PUP.Passview
Table of Contents
Analysis Report
General information
| Family Name: | PUP.Passview |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
6567bcfb97a8c74b5589ab104898dcba
SHA1:
d5bc36e063943223efbc6bd284628f5f54c43926
File Size:
382.46 KB, 382464 bytes
|
|
MD5:
678823fc26edea569d6ad3f9e644f82b
SHA1:
c21d3fb829f1378aa2eccfc161a0ca1c1dbc68da
File Size:
2.98 MB, 2982819 bytes
|
|
MD5:
ca859b2e567f71caeaffd0e0cbb73462
SHA1:
c500b9f8aa5795150769ea80f7c81df0f407cdf1
SHA256:
1CCEA6390B007971B38A81C19472FA2E1F14F3F6A3D381CCD3EC00189BFEE4BF
File Size:
355.94 KB, 355936 bytes
|
|
MD5:
b9ecda532c939060b59b00e73fefec6c
SHA1:
23a28929fffddac1fe0e5c753aa950ebfecd4187
SHA256:
02EB2283F5CA8E9025D4B3300F46B05BAFA8FA87E0309DCCE0585157A54ADDD8
File Size:
255.04 KB, 255041 bytes
|
|
MD5:
8c7c5efd914acbe64ee3cd6b131d1be5
SHA1:
22c56f11ed003ccb8f557125671e933b4d50a36f
SHA256:
83139343F7C496696E0D815C80199072F2017F909ABF3F3A35DCE633F06C4D01
File Size:
37.89 KB, 37888 bytes
|
Show More
|
MD5:
8e12f0d3811165e13fa5598403f112d6
SHA1:
d237d255785295ba97544fcb39a1f95c9e6890eb
SHA256:
655FA0B8234FE3ACAF2886FFC46F06F75B09FD963F03C1623D8E1D0B8031DF17
File Size:
365.18 KB, 365177 bytes
|
|
MD5:
dbda1fdc9ac4fa6a7f26ae8ce346121f
SHA1:
51116bd04e95f4955a9eab9eeaffe57015bd2b9f
SHA256:
743B0DE8AA49404A810CD3D88B176D39080FB7D6888DDB3B8021EBF9037426CE
File Size:
306.18 KB, 306176 bytes
|
|
MD5:
d276d4ce4d96ad4d6a1be6d3d40286e8
SHA1:
0d831c4284e6abc27b2afd7380f969f9c883b457
SHA256:
6680567D4C211A35DC2495647BA310549320FFF6C175096E825074500350DE17
File Size:
36.35 KB, 36352 bytes
|
|
MD5:
9538df5c7a62cc2954d1ce02d991d585
SHA1:
afcde72b4ef9ae81e6de673fe4fd3a46f1f88c82
SHA256:
AE34A1EE0304B9D754D04D60FAED4870FCCDF14CA57A4D97AEA38EA157FE654C
File Size:
1.94 MB, 1935960 bytes
|
|
MD5:
a8bd5ff2ddea9fe2ab0909dd0987e0b6
SHA1:
c4fbce46dcafb98de3a0ba3f8297f5989dddd99f
SHA256:
E36DD068C5DBAADA910949A26FF6460245989B1929B9416DFD7CAC871E43A3CB
File Size:
1.11 MB, 1110106 bytes
|
|
MD5:
602f503942d9f7a72c60719cffbc4c2f
SHA1:
d723a49bd5738e4419150c8a19550fc619393120
SHA256:
2A68E4A3ACEE900A10A16000C31AD398E4629DA26DFB3B9AA196FEA1B380ED2A
File Size:
835.58 KB, 835584 bytes
|
|
MD5:
eb6cc0cb208e5178fafe9f43b738c125
SHA1:
3bcc2a22df1ca7507173bce5c21414cc8955a6a3
SHA256:
8AF7D4215D7C784BC4E675A6E1FFAF82BF7780D3AA06D72EED6043F49024C83C
File Size:
167.09 KB, 167088 bytes
|
|
MD5:
d4708c8feaafa1fa05bc67017c752c57
SHA1:
a77c9ad7eefe43119521ca3ec8cb896dfd82539e
SHA256:
5CD1B74F704E514A97DCC02D351A2D22BB7DB0D9A549E35F2F2527CE87AA8E35
File Size:
248.32 KB, 248320 bytes
|
|
MD5:
32bef0ddb0cefe94ef140b95b62cc964
SHA1:
01b3ad95b988974b53d236ea69e0921c2c01dcbe
SHA256:
CD1E1F4A8FB9649A74C87BEC893166FFE081CFB19CDD60CF2BAFA7469D8099B4
File Size:
2.80 MB, 2795100 bytes
|
|
MD5:
4f6881f82c48917acec7418f62cf85d4
SHA1:
4ea9645b5d9572be81a987adc0a90a719d8c0455
SHA256:
19532D3EF701E665590776E0C47D3AF17A5F34DC0D927E8169470646EF6D1009
File Size:
1.84 MB, 1836975 bytes
|
|
MD5:
04e59f24a23532175a70bdff139cc57f
SHA1:
6a0d320b0d9409a2fa1897c3fd24f7fdf2522da4
SHA256:
53880D26F1137818EF8BD2DFE2F580EA93FCA80BE50C91FF235C498971974910
File Size:
3.58 MB, 3582903 bytes
|
|
MD5:
96553c73a2dc02caf842421c474e164d
SHA1:
6d3cb8216d370d5181eec71eae981640e5b54595
SHA256:
7B55F5CB7C37B5561F55DC21D4290D3FC4FBE5EBDF3B72E52CDB6B5C07C039EF
File Size:
249.34 KB, 249344 bytes
|
|
MD5:
6fd0e5e0d0b144c29c280eaa7f7587ec
SHA1:
79cf51c60ee423da86f4356e317853c54bb4e6bd
SHA256:
D447FB1A64DDBE3B6913F360B2BCFDB1E747FEA44878EE6E091B2D5A2C307447
File Size:
206.85 KB, 206848 bytes
|
|
MD5:
db4be722338f22bcd4035af41f0c3681
SHA1:
eeb2c60961d5d5e1694a462ed9b2a6fbbdf68761
SHA256:
BB7E75BD0771F88471460ECD792D398D7991CC0C20E54E0D43F5967BB5CC9B05
File Size:
1.87 MB, 1867872 bytes
|
|
MD5:
d7dc8a24941e48501fded22f9fafa04f
SHA1:
94d324c71387406dae9aae592df3e56c96b0d684
SHA256:
2CBB7C6E9FDF6FC1F597F333B562E6308737FFD38E8CA17B9DF0126CD6FCF8F2
File Size:
151.55 KB, 151552 bytes
|
|
MD5:
763c8a7f2ef9eea7a9144cebf068cdb7
SHA1:
8c8ae221b07561406e8156f20aa0474b56f56a53
SHA256:
F5E2A6DBBDC7D4ABA905B511E507BAC61352E24E21BC2BB85DA17A75B029FE99
File Size:
4.71 MB, 4707328 bytes
|
|
MD5:
37ac773c73119284ff830e5cace64d5d
SHA1:
71efe3baab91ef9af7763a30a6b1a037758c98bb
SHA256:
6915BDD6876D3EB40FEA44330E7BD6ADD1EDB2BFFEAB0279E253899E885D505D
File Size:
364.64 KB, 364642 bytes
|
|
MD5:
ffa39f9019fb009603a621335f1670ba
SHA1:
7ad08f5a7cc65a4adcdbafa7607a47e7040f2a75
SHA256:
E63294831E9B5AF7F702A51F1ACE4432532DA9B1CD0EBB37CC8AF234D84D2891
File Size:
24.58 KB, 24576 bytes
|
|
MD5:
072e4ccfc15570b120f70b64bbccb310
SHA1:
a419e5ebfcc30b5513e48cf1ec432bc02859980f
SHA256:
A40D2F2F69D321354EFF16E511F4CE456C517BCBAC17147AADC51C5EE5568393
File Size:
177.66 KB, 177664 bytes
|
|
MD5:
6d1afd7b672af2847e06524f6bbfe4ca
SHA1:
5ea39648a059df5eac0059989b362d39a1188203
SHA256:
499145E76A218BF3C62F0EDCD5C31D7C678079C51C3D7E57CC7028F995476BDD
File Size:
415.56 KB, 415560 bytes
|
|
MD5:
bffdc8036604f21538f6ce748d3a95bb
SHA1:
b8947b9e0d50fe3f4e5f5c1afe27e94d6349b45e
SHA256:
29A0B3DE6269E0D2EAF8B68CC64F991E58DAA4A9235622F101C56B38D04A68C9
File Size:
407.58 KB, 407578 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has TLS information
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
Show More
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version | 0.0.0.0 |
| Builder | Admin 09:40:18 04/04/2024 |
| Comments |
|
| Company Name |
|
| Created | 7z SFX Constructor v4.6.0.0 (http://usbtor.ru/viewtopic.php?t=798) |
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Legal Copyright |
Show More
|
| Legal Trademarks |
|
| Original File Name |
|
| Original Filename |
Show More
|
| Private Build | 틎멷諒酇གྷ탛㏯킳⋤�鞟㟸+濕�홤ꏨ깩鄲ᙖ쨞ld |
| Product Name |
Show More
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Serhiy Horobets | Serhiy Horobets | Self Signed |
| Nir Sofer | UTN-USERFirst-Object | Hash Mismatch |
File Traits
- .adata
- 00 section
- 2+ executable sections
- 7-zip (In Overlay)
- 7-zip Installer
- 7zSFX
- big overlay
- CryptUnprotectData
- HighEntropy
- Inno
Show More
- InnoSetup Installer
- Installer Manifest
- Installer Version
- No CryptProtectData
- nosig nsis
- No Version Info
- Nullsoft Installer
- packed
- PECompact v2.20
- upx
- vb6
- WriteProcessMemory
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 78 |
|---|---|
| Potentially Malicious Blocks: | 0 |
| Whitelisted Blocks: | 78 |
| Unknown Blocks: | 0 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.M
- Agent.MH
- Agent.MI
- Agent.MU
- Autorun.LA
Show More
- Banload.XG
- Delf.AJ
- Delf.XA
- Emotet.AAPA
- FakeAV.AU
- Injector.XG
- Lotok.J
- MSIL.HackKMS.BC
- PassView.BA
- Spy.Banker.X
- Stealer.UHBC
- Stealer.UHM
- Trojan.Downloader.Gen.BQ
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\program files (x86)\common files\microsoft shared\msinfo\msinfo32.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\progra~3\packag~1\{042d2~1\vcredi~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\progra~3\packag~1\{33d1f~1\vcredi~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\progra~3\packag~1\{47109~1\vc_red~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\progra~3\packag~1\{5af95~1\vc_red~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\progra~3\packag~1\{9dff3~1\vcredi~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\progra~3\packag~1\{ca675~1\vcredi~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\sandbo~1\__sand~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\sandbo~1\sandbo~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Show More
| c:\sandbo~1\sandbo~2.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\sandbo~1\shsand~1.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_16.db | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\explorer\iconcache_idx.db | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\2k10\recall\languages | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\languages\recall.ru.po | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\languages\recall.ru.po | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\rasdnd.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\rasdnd.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\readme.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\readme.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\recall.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\recall.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\recall.exe | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\2k10\recall\sqlite3.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\recall\sqlite3.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\3582-490\8c8ae221b07561406e8156f20aa0474b56f56a53_0004707328 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsdaaf1.tmp\btmimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsdaaf1.tmp\confirm.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsdaaf1.tmp\finish.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsdaaf1.tmp\header.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsdaaf1.tmp\iswelcome.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsdaaf1.tmp\leftimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse5640.tmp\btmimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse5640.tmp\confirm.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse5640.tmp\finish.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse5640.tmp\header.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse5640.tmp\iswelcome.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse5640.tmp\leftimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\btmimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\btmimg.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\header.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\header.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\leftimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseba1e.tmp\leftimg.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\btmimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\btmimg.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\header.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\header.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\leftimg.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss399e.tmp\leftimg.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nst65a6.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst65a6.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nst65a6.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst65a6.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsy6576.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\setup_productkeydecryptor_101.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\setup_routerpassworddecryptor_101.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\~df84d59622542abe41.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\roaming\51116bd04e95f4955a9eab9eeaffe57015bd2b9f_0000306176.il | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\krylack password decryptor\install\2.70.01\disk1.cab | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\krylack password decryptor\install\2.70.01\klpassdecrypt.msi | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\krylack password decryptor\install\2.80.01\disk1.cab | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\krylack password decryptor\install\2.80.01\klpassdecrypt.msi | Generic Write,Read Attributes |
| c:\windows\svchost.com | Generic Write,Read Attributes |
| c:\windows\svchost.com | Synchronize,Write Attributes |
| c:\windows\system.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Qolrbesk\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Qolrbesk\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Qolrbesk\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 硝㭢䍳ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䥸顳惁ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\explorer\advanced::hidden | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::antivirusoverride | RegNtPreCreateKey |
Show More
| HKLM\software\wow6432node\microsoft\security center::antivirusdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::firewalldisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::firewalloverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::updatesdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center::uacdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::antivirusoverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::antivirusdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::firewalldisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::firewalloverride | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::updatesdisablenotify | RegNtPreCreateKey | |
| HKLM\software\wow6432node\microsoft\security center\svc::uacdisablenotify | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings::globaluseroffline | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows\currentversion\policies\system::enablelua | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile::enablefirewall | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile::donotallowexceptions | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile::disablenotifications | RegNtPreCreateKey | |
| HKCU\software\apcr\1214104697::1919251317 | | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::-456464662 | RegNtPreCreateKey | |
| HKCU\software\apcr\1214104697::1462786655 | RegNtPreCreateKey | |
| HKCU\software\apcr\1214104697::-912929324 | # | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::1006321993 | ċ | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::-1369393986 | http://althawry.org/images/xs.jpg http://www.careerdesk.org/im | RegNtPreCreateKey |
| HKCU\software\apcr\1214104697::549857331 | RegNtPreCreateKey | |
| HKCU\software\apcr::u1_0 | ᅕ쒧 | RegNtPreCreateKey |
| HKCU\software\apcr::u2_0 | ♨ | RegNtPreCreateKey |
| HKCU\software\apcr::u3_0 | 権ă | RegNtPreCreateKey |
| HKCU\software\apcr::u4_0 | RegNtPreCreateKey | |
| HKLM\software\classes\exefile\shell\open\command:: | C:\WINDOWS\svchost.com "%1" %* | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352 *1\??\C:\P | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62 *1\??\C:\P | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
71 additional items are not displayed above. |
| Anti Debug |
|
| User Data Access |
|
| Keyboard Access |
|
| Other Suspicious |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Encryption Used |
|
| Network Info Queried |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Process Terminate |
|
| Service Control |
|
| Network Wininet |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Qolrbesk\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ilasm.exe "C:\Users\Qykednqt\AppData\Roaming\51116bd04e95f4955a9eab9eeaffe57015bd2b9f_0000306176.il"
|
C:\WINDOWS\system32\msiexec.exe /i "C:\Users\Keppvkhm\AppData\Roaming\KRyLack Password Decryptor\install\2.80.01\KLPassDecrypt.msi" AI_SETUPEXEPATH="c:\users\user\downloads\afcde72b4ef9ae81e6de673fe4fd3a46f1f88c82_0001935960" SETUPEXEDIR="c:\users\user\downloads\"
|
(NULL) cmd.exe /c move recall.dll recall.exe
|
WriteConsole: 1 file(s
|
Show More
(NULL) cmd.exe /c (C:\WINDOWS\system32\Runscanner.cmd ReCall.exe)||(C:\WINDOWS\system32\Runscanner.exe /ac /m+ /sd /ec /y /t 0 ReCall.exe)||ReCall.exe
|
C:\WINDOWS\system32\msiexec.exe /i "C:\Users\Nixxewag\AppData\Roaming\KRyLack Password Decryptor\install\2.70.01\KLPassDecrypt.msi" AI_SETUPEXEPATH="c:\users\user\downloads\eeb2c60961d5d5e1694a462ed9b2a6fbbdf68761_0001867872" SETUPEXEDIR="c:\users\user\downloads\"
|
open C:\Users\Iuxrcyoq\AppData\Local\Temp\3582-490\8c8ae221b07561406e8156f20aa0474b56f56a53_0004707328
|
"C:\Users\Jqccuybr\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
C:\Users\Rrwysumf\AppData\Local\Temp\Setup_RouterPasswordDecryptor_101.exe
|
C:\Users\Tmvkjtie\AppData\Local\Temp\Setup_ProductKeyDecryptor_101.exe
|