Report
Report
#22574627
Classifications: Spyware
Verdict Reason: -
ID #11579424
MD5 162d8c383d950b03cb90542ebc6bc59b
SHA1 e6336cffb13da369a318b72d99b48eb510f529b0
SHA256 10c874fb42cf4058d85898bb0490f0495980f17bd869caba738b25d2680e6d7e
OVERVIEW
VMRay Threat Identifiers (19 rules, 174 matches)
• YARA detected "Lumma_v4_May2024" from ruleset "Malware" in memory dump data from (process #6) steamupdater.exe.
• A configuration for Lumma was extracted from artifacts of the dynamic analysis.
5/5 Anti Analysis Makes indirect system call to possibly evade hooking based monitoring 8 -
• Reputation analysis labels the URL "hxxps://steamcommunity[.]com/profiles/76561199724331900" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://worthsuwqp[.]shop/api" which was contacted by (process #6) steamupdater.exe as C2/Generic-A.
• Reputation analysis labels the URL "hxxps://chickerkuso[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://achievenmtynwjq[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://puredoffustow[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://opponnentduei[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://metallygaricwo[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://milldymarskwom[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://quotamkdsdqo[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• Reputation analysis labels the URL "hxxps://carrtychaintnyw[.]shop/api" which was contacted by (process #6) steamupdater.exe as Mal/HTMLGen-A.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe tries to detect antivirus software via WMI query: "SELECT displayName FROM AntiVirusProduct".
• (Process #19) sppextcomobj.exe tries to detect antivirus software via WMI query: "SELECT displayName FROM AntiVirusProduct".
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe queries hardware properties via WMI: SELECT * FROM Win32_Processor.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe queries hardware properties via WMI: SELECT Name FROM Win32_VideoController.
• (Process #19) sppextcomobj.exe queries hardware properties via WMI: SELECT * FROM Win32_Processor.
• (Process #19) sppextcomobj.exe queries hardware properties via WMI: SELECT Name FROM Win32_VideoController.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe queries OS version via WMI query: SELECT ProductType FROM Win32_OperatingSystem.
• (Process #19) sppextcomobj.exe queries OS version via WMI query: SELECT ProductType FROM Win32_OperatingSystem.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe enumerates running processes via WMI query SELECT Name FROM Win32_Process.
• (Process #19) sppextcomobj.exe enumerates running processes via WMI query SELECT Name FROM Win32_Process.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe tries to gather information about application "Mozilla Firefox" by file.
• (Process #19) sppextcomobj.exe tries to gather information about application "Mozilla Firefox" by file.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe starts (process #6) steamupdater.exe with a hidden window.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe starts (process #7) powershell.exe with a hidden window.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe starts (process #11) cmd.exe with a hidden window.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe starts (process #14) cmd.exe with a hidden window.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe starts (process #16) cmd.exe with a hidden window.
• (Process #1) securiteinfo.com.win64.malwarex-gen.7213.10695.exe starts (process #19) sppextcomobj.exe with a hidden window.
• File "C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_cc38888a-7080-4220-9b7d-de7a9b2167ba" is a
known clean file.
• File "C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_67a2505d-bf00-4e2f-b010-406d32caddc3" is a
known clean file.
• File "C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6de40067-cd2a-4666-8cd9-870e0a588215" is a
known clean file.
• File "C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6fe77092-4798-42ae-bda5-e7f822b580e9" is a
known clean file.
• File "C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_01c28806-e5ae-41cc-b284-e627e1b02beb" is a
known clean file.
• File "C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_da21122d-ae44-4f93-ba1d-c9a978ca5b20" is a
known clean file.
Url quotamkdsdqo.shop
Url milldymarskwom.shop
Url metallygaricwo.shop
Url chickerkuso.shop
Url achievenmtynwjq.shop
Url opponnentduei.shop
Url carrtychaintnyw.shop
Url worthsuwqp.shop
Sample Information
ID #11579424
MD5 162d8c383d950b03cb90542ebc6bc59b
SHA1 e6336cffb13da369a318b72d99b48eb510f529b0
SHA256 10c874fb42cf4058d85898bb0490f0495980f17bd869caba738b25d2680e6d7e
SSDeep 786432:aGQzF+p61uokR68PPXV7J/c6aYrkJ/bO9TovQVRg8jrO:osw5kFt7J/cRDSTooVimO
ImpHash 65fb49c803a4d63a7a7286237a201445
Has Macros ✔
Analysis Information
Reputation Enabled ✔
WHOIS Enabled ✖
Built-in AV Enabled ✖
Built-in AV Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files
Number of AV Matches 0
YARA Enabled ✔
YARA Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files
Screenshots truncated
NETWORK
General
2 ports 443, 53
2 contacted IP addresses
72 URLs extracted
1 files downloaded
DNS
1 nameservers contacted
HTTP/S
HTTP Requests
Method URL Dest. IP Dest. Port Status Code Response Size Verdict
hxxp://store[.]steampowered[.]com/account/
GET - - - 0 bytes CLEAN
cookiepreferences/
hxxps://www[.]valvesoftware[.]com/en/contact?contact-
GET - - - 0 bytes CLEAN
person=Translation%20Team%20Feedback
hxxps://steamcommunity[.]com/linkfilter/?
GET - - - 0 bytes CLEAN
u=http%3A%2F%2Fwww.geonames.org
hxxps://steamcommunity[.]com/login/home/?
GET - - - 0 bytes CLEAN
goto=profiles%2F76561199724331900
Method URL Dest. IP Dest. Port Status Code Response Size Verdict
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET - - - 0 bytes CLEAN
shared/images/responsive/header_menu_hamburger.png
hxxps://community[.]cloudflare[.]steamstatic[.]com//public//
GET css//skin_1//economy.css? - - - 0 bytes CLEAN
v=Hib2Mv7hYJ4z&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/css/shared_global.css? - - - 0 bytes CLEAN
v=nBdvNPPzc0qI&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/css/buttons.css? - - - 0 bytes CLEAN
v=tuNiaSwXwcYT&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/css/motiva_sans.css? - - - 0 bytes CLEAN
v=GfSjbGKcNYaQ&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET - - - 0 bytes CLEAN
shared/images/responsive/header_logo.png
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET javascript/applications/community/manifest.js?v=r7a4- - - - 0 bytes CLEAN
LYcQOjv&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET - - - 0 bytes CLEAN
images/skin_1/footerLogo_valve.png?v=1
hxxps://community[.]cloudflare[.]steamstatic[.]com//public//
GET javascript//json2.js? - - - 0 bytes CLEAN
v=pmScf4470EZP&l=english&_cdn=cloudflare\
hxxps://community[.]cloudflare[.]steamstatic[.]com//public//
GET javascript//economy_common.js? - - - 0 bytes CLEAN
v=tsXdRVB0yEaR&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/css/shared_responsive.css? - - - 0 bytes CLEAN
v=eghn9DNyCY67&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/javascript/auth_refresh.js? - - - 0 bytes CLEAN
v=WgUxSlKTb3W1&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com//public//
GET javascript//economy.js?v=7F-CkHa- - - - 0 bytes CLEAN
o5A1&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/javascript/tooltip.js? - - - 0 bytes CLEAN
v=.zYHOpI1L3Rt0&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET css/applications/community/main.css? - - - 0 bytes CLEAN
v=D_iTAfDsLHps&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET css/globalv2.css? - - - 0 bytes CLEAN
v=pwVcIAtHNXwg&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET css/skin_1/header.css? - - - 0 bytes CLEAN
v=vh4BMeDcNiCU&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
javascript/scriptaculous/_combined.js?
GET - - - 0 bytes CLEAN
v=OeNIgrpEF8tL&l=english&_cdn=cloudflare&load=effects
,controls,slider,dragdrop
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET - - - 0 bytes CLEAN
shared/images/responsive/logo_valve_footer.png
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/javascript/shared_global.js? - - - 0 bytes CLEAN
v=wJD9maDpDcVL&l=english&_cdn=cloudflare
Method URL Dest. IP Dest. Port Status Code Response Size Verdict
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET javascript/jquery-1.11.1.min.js? - - - 0 bytes CLEAN
v=.isFTSRckeNhC&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET javascript/applications/community/libraries~b28b7af69.js? - - - 0 bytes CLEAN
v=KwNbKLgEHlA9&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET css/skin_1/fatalerror.css? - - - 0 bytes CLEAN
v=wctRWaBvNt2z&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET shared/javascript/shared_responsive_adapter.js? - - - 0 bytes CLEAN
v=pSvIAKtunfWg&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET javascript/prototype-1.7.js?v=. - - - 0 bytes CLEAN
55t44gwuwgvw&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET javascript/applications/community/main.js? - - - 0 bytes CLEAN
v=4XouecKy8sZy&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET javascript/global.js? - - - 0 bytes CLEAN
v=bOP7RorZq4_W&l=english&_cdn=cloudflare
hxxps://community[.]cloudflare[.]steamstatic[.]com/public/
GET - - - 0 bytes CLEAN
shared/images/header/logo_steam.svg?t=962016
hxxps://steamcommunity[.]com/profiles/
GET - - - 0 bytes MALICIOUS
76561199724331900
DNS Requests
BEHAVIOR
Process Graph
#3
RPC Server wmiprvse.exe
#2
svchost.exe RPC Server
#10
RPC Server wmiprvse.exe
#6
steamupdater.exe
Child Process
#7
powershell.exe
Child Process
Child Process
Child Process
#16 Child Process #18
cmd.exe reg.exe
#19
sppextcomobj.exe
ID 1
PID 1916
Parent PID -
Bitness 64 Bit
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852
C:\ProgramData\Fonts_Temp\Music_1\SgrmBroker.exe 0 bytes ✖
b855
C:
2da3bf745b7692957b34a88191dd53d5e5da2bb2524520c423d51a530cd
\Users\RDHJ0C~1\AppData\Local\Temp\temp_NrjxjLtkwcDyZIpqfk 16 bytes ✖
cc143
McaboJM
f2af9576b7878464c0c955db670e1ba7b3cdd344f30fe72030016f4622f1a
C:\Users\RDHJ0C~1\AppData\Local\Temp\SteamUpdater.exe 1388.50 KB ✖
485
2bc0d668f794cfd2de2109fa80de09ba63b5157bf44923e501af1522db3de
C:\ProgramData\Documents_2\Videos_3\SppExtComObj.exe 10240.00 KB ✖
821
Host Behavior
Type Count
Module 292
File 549
System 32
Environment 4
Process 1341
- 1234
COM 6
- 14
- 3
Registry 57
ID 2
PID 1000
Bitness 64 Bit
ID 3
PID 4480
Bitness 64 Bit
Host Behavior
Type Count
System 225
Registry 4
User 2
Process 731
- 1232
Module 16
ID 6
Return Code 0
PID 2948
Bitness 32 Bit
Host Behavior
Type Count
Module 49
File 6
- 4
Environment 1
Network Behavior
Type Count
HTTPS 10
TCP 9
ID 7
Command Line "powershell.exe" -Command "Add-MpPreference -ExclusionPath @($env:ProgramData, 'C:\Users\Public') -ExclusionExtension '.exe' -Force"
Return Code 1
PID 4584
Bitness 64 Bit
Host Behavior
Type Count
Module 14
File 1288
Environment 116
Registry 87
- 44
System 57
Mutex 60
COM 2
ID 10
PID 4860
Bitness 64 Bit
Host Behavior
Type Count
System 3
Mutex 1
Module 22
Registry 4
File 1
ID 11
Return Code 87
PID 3208
Bitness 64 Bit
Host Behavior
Type Count
Module 1
Environment 8
File 8
Process 1
ID 13
Return Code 87
PID 3236
Bitness 64 Bit
ID 14
Return Code 0
PID 3312
Bitness 64 Bit
Host Behavior
Type Count
Module 1
Environment 1
File 12
ID 16
Return Code 0
PID 3340
Bitness 64 Bit
Host Behavior
Type Count
Module 1
Environment 8
File 8
Process 1
ID 18
Return Code 0
PID 3368
Bitness 64 Bit
Host Behavior
Type Count
Module 1
Registry 4
File 6
ID 19
PID 3428
Bitness 64 Bit
Host Behavior
Type Count
Module 276
System 19
COM 6
- 14
Environment 3
Process 1238
- 1179
- 4
ARTIFACTS
File
SHA256 File Names Category File Size MIME Type Operations Verdict
C:
10c874fb42cf4058d85898bb application/
\Users\RDhJ0CNFevzX\Desktop\Sec
0490f0495980f17bd869caba Sample File 31211.50 KB vnd.microsoft.portable- Access MALICIOUS
uriteInfo.com.Win64.MalwareX-gen.
738b25d2680e6d7e executable
7213.10695.exe
f2af9576b7878464c0c955db C: application/
670e1ba7b3cdd344f30fe720 \Users\RDHJ0C~1\AppData\Local\Te Dropped File 1388.50 KB vnd.microsoft.portable- Access, Create, Write MALICIOUS
30016f4622f1a485 mp\SteamUpdater.exe executable
85677f31c12cf0ffab1accf5f7 application/
5c6332698494eb89c648d65 - Memory Dump 376.00 KB vnd.microsoft.portable- - MALICIOUS
479998177847209 executable
fa3c159d792acf44ae54e66a application/
d5dc8049672becfb8e43fdadf - Memory Dump 376.00 KB vnd.microsoft.portable- - MALICIOUS
43ce52d2744e7d6 executable
7f0abda0746b05ce49354286 application/
a5709cb4aecef6f961112ca5f - Memory Dump 376.00 KB vnd.microsoft.portable- - MALICIOUS
fd832a950769f46 executable
1c56babd7f3df9557237a9b6 application/
0ac4b928c03231caa210fbd4 - Memory Dump 376.00 KB vnd.microsoft.portable- - MALICIOUS
9a843d3989b4310f executable
ec113f57a1c9bd7583147770 application/
abb5747b6482f96a58c74ed1 - Memory Dump 376.00 KB vnd.microsoft.portable- - MALICIOUS
68348352784ad965 executable
763fe1a74412bf2f3891b2bdf application/
070ab9f532bf28278fa8e32f0 - Memory Dump 373.00 KB vnd.microsoft.portable- - MALICIOUS
670d3d58fc9beb executable
2bc0d668f794cfd2de2109fa8 C: application/
0de09ba63b5157bf44923e50 \ProgramData\Documents_2\Videos_ Dropped File 10240.00 KB vnd.microsoft.portable- Access, Create, Write SUSPICIOUS
1af1522db3de821 3\SppExtComObj.exe executable
37a54b555c5851d0af64cad8
6d6798f5a590f3f5acffe4e41d - Downloaded File 25.55 KB text/html - CLEAN
92e6cb7184f981
C:
2da3bf745b7692957b34a881
\Users\RDHJ0C~1\AppData\Local\Te
91dd53d5e5da2bb2524520c Dropped File 16 bytes text/plain Access, Create, Write CLEAN
mp\temp_NrjxjLtkwcDyZIpqfkMcaboJ
423d51a530cdcc143
M
C:
44742d932d7338f9146df028 \Users\RDhJ0CNFevzX\AppData\Loc
68c8a69d4f827436d2da2675 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
17b951dd0c17977b mmandAnalysis\PowerShell_Analysis
CacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Loc
bfd60204585f1603ee9faac7c
al\Microsoft\Windows\PowerShell\Co
44adb9fcd6fa56b7748f03ecb Modified File 1.16 KB application/octet-stream Access, Write CLEAN
mmandAnalysis\PowerShell_Analysis
1a9beaa7c56ea1
CacheEntry_6fe77092-4798-42ae-
bda5-e7f822b580e9
C:
6b267f5681bcd6ea35dc1765 \Users\RDhJ0CNFevzX\AppData\Loc
808ea53540ff701e223fd4726 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
21c1c8cd9265318 mmandAnalysis\PowerShell_Analysis
CacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Loc
72831bc6962c8017ea71abc
al\Microsoft\Windows\PowerShell\Co
038a8f60e79976ebaf05d363 Modified File 10.76 KB application/octet-stream Access, Read, Write CLEAN
mmandAnalysis\PowerShell_Analysis
c80f32c975a55d0d9
CacheEntry_da21122d-ae44-4f93-
ba1d-c9a978ca5b20
C:
22e0e4a48c52bf2bbb8ead29 \Users\RDhJ0CNFevzX\AppData\Loc
e4cd23bfdb0a57dd8cf0d1a3 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
9fdbd6afa0a05b48 mmandAnalysis\PowerShell_Analysis
CacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Loc
12bd362291f72f2c2e775674
al\Microsoft\Windows\PowerShell\Co
2b7377549d13d5bf231455d2 Modified File 1.77 KB application/octet-stream Access, Read, Write CLEAN
mmandAnalysis\PowerShell_Analysis
3ef250c5bdf18121
CacheEntry_cc38888a-7080-4220-9b7
d-de7a9b2167ba
SHA256 File Names Category File Size MIME Type Operations Verdict
C:
7f3fba01490fc77e7fc3fdaeb6 \Users\RDhJ0CNFevzX\AppData\Loc
f1a65be4ee06a68d72badbd4 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
0e225a328b7c92 mmandAnalysis\PowerShell_Analysis
CacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Loc
b0ada1a5b9cd3c6c3c9fa895
al\Microsoft\Windows\PowerShell\Co
bf63665129ea3ac1be1391a2 Modified File 1.60 KB application/octet-stream Access, Write CLEAN
mmandAnalysis\PowerShell_Analysis
064296fdf950fe3a
CacheEntry_6de40067-
cd2a-4666-8cd9-870e0a588215
C:
70d5a5033e624a3fdc47588e \Users\RDhJ0CNFevzX\AppData\Loc
253fa6f933b049d9edf430ec8 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
c2b25af96c360be mmandAnalysis\PowerShell_Analysis
CacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Loc
9214d80f84cede2f6a2b72f61
al\Microsoft\Windows\PowerShell\Co
7e0c6a54c75f589b00ff17d28 Modified File 602 bytes application/octet-stream Access, Read, Write CLEAN
mmandAnalysis\PowerShell_Analysis
58041e541f30b0
CacheEntry_01c28806-e5ae-41cc-
b284-e627e1b02beb
C:
5116fdea0963fe70138ced56 \Users\RDhJ0CNFevzX\AppData\Loc
819a18fc6deafcd717f59e749 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
a8f1bce5911ab43 mmandAnalysis\PowerShell_Analysis
CacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Loc
bff972df82ef871cff56b4093f6
al\Microsoft\Windows\PowerShell\Co
953a526992555c2913ecd6fe Modified File 8.73 KB application/octet-stream Access, Read, Write CLEAN
mmandAnalysis\PowerShell_Analysis
de0d642b7cc0a
CacheEntry_67a2505d-bf00-4e2f-
b010-406d32caddc3
C:
4460bc99a8abeb1f58a85ee2 \Users\RDhJ0CNFevzX\AppData\Loc
a7da1092b3f3cdf23dcefc8e1 al\Microsoft\Windows\PowerShell\Co Modified File 19.23 KB application/octet-stream Access, Read, Write CLEAN
05d9b328e4a84d3 mmandAnalysis\PowerShell_Analysis
CacheIndex
Filename
C:
\Users\RDhJ0CNFevzX\Desktop\SecuriteInfo.com.Win64.MalwareX- Accessed File, Sample File Access MALICIOUS
gen.7213.10695.exe
C:
\Users\RDHJ0C~1\AppData\Local\Temp\temp_NrjxjLtkwcDyZIpqfk Accessed File, Dropped File Access, Create, Write CLEAN
McaboJM
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS Accessed File, Modified File Access, Read, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheIndex
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS
Accessed File, Modified File Access, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6fe77092-4
798-42ae-bda5-e7f822b580e9
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS
Accessed File, Modified File Access, Read, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheEntry_da21122d-
ae44-4f93-ba1d-c9a978ca5b20
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS
Accessed File, Modified File Access, Read, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheEntry_cc38888a-7
080-4220-9b7d-de7a9b2167ba
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS
Accessed File, Modified File Access, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6de40067-
cd2a-4666-8cd9-870e0a588215
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS
Accessed File, Modified File Access, Read, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheEntry_01c28806-
e5ae-41cc-b284-e627e1b02beb
C:
\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerS
Accessed File, Modified File Access, Read, Write CLEAN
hell\CommandAnalysis\PowerShell_AnalysisCacheEntry_67a2505d-
bf00-4e2f-b010-406d32caddc3
C:\ProgramData\Fonts_Temp\Music_1\SgrmBroker.exe Accessed File, Dropped File, Modified File Access, Create, Write CLEAN
C:\Program Files (x86)\Microsoft SQL Server\ok top.exe Accessed File Access CLEAN
C:\Program Files\Windows Media Player\let sense right.exe Accessed File Access CLEAN
C:
\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy Accessed File Access CLEAN
\SearchUI.exe
C:
\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellE Accessed File Access CLEAN
xperienceHost.exe
c:
\windows\system32\windowspowershell\v1.0\Modules\AppBackgroun Accessed File Access CLEAN
dTask
C:
\Windows\system32\WindowsPowerShell\v1.0\Modules\AppBackgro Accessed File Access CLEAN
undTask\AppBackgroundTask.psd1
c:
\windows\system32\windowspowershell\v1.0\Modules\AppLocker\Ap Accessed File Access CLEAN
pLocker.psd1
c:
\windows\system32\windowspowershell\v1.0\Modules\Appx\Appx.ps Accessed File Access CLEAN
d1
c:
\windows\system32\windowspowershell\v1.0\Modules\AssignedAcce Accessed File Access CLEAN
ss
c:
\windows\system32\windowspowershell\v1.0\Modules\AssignedAcce Accessed File Access CLEAN
ss\AssignedAccess.psd1
C:\Program
Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\Pa Accessed File Access, Read CLEAN
ckageManagement.psd1
C:\Program
Files\WindowsPowerShell\Modules\PackageManagement\PackageM Accessed File Access CLEAN
anagement.psd1
C:\Program
Files\WindowsPowerShell\Modules\PackageManagement\PackageM Accessed File Access CLEAN
anagement.psm1
C:\Program
Files\WindowsPowerShell\Modules\PackageManagement\PackageM Accessed File Access CLEAN
anagement.cdxml
C:\Program
Files\WindowsPowerShell\Modules\PackageManagement\PackageM Accessed File Access CLEAN
anagement.xaml
C:\Program
Files\WindowsPowerShell\Modules\PackageManagement\PackageM Accessed File Access CLEAN
anagement.dll
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\Pester\3.3.5\3.3.5.psd1
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\Pester\3.3.5\3.3.5.psm1
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\Pester\3.3.5\3.3.5.cdxml
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\Pester\3.3.5\3.3.5.xaml
C:\Program
Accessed File Access, Read CLEAN
Files\WindowsPowerShell\Modules\Pester\3.3.5\Pester.psd1
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\1.0.0.1.ps Accessed File Access CLEAN
d1
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\1.0.0.1.ps Accessed File Access CLEAN
m1
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\1.0.0.1.cd Accessed File Access CLEAN
xml
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\1.0.0.1.xa Accessed File Access CLEAN
ml
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\1.0.0.1.dll
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerSh Accessed File Access, Read CLEAN
ellGet.psd1
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\PowerShellGet.p Accessed File Access CLEAN
sd1
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\PowerShellGet.p Accessed File Access CLEAN
sm1
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\PowerShellGet.c Accessed File Access CLEAN
dxml
C:\Program
Files\WindowsPowerShell\Modules\PowerShellGet\PowerShellGet.x Accessed File Access CLEAN
aml
C:\Program
Accessed File Access CLEAN
Files\WindowsPowerShell\Modules\PowerShellGet\PowerShellGet.dll
Reduced dataset
URL
Attempted To Contact,
hxxps://worthsuwqp[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://chickerkuso[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://achievenmtynwjq[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://puredoffustow[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://opponnentduei[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://metallygaricwo[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://milldymarskwom[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://quotamkdsdqo[.]shop/api - - - MALICIOUS
Extracted
Attempted To Contact,
hxxps://carrtychaintnyw[.]shop/api - - - MALICIOUS
Extracted
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/css/motiva_sans.css?
v=GfSjbGKcNYaQ&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/css/buttons.css?
v=tuNiaSwXwcYT&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/css/shared_global.css?
v=nBdvNPPzc0qI&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/css/globalv2.css?
v=pwVcIAtHNXwg&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/css/skin_1/fatalerror.css?
v=wctRWaBvNt2z&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/css/shared_responsive.css?
v=eghn9DNyCY67&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/css/skin_1/header.css?
v=vh4BMeDcNiCU&l=english&_cdn=cloudflare
hxxps://steamcommunity[.]com/login/home/?
Extracted 23.197.127.21 Germany - CLEAN
goto=profiles%2F76561199724331900
hxxps://steamcommunity[.]com/?
Extracted 23.197.127.21 Germany - CLEAN
subsection=broadcasts
hxxps://store[.]steampowered[.]com/
Extracted - - - CLEAN
privacy_agreement/
hxxps://store[.]steampowered[.]com/
Extracted - - - CLEAN
subscriber_agreement/
hxxps://store[.]steampowered[.]com/
Extracted - - - CLEAN
steam_refunds/
hxxps://www[.]valvesoftware[.]com/en/contact?
contact- Extracted - - - CLEAN
person=Translation%20Team%20Feedback
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/css/applications/community/main.css?
v=D_iTAfDsLHps&l=english&_cdn=cloudflare
hxxps://steamcommunity[.]com/linkfilter/?
Extracted 23.197.127.21 Germany - CLEAN
u=http%3A%2F%2Fwww.geonames.org
hxxp://store[.]steampowered[.]com/
Extracted - - - CLEAN
privacy_agreement/
hxxp://store[.]steampowered[.]com/
Extracted - - - CLEAN
subscriber_agreement/
hxxp://store[.]steampowered[.]com/account/
Extracted - - - CLEAN
cookiepreferences/
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/javascript/prototype-1.7.js?v=.
55t44gwuwgvw&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
c/javascript/scriptaculous/_combined.js? Extracted - - - CLEAN
v=OeNIgrpEF8tL&l=english&_cdn=cloudflare&lo
ad=effects,controls,slider,dragdrop
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/javascript/global.js?
v=bOP7RorZq4_W&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/javascript/jquery-1.11.1.min.js?
v=.isFTSRckeNhC&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/javascript/tooltip.js?
v=.zYHOpI1L3Rt0&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/javascript/shared_global.js?
v=wJD9maDpDcVL&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/javascript/auth_refresh.js?
v=WgUxSlKTb3W1&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
c/shared/javascript/ Extracted - - - CLEAN
shared_responsive_adapter.js?
v=pSvIAKtunfWg&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/images/responsive/
logo_valve_footer.png
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/images/responsive/
header_menu_hamburger.png
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi Extracted - - - CLEAN
c/shared/images/responsive/header_logo.png
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/shared/images/header/logo_steam.svg?
t=962016
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/javascript/applications/community/manifest.js?
v=r7a4-LYcQOjv&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
c/javascript/applications/community/ Extracted - - - CLEAN
libraries~b28b7af69.js?
v=KwNbKLgEHlA9&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi
Extracted - - - CLEAN
c/javascript/applications/community/main.js?
v=4XouecKy8sZy&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com/publi Extracted - - - CLEAN
c/images/skin_1/footerLogo_valve.png?v=1
hxxps://
community[.]cloudflare[.]steamstatic[.]com// Extracted - - - CLEAN
public//
hxxps://
community[.]cloudflare[.]steamstatic[.]com//
public//javascript//json2.js? Extracted - - - CLEAN
v=pmScf4470EZP&l=english&_cdn=cl
oudflare\
hxxps://
community[.]cloudflare[.]steamstatic[.]com//
Extracted - - - CLEAN
public//css//skin_1//economy.css?
v=Hib2Mv7hYJ4z&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com//
Extracted - - - CLEAN
public//javascript//economy_common.js?
v=tsXdRVB0yEaR&l=english&_cdn=cloudflare
hxxps://
community[.]cloudflare[.]steamstatic[.]com//
Extracted - - - CLEAN
public//javascript//economy.js?v=7F-CkHa-
o5A1&l=english&_cdn=cloudflare
Domain
worthsuwqp[.]shop - - - MALICIOUS
chickerkuso[.]shop - - - MALICIOUS
achievenmtynwjq[.]shop - - - MALICIOUS
puredoffustow[.]shop - - - MALICIOUS
opponnentduei[.]shop - - - MALICIOUS
metallygaricwo[.]shop - - - MALICIOUS
milldymarskwom[.]shop - - - MALICIOUS
quotamkdsdqo[.]shop - - - MALICIOUS
carrtychaintnyw[.]shop - - - MALICIOUS
community[.]cloudflare[.]steamstatic[.]com - - - CLEAN
store[.]steampowered[.]com - - - CLEAN
help[.]steampowered[.]com - - - CLEAN
www[.]valvesoftware[.]com - - - CLEAN
IP
Mutex
Global\PowerShell_CommandAnalysis_Lock_S-1-5-21-1560258661-3
delete, access powershell.exe CLEAN
990802383-1811730007-1000
Registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\tcpview.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\tcpview.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\tcpview64.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\tcpview64.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\autoruns.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\autoruns.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\autorunsc.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\autorunsc.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\x32dbg.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\x32dbg.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\x64dbg.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\x64dbg.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\Wireshark.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\Wireshark.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\PowerTool.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\PowerTool.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\PowerTool64.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\PowerTool64.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\SystemSettingsAdminFlows.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution
write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\SystemSettingsAdminFlows.exe\MinimumStackCommitInB
ytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\MediaCreationTool22H2.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\MediaCreationTool22H2.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\rstrui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\rstrui.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\vssadmin.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\vssadmin.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\dism.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\dism.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\xcopy.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\xcopy.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\mstsc.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\mstsc.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\ReAgentc.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\ReAgentc.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\systemreset.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\systemreset.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\bcdedit.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\bcdedit.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\recoverydrive.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\recoverydrive.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\MRT.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\MRT.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\wuapihost.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\wuapihost.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\wuauclt.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\wuauclt.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\GlassWire.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\GlassWire.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\GlassWireSetup.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\GlassWireSetup.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
create, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
NT\CurrentVersion\Image File Execution Options\mmc.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution write, access securiteinfo.com.win64.malwarex-gen.7213.10695.exe CLEAN
Options\mmc.exe\MinimumStackCommitInBytes
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Po
access powershell.exe CLEAN
werShell\ScriptBlockLogging
HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Po
access powershell.exe CLEAN
werShell\ScriptBlockLogging
HKEY_LOCAL_MACHINE\Software\Microsoft\PowerShell\3\PowerS
access powershell.exe CLEAN
hellEngine
HKEY_LOCAL_MACHINE\Software\Microsoft\PowerShell\3\PowerS
read, access powershell.exe CLEAN
hellEngine\ApplicationBase
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Sessi
access powershell.exe CLEAN
on Manager\Environment
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Sessi
read, access powershell.exe CLEAN
on Manager\Environment\__PSLockdownPolicy
HKEY_CURRENT_USER\SOFTWARE\Microsoft\.NETFramework\
access powershell.exe CLEAN
XML
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\
access powershell.exe CLEAN
XML
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Ev
access powershell.exe CLEAN
entLog\ProtectedEventLogging
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\Enab
read, access wmiprvse.exe CLEAN
leObjectValidation
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVer
access reg.exe CLEAN
sion\Policies\System
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT\Do
write, read, access reg.exe CLEAN
ntOfferThroughWUAU
Process
YARA / AV
YARA (6)
Ruleset Name Rule Name Rule Description File Type File Name Classification Verdict
ENVIRONMENT
Virtual Machine Information
Name win10_64_th2_en_mso2016
Platform Information
Software Information
System Information