Click to jump to signature section
Source: Submited Sample | Integrated Neural Analysis Model: Matched 81.0% probability |
Source: Amcache.hve.0.dr | String found in binary or memory: http://upx.sf.net |
Source: C:\Windows\System32\cmd.exe | Dropped file: MD5: ac6ad5d9b99757c3a878f2d275ace198 Family: APT37 Alias: Reaper group, Geumseong121, Group 123, Scarcruft, APT-S-008, Red Eyes, TEMP.Reaper, Ricochet Chollima, sun team, APT37 Description: APT37 is a suspected North Korean cyber espionage group that has been in operation since at least 2012. Their targets are primarily located in South Korea, but also Japan, Vietnam, Russia, China, India, and some of the countries in the Middle East. A wider range of industries are affected, including chemicals, electronics, manufacturing, aerospace, automotive and healthcare entities References: https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf https://securelist.com/operation-daybreak/75100/https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/Data Source: https://github.com/RedDrip7/APT_Digital_Weapon |
Source: classification engine | Classification label: mal52.evad.winCMD@19/3@0/0 |
Source: C:\Windows\System32\cmd.exe | File created: C:\Users\user\Desktop\459250\Spa.com | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7272:120:WilError_03 |
Source: C:\Windows\System32\tasklist.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\System32\tasklist.exe | WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |
Source: C:\Windows\System32\tasklist.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: unknown | Process created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Walls.cmd" " | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr /I "opssvc wrsa" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c md 459250 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr /V "Sorry" Branches | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c copy /b ..\Penalties + ..\Let + ..\No + ..\Giant + ..\Instance + ..\Reed + ..\Hawk y | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\choice.exe choice /d y /t 5 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr /I "opssvc wrsa" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c md 459250 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr /V "Sorry" Branches | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c copy /b ..\Penalties + ..\Let + ..\No + ..\Giant + ..\Instance + ..\Reed + ..\Hawk y | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\choice.exe choice /d y /t 5 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: cmdext.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: ntvdm64.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: framedynos.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\choice.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist |
Source: C:\Windows\System32\cmd.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: Amcache.hve.0.dr | Binary or memory string: VMware |
Source: Amcache.hve.0.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.0.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.0.dr | Binary or memory string: VMware, Inc. |
Source: Amcache.hve.0.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.0.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.0.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.0.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.0.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.0.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.0.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.0.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.0.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.0.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.0.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.0.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.0.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.0.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.0.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.0.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.0.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.0.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.0.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.0.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.0.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.0.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.0.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.0.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.0.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\System32\tasklist.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Windows\System32\tasklist.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr /I "opssvc wrsa" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\tasklist.exe tasklist | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c md 459250 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\findstr.exe findstr /V "Sorry" Branches | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\cmd.exe cmd /c copy /b ..\Penalties + ..\Let + ..\No + ..\Giant + ..\Instance + ..\Reed + ..\Hawk y | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\choice.exe choice /d y /t 5 | Jump to behavior |
Source: Amcache.hve.0.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.0.dr | Binary or memory string: msmpeng.exe |
Source: Amcache.hve.0.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.0.dr | Binary or memory string: MsMpEng.exe |