Explorer.EXE 89 PID 3416 wrote to memory of 5868 3416 Explorer.EXE 89 PID 2464 wrote to memory of 5692 2464 USDT Flasher Private v2.2.exe 93 PID 2464 wrote to memory of 5692 2464 USDT Flasher Private v2.2.exe 93 PID 2464 wrote to memory of 5692 2464 USDT Flasher Private v2.2.exe 93 PID 5652 wrote to memory of 2576 5652 cmd.exe 94 PID 5652 wrote to memory of 2576 5652 cmd.exe 94 PID 968 wrote to memory of 5928 968 cmd.exe 95 PID 968 wrote to memory of 5928 968 cmd.exe 95 PID 3416 wrote to memory of 2812 3416 Explorer.EXE 96 PID 3416 wrote to memory of 2812 3416 Explorer.EXE 96 PID 3416 wrote to memory of 4328 3416 Explorer.EXE 98 PID 3416 wrote to memory of 4328 3416 Explorer.EXE 98 PID 5868 wrote to memory of 4244 5868 cmd.exe 100 PID 5868 wrote to memory of 4244 5868 cmd.exe 100 PID 2812 wrote to memory of 4472 2812 cmd.exe 101 PID 2812 wrote to memory of 4472 2812 cmd.exe 101 PID 2812 wrote to memory of 4472 2812 cmd.exe 101 PID 4328 wrote to memory of 4636 4328 cmd.exe 102 PID 4328 wrote to memory of 4636 4328 cmd.exe 102 PID 4328 wrote to memory of 4636 4328 cmd.exe 102 PID 3416 wrote to memory of 5080 3416 Explorer.EXE 106 PID 3416 wrote to memory of 5080 3416 Explorer.EXE 106 PID 5080 wrote to memory of 1456 5080 cmd.exe 108 PID 5080 wrote to memory of 1456 5080 cmd.exe 108 PID 3416 wrote to memory of 5684 3416 Explorer.EXE 112 PID 3416 wrote to memory of 5684 3416 Explorer.EXE 112 PID 3416 wrote to memory of 5780 3416 Explorer.EXE 113 PID 3416 wrote to memory of 5780 3416 Explorer.EXE 113 PID 5684 wrote to memory of 3920 5684 cmd.exe 116 PID 5684 wrote to memory of 3920 5684 cmd.exe 116 PID 5780 wrote to memory of 1200 5780 cmd.exe 117 PID 5780 wrote to memory of 1200 5780 cmd.exe 117 PID 3416 wrote to memory of 4104 3416 Explorer.EXE 120 PID 3416 wrote to memory of 4104 3416 Explorer.EXE 120 PID 4104 wrote to memory of 1952 4104 cmd.exe 122 PID 4104 wrote to memory of 1952 4104 cmd.exe 122 PID 3416 wrote to memory of 4532 3416 Explorer.EXE 124 PID 3416 wrote to memory of 4532 3416 Explorer.EXE 124 PID 4532 wrote to memory of 2792 4532 cmd.exe 126 PID 4532 wrote to memory of 2792 4532 cmd.exe 126 PID 3416 wrote to memory of 1936 3416 Explorer.EXE 127 PID 3416 wrote to memory of 1936 3416 Explorer.EXE 127 PID 1936 wrote to memory of 5488 1936 cmd.exe 129 PID 1936 wrote to memory of 5488 1936 cmd.exe 129 PID 3416 wrote to memory of 5996 3416 Explorer.EXE 132 PID 3416 wrote to memory of 5996 3416 Explorer.EXE 132 PID 5996 wrote to memory of 1256 5996 cmd.exe 134 PID 5996 wrote to memory of 1256 5996 cmd.exe 134 PID 3416 wrote to memory of 4304 3416 Explorer.EXE 135 PID 3416 wrote to memory of 4304 3416 Explorer.EXE 135 PID 4304 wrote to memory of 4056 4304 cmd.exe 137 PID 4304 wrote to memory of 4056 4304 cmd.exe 137 PID 3416 wrote to memory of 5484 3416 Explorer.EXE 138 PID 3416 wrote to memory of 5484 3416 Explorer.EXE 138
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\USDT Flasher Private v2.2.exe"C:\Users\Admin\AppData\Local\Temp\USDT Flasher Private v2.2.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\uyghgvf.exe"C:\Users\Admin\AppData\Roaming\uyghgvf.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312
-
-
C:\Users\Admin\AppData\Roaming\bnbnjhc.exe"C:\Users\Admin\AppData\Roaming\bnbnjhc.exe"3⤵
- Executes dropped EXE
PID:4864
-
-
C:\Users\Admin\AppData\Roaming\bvbvcdd.exe"C:\Users\Admin\AppData\Roaming\bvbvcdd.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\uyghgvf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Roaming\uyghgvf.exeC:\Users\Admin\AppData\Roaming\uyghgvf.exe3⤵
- Executes dropped EXE
PID:5928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5868 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:4244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\bvbvcdd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\bvbvcdd.exeC:\Users\Admin\AppData\Roaming\bvbvcdd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Winserv\winserv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Roaming\Winserv\winserv.exeC:\Users\Admin\AppData\Roaming\Winserv\winserv.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:1456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5684 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:3920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5780 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:1200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:2792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:5488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:1256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:4056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:5484
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:3984
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:4256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:1556
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:2476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:5928
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:5348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:1508
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:5304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:4060
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:4648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:5524
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:4516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:3916
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:3836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:5924
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:5944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:2496
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:5416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:3140
-
C:\ProgramData\ffdcdbadbafbec.exeC:\ProgramData\ffdcdbadbafbec.exe3⤵
- Executes dropped EXE
PID:980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\ProgramData\ffdcdbadbafbec.exe"2⤵PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD5711ea239a05e6eec7feffb60f847ef12
SHA1d443434a5c05061cdc53715a90b3f620e360a3cb
SHA2561d7bd13765f3afcf71a65a4e6b6f3e3c332a3837fa473d897ec774d580894921
SHA512cfbeb271600de9a5fb7b82538bb04189bdf1d1430bdb81e47255b20dfc496f64d0e7f416a4fb983c131be2c496d15e4d81638070fd7191c30c9fd231a3ac3a5c
-
Filesize
1021KB
MD5c6c6f92d42ef620e9dede90b6cc98f12
SHA1222edacf9193578ab5c848d434121afdcde25b2f
SHA256ab61de63b8bc1805d69dbae7573c2bb1863e2192f7dca72341a1483010217357
SHA5124f754942a10d9d2b865e798d9e021d51c48c58f173cc2e11557dd796fbe17e08869dd37c7888aed2f96135606a1b2b7b6328caa21a8c99a37c62487d1b6cb23c
-
Filesize
253KB
MD55381a870d74ee49586aa9632e93c232b
SHA1f2ee6d461102d3353077d3d6f08bbda2b8dfb1ed
SHA256e90f2a5eae99811b65dc284734e0e295708d89bfef9a003b3ab2f8bc42e1fa9c
SHA512c611262eb7badc08486a6416dd470f14d09c5c86c04076a472d32da52bf2cc21344dd4130f85a83cb25556383528ce57ac94ad0de36cef6a67f1bdb9e87a65a9
-
Filesize
177KB
MD54d38d0416a7392711f340e87f22ea4ba
SHA185d501d7fd5fc843e96be88caf6c1f1054aa2f28
SHA25695b64cf5502b24d592c79f2611b76d5d8035c8061c4af6b1ff6800ec2b46442f
SHA5123a86a6521fb856220875c9bac2c01ce82e7e67e515285273f7687596dc6c169949af8703d835654506c8205bcf6d372403c9ea925c0bf2969f11227d7cacb5c0
-
Filesize
1021KB
MD5eb58ebd3579a53abafbe2b8326082f92
SHA1c290f4cbb2bd1c5f6a1b7ab97620f54be52909be
SHA256f1c97917335184a76cb5265af4e2d7a1e5ed58ff8c1d5700b2a95edca412657d
SHA5127d4302aca65d2d2296f66b7f21c6399b21c923723cb14bcb70a53045c9e7181d3b655595fb79b94a67f7e41a7afb0e44c49732b2f0434fc66cce0fb466440ca0