Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ab.exe

Overview

General Information

Sample Name:ab.exe
Analysis ID:1730341
MD5:0b486fe0503524cfe4726a4022fa6a68
SHA1:297dea71d489768ce45d23b0f8a45424b469ab00
SHA256:1228d0f04f0ba82569fc1c0609f9fd6c377a91b9ea44c1e7f9f84b2b90552da2
Infos:

Detection

Avaddon
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Found detection on Joe Sandbox Cloud Basic
Antivirus detection for dropped file
Machine Learning detection for dropped file
Spreads via windows shares (copies files to share folders)
Deletes shadow drive data (may be related to ransomware)
Creates processes via WMI
Uses 32bit PE files
Checks if the current process is being debugged
Checks for available system drives (often done to infect USB drives)

Classification

  • System is start
  • ab.exe (PID: 2704 cmdline: "C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe" MD5: 0B486FE0503524CFE4726A4022FA6A68)
  • ab.exe (PID: 4556 cmdline: "C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe" MD5: 0B486FE0503524CFE4726A4022FA6A68)
    • WMIC.exe (PID: 6576 cmdline: wmic SHADOWCOPY DELETE /nointeractive MD5: 82BB8430531876FBF5266E53460A393E)
      • conhost.exe (PID: 3392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: D837FA4DEE7D84C19FF6F71FC48A6625)
    • WMIC.exe (PID: 5372 cmdline: wmic SHADOWCOPY DELETE /nointeractive MD5: 82BB8430531876FBF5266E53460A393E)
      • conhost.exe (PID: 5956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: D837FA4DEE7D84C19FF6F71FC48A6625)
    • WMIC.exe (PID: 5540 cmdline: wmic SHADOWCOPY DELETE /nointeractive MD5: 82BB8430531876FBF5266E53460A393E)
      • conhost.exe (PID: 412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: D837FA4DEE7D84C19FF6F71FC48A6625)
  • WMIC.exe (PID: 7136 cmdline: wmic SHADOWCOPY DELETE /nointeractive MD5: A2EF3F0AD95FDA9262A5F9533B6DD1BD)
    • conhost.exe (PID: 460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: D837FA4DEE7D84C19FF6F71FC48A6625)
  • WMIC.exe (PID: 5968 cmdline: wmic SHADOWCOPY DELETE /nointeractive MD5: A2EF3F0AD95FDA9262A5F9533B6DD1BD)
    • conhost.exe (PID: 3084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: D837FA4DEE7D84C19FF6F71FC48A6625)
  • WMIC.exe (PID: 3836 cmdline: wmic SHADOWCOPY DELETE /nointeractive MD5: A2EF3F0AD95FDA9262A5F9533B6DD1BD)
    • conhost.exe (PID: 4316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: D837FA4DEE7D84C19FF6F71FC48A6625)
  • ab.exe (PID: 6468 cmdline: C:\Users\abbas\AppData\Roaming\Microsoft\Windows\ab.exe MD5: 0B486FE0503524CFE4726A4022FA6A68)
  • cleanup
No yara matches
No Sigma rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ab.exeVirustotal: Detection: 86%Perma Link
Source: ab.exeMetadefender: Detection: 65%Perma Link
Source: ab.exeReversingLabs: Detection: 96%
Source: C:\Users\abbas\AppData\Roaming\Microsoft\Windows\ab.exeAvira: detection malicious, Label: HEUR/AGEN.1136765
Source: C:\Users\abbas\AppData\Roaming\Microsoft\Windows\ab.exeJoe Sandbox ML: detected
Source: ab.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\Desktop\GAOBCVIQIJ\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\Desktop\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: \\DC-01\public\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\Desktop\QCFWYSKMHA\GVYSd_readme_.txt
Source: ab.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Spreading

barindex
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: Z:\$RECYCLE.BIN
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: Z:\$RECYCLE.BIN\S-1-5-21-3384971621-2488082584-654606338-1105
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: Z:\$RECYCLE.BIN\S-1-5-21-3384971621-2488082584-654606338-1105\desktop.ini
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: z:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: x:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: v:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: t:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: r:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: p:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: n:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: l:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: j:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: h:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: f:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: d:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: b:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: y:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: w:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: u:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: s:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: q:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: o:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: m:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: k:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: i:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: g:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: e:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: c:
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile opened: a:
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: 140.31.126.40.in-addr.arpa

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive

System Summary

barindex
Source: ab.exeJoe Sandbox Cloud Basic: Detection: malicious Score: 100 Threat Name: AvaddonPerma Link
Source: ab.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: ab.exeVirustotal: Detection: 86%
Source: ab.exeMetadefender: Detection: 65%
Source: ab.exeReversingLabs: Detection: 96%
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile read: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe
Source: ab.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: unknownProcess created: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe "C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe"
Source: unknownProcess created: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe "C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exe"
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic SHADOWCOPY DELETE /nointeractive
Source: unknownProcess created: C:\Users\abbas\AppData\Roaming\Microsoft\Windows\ab.exe C:\Users\abbas\AppData\Roaming\Microsoft\Windows\ab.exe
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\AppData\Roaming\Microsoft\Windows\ab.exe
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile written: C:\$RECYCLE.BIN\S-1-5-21-3384971621-2488082584-654606338-1105\desktop.ini
Source: classification engineClassification label: mal80.rans.spre.winEXE@18/46@9/0
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile read: C:\$RECYCLE.BIN\S-1-5-21-3384971621-2488082584-654606338-1105\desktop.ini
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ab.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: ab.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ab.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ab.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ab.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ab.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ab.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Persistence and Installation Behavior

barindex
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\Desktop\GAOBCVIQIJ\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\Desktop\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: \\DC-01\public\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeFile created: C:\Users\abbas\Desktop\QCFWYSKMHA\GVYSd_readme_.txt
Source: C:\Users\abbas\Downloads\MjdQMcMxBd\ab.exeProcess queried: DebugPort
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
11
Windows Management Instrumentation
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
1
Taint Shared Content
Data from Local SystemExfiltration Over Other Network Medium1
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
1
Replication Through Removable Media
Data from Removable MediaExfiltration Over Bluetooth1
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager11
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
File Deletion
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

This section contains all screenshots as thumbnails, including those not shown in the slideshow.