Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
05-06-2020 07:41
Static task
static1
Behavioral task
behavioral1
Sample
malicious_binary.exe.donotrun.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
malicious_binary.exe.donotrun.exe
Resource
win10v200430
General
-
Target
malicious_binary.exe.donotrun.exe
-
Size
112KB
-
MD5
61348f2441c23882342e38f89b366d99
-
SHA1
604504eae8ecb59dfb91c5c7403488b9b95843f8
-
SHA256
d725785ec3970b75ecb17a7e5ac14d93ce7a54d259dffc74e8222ed8cfb8b6b3
-
SHA512
5238ebfc7cad76d503a3329b43778c55aac9b784d95a7a060752a381054b40d4528d9ec9a4ad1d14a3c14a40e3091ca3fb7a965dd2736b4b674b2a0946fa3937
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
xcvndfg.exe211177171816.exebrgdsb.exeddvc.exesvcb.exegenrernes.exese11xdR4mb.exepid process 812 xcvndfg.exe 2820 211177171816.exe 3788 brgdsb.exe 4028 ddvc.exe 2132 svcb.exe 1520 genrernes.exe 1336 se11xdR4mb.exe -
Checks QEMU agent file 2 TTPs 12 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
se11xdR4mb.exexcvndfg.exexcvndfg.exe211177171816.exebrgdsb.exegenrernes.exese11xdR4mb.exemalicious_binary.exe.donotrun.exemalicious_binary.exe.donotrun.exebrgdsb.exe211177171816.exegenrernes.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe se11xdR4mb.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe xcvndfg.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe xcvndfg.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 211177171816.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe brgdsb.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe genrernes.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe se11xdR4mb.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe malicious_binary.exe.donotrun.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe malicious_binary.exe.donotrun.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe brgdsb.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 211177171816.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe genrernes.exe -
Loads dropped DLL 18 IoCs
Processes:
malicious_binary.exe.donotrun.exexcvndfg.exebrgdsb.exe211177171816.exegenrernes.exese11xdR4mb.exepid process 2924 malicious_binary.exe.donotrun.exe 2924 malicious_binary.exe.donotrun.exe 2924 malicious_binary.exe.donotrun.exe 2656 xcvndfg.exe 3960 brgdsb.exe 3096 211177171816.exe 2656 xcvndfg.exe 2656 xcvndfg.exe 2656 xcvndfg.exe 2656 xcvndfg.exe 4056 genrernes.exe 3960 brgdsb.exe 3960 brgdsb.exe 3960 brgdsb.exe 3960 brgdsb.exe 3960 brgdsb.exe 3960 brgdsb.exe 3588 se11xdR4mb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
211177171816.exegenrernes.exese11xdR4mb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 211177171816.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\POLYEMBRY = "C:\\Users\\Admin\\AppData\\Local\\Temp\\skdehundhomo\\genrernes.vbs" 211177171816.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce genrernes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\POLYEMBRY = "C:\\Users\\Admin\\AppData\\Local\\Temp\\skdehundhomo\\genrernes.vbs" genrernes.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce se11xdR4mb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\POLYEMBRY = "C:\\Users\\Admin\\AppData\\Local\\Temp\\skdehundhomo\\genrernes.vbs" se11xdR4mb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
brgdsb.exedescription ioc process File created C:\Users\Admin\AppData\LocalLow\cr6im03b56g32r\desktop.ini brgdsb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
malicious_binary.exe.donotrun.exemalicious_binary.exe.donotrun.exexcvndfg.exexcvndfg.exebrgdsb.exe211177171816.exebrgdsb.exe211177171816.exegenrernes.exegenrernes.exese11xdR4mb.exese11xdR4mb.exepid process 3824 malicious_binary.exe.donotrun.exe 2924 malicious_binary.exe.donotrun.exe 2924 malicious_binary.exe.donotrun.exe 812 xcvndfg.exe 2656 xcvndfg.exe 3788 brgdsb.exe 2820 211177171816.exe 2656 xcvndfg.exe 3960 brgdsb.exe 3096 211177171816.exe 3960 brgdsb.exe 1520 genrernes.exe 4056 genrernes.exe 4056 genrernes.exe 1336 se11xdR4mb.exe 3588 se11xdR4mb.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
malicious_binary.exe.donotrun.exexcvndfg.exebrgdsb.exe211177171816.exegenrernes.exese11xdR4mb.exedescription pid process target process PID 3824 set thread context of 2924 3824 malicious_binary.exe.donotrun.exe malicious_binary.exe.donotrun.exe PID 812 set thread context of 2656 812 xcvndfg.exe xcvndfg.exe PID 3788 set thread context of 3960 3788 brgdsb.exe brgdsb.exe PID 2820 set thread context of 3096 2820 211177171816.exe 211177171816.exe PID 1520 set thread context of 4056 1520 genrernes.exe genrernes.exe PID 1336 set thread context of 3588 1336 se11xdR4mb.exe se11xdR4mb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 512 4028 WerFault.exe ddvc.exe 3004 2132 WerFault.exe svcb.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
malicious_binary.exe.donotrun.exexcvndfg.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString malicious_binary.exe.donotrun.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xcvndfg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString xcvndfg.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 420 timeout.exe 2472 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3208 taskkill.exe -
NTFS ADS 1 IoCs
Processes:
malicious_binary.exe.donotrun.exedescription ioc process File created C:\ProgramData\211177171816.exe:Zone.Identifier malicious_binary.exe.donotrun.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
xcvndfg.exeWerFault.exeWerFault.exepid process 2656 xcvndfg.exe 2656 xcvndfg.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 512 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe 3004 WerFault.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
malicious_binary.exe.donotrun.exexcvndfg.exebrgdsb.exe211177171816.exegenrernes.exese11xdR4mb.exepid process 3824 malicious_binary.exe.donotrun.exe 812 xcvndfg.exe 3788 brgdsb.exe 2820 211177171816.exe 1520 genrernes.exe 1336 se11xdR4mb.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3208 taskkill.exe Token: SeRestorePrivilege 512 WerFault.exe Token: SeBackupPrivilege 512 WerFault.exe Token: SeDebugPrivilege 512 WerFault.exe Token: SeDebugPrivilege 3004 WerFault.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
malicious_binary.exe.donotrun.exexcvndfg.exe211177171816.exebrgdsb.exegenrernes.exese11xdR4mb.exepid process 3824 malicious_binary.exe.donotrun.exe 812 xcvndfg.exe 2820 211177171816.exe 3788 brgdsb.exe 1520 genrernes.exe 1336 se11xdR4mb.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
malicious_binary.exe.donotrun.exemalicious_binary.exe.donotrun.exexcvndfg.execmd.exexcvndfg.exebrgdsb.exe211177171816.exebrgdsb.exe211177171816.execmd.exegenrernes.execmd.exese11xdR4mb.exedescription pid process target process PID 3824 wrote to memory of 2924 3824 malicious_binary.exe.donotrun.exe malicious_binary.exe.donotrun.exe PID 3824 wrote to memory of 2924 3824 malicious_binary.exe.donotrun.exe malicious_binary.exe.donotrun.exe PID 3824 wrote to memory of 2924 3824 malicious_binary.exe.donotrun.exe malicious_binary.exe.donotrun.exe PID 3824 wrote to memory of 2924 3824 malicious_binary.exe.donotrun.exe malicious_binary.exe.donotrun.exe PID 2924 wrote to memory of 812 2924 malicious_binary.exe.donotrun.exe xcvndfg.exe PID 2924 wrote to memory of 812 2924 malicious_binary.exe.donotrun.exe xcvndfg.exe PID 2924 wrote to memory of 812 2924 malicious_binary.exe.donotrun.exe xcvndfg.exe PID 812 wrote to memory of 2656 812 xcvndfg.exe xcvndfg.exe PID 812 wrote to memory of 2656 812 xcvndfg.exe xcvndfg.exe PID 812 wrote to memory of 2656 812 xcvndfg.exe xcvndfg.exe PID 812 wrote to memory of 2656 812 xcvndfg.exe xcvndfg.exe PID 2924 wrote to memory of 2820 2924 malicious_binary.exe.donotrun.exe 211177171816.exe PID 2924 wrote to memory of 2820 2924 malicious_binary.exe.donotrun.exe 211177171816.exe PID 2924 wrote to memory of 2820 2924 malicious_binary.exe.donotrun.exe 211177171816.exe PID 2924 wrote to memory of 3068 2924 malicious_binary.exe.donotrun.exe cmd.exe PID 2924 wrote to memory of 3068 2924 malicious_binary.exe.donotrun.exe cmd.exe PID 2924 wrote to memory of 3068 2924 malicious_binary.exe.donotrun.exe cmd.exe PID 3068 wrote to memory of 3208 3068 cmd.exe taskkill.exe PID 3068 wrote to memory of 3208 3068 cmd.exe taskkill.exe PID 3068 wrote to memory of 3208 3068 cmd.exe taskkill.exe PID 2656 wrote to memory of 3788 2656 xcvndfg.exe brgdsb.exe PID 2656 wrote to memory of 3788 2656 xcvndfg.exe brgdsb.exe PID 2656 wrote to memory of 3788 2656 xcvndfg.exe brgdsb.exe PID 3788 wrote to memory of 3960 3788 brgdsb.exe brgdsb.exe PID 3788 wrote to memory of 3960 3788 brgdsb.exe brgdsb.exe PID 3788 wrote to memory of 3960 3788 brgdsb.exe brgdsb.exe PID 3788 wrote to memory of 3960 3788 brgdsb.exe brgdsb.exe PID 2820 wrote to memory of 3096 2820 211177171816.exe 211177171816.exe PID 2820 wrote to memory of 3096 2820 211177171816.exe 211177171816.exe PID 2820 wrote to memory of 3096 2820 211177171816.exe 211177171816.exe PID 2820 wrote to memory of 3096 2820 211177171816.exe 211177171816.exe PID 3960 wrote to memory of 4028 3960 brgdsb.exe ddvc.exe PID 3960 wrote to memory of 4028 3960 brgdsb.exe ddvc.exe PID 3960 wrote to memory of 4028 3960 brgdsb.exe ddvc.exe PID 3096 wrote to memory of 2132 3096 211177171816.exe svcb.exe PID 3096 wrote to memory of 2132 3096 211177171816.exe svcb.exe PID 3096 wrote to memory of 2132 3096 211177171816.exe svcb.exe PID 3096 wrote to memory of 1520 3096 211177171816.exe genrernes.exe PID 3096 wrote to memory of 1520 3096 211177171816.exe genrernes.exe PID 3096 wrote to memory of 1520 3096 211177171816.exe genrernes.exe PID 2656 wrote to memory of 2488 2656 xcvndfg.exe cmd.exe PID 2656 wrote to memory of 2488 2656 xcvndfg.exe cmd.exe PID 2656 wrote to memory of 2488 2656 xcvndfg.exe cmd.exe PID 2488 wrote to memory of 420 2488 cmd.exe timeout.exe PID 2488 wrote to memory of 420 2488 cmd.exe timeout.exe PID 2488 wrote to memory of 420 2488 cmd.exe timeout.exe PID 1520 wrote to memory of 4056 1520 genrernes.exe genrernes.exe PID 1520 wrote to memory of 4056 1520 genrernes.exe genrernes.exe PID 1520 wrote to memory of 4056 1520 genrernes.exe genrernes.exe PID 1520 wrote to memory of 4056 1520 genrernes.exe genrernes.exe PID 3960 wrote to memory of 1336 3960 brgdsb.exe se11xdR4mb.exe PID 3960 wrote to memory of 1336 3960 brgdsb.exe se11xdR4mb.exe PID 3960 wrote to memory of 1336 3960 brgdsb.exe se11xdR4mb.exe PID 3960 wrote to memory of 1132 3960 brgdsb.exe cmd.exe PID 3960 wrote to memory of 1132 3960 brgdsb.exe cmd.exe PID 3960 wrote to memory of 1132 3960 brgdsb.exe cmd.exe PID 1132 wrote to memory of 2472 1132 cmd.exe timeout.exe PID 1132 wrote to memory of 2472 1132 cmd.exe timeout.exe PID 1132 wrote to memory of 2472 1132 cmd.exe timeout.exe PID 1336 wrote to memory of 3588 1336 se11xdR4mb.exe se11xdR4mb.exe PID 1336 wrote to memory of 3588 1336 se11xdR4mb.exe se11xdR4mb.exe PID 1336 wrote to memory of 3588 1336 se11xdR4mb.exe se11xdR4mb.exe PID 1336 wrote to memory of 3588 1336 se11xdR4mb.exe se11xdR4mb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\malicious_binary.exe.donotrun.exe"C:\Users\Admin\AppData\Local\Temp\malicious_binary.exe.donotrun.exe"1⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\malicious_binary.exe.donotrun.exe"C:\Users\Admin\AppData\Local\Temp\malicious_binary.exe.donotrun.exe"2⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\xcvndfg.exe"C:\Users\Admin\AppData\Local\Temp\xcvndfg.exe"3⤵
- Executes dropped EXE
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\xcvndfg.exe"C:\Users\Admin\AppData\Local\Temp\xcvndfg.exe"4⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\brgdsb.exe"C:\Users\Admin\AppData\Local\Temp\brgdsb.exe"5⤵
- Executes dropped EXE
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\brgdsb.exe"C:\Users\Admin\AppData\Local\Temp\brgdsb.exe"6⤵
- Checks QEMU agent file
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\ddvc.exe"C:\Users\Admin\AppData\Local\Temp\ddvc.exe"7⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 12128⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
-
C:\Users\Admin\AppData\Local\Temp\se11xdR4mb.exe"C:\Users\Admin\AppData\Local\Temp\se11xdR4mb.exe"7⤵
- Executes dropped EXE
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\se11xdR4mb.exe"C:\Users\Admin\AppData\Local\Temp\se11xdR4mb.exe"8⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\brgdsb.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:2472
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "xcvndfg.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 36⤵
- Delays execution with timeout.exe
PID:420
-
-
-
-
-
C:\ProgramData\211177171816.exe"C:\ProgramData\211177171816.exe"3⤵
- Executes dropped EXE
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\ProgramData\211177171816.exe"C:\ProgramData\211177171816.exe"4⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\svcb.exe"C:\Users\Admin\AppData\Local\Temp\svcb.exe"5⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 11606⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\skdehundhomo\genrernes.exe"C:\Users\Admin\AppData\Local\Temp\skdehundhomo\genrernes.exe"5⤵
- Executes dropped EXE
- Checks QEMU agent file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\skdehundhomo\genrernes.exe"C:\Users\Admin\AppData\Local\Temp\skdehundhomo\genrernes.exe"6⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4056
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 2924 & erase C:\Users\Admin\AppData\Local\Temp\malicious_binary.exe.donotrun.exe & RD /S /Q C:\\ProgramData\\472573214995239\\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 29244⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_7B15B1C5BB1E8058D3F0EC6C583B6CDF
MD5988a75a9c3b200d896b8987da33c19ac
SHA100463761776fc4050b54d0e08b948477d1f8b818
SHA256dd677942c6ffa1938abf5340a6f37ac067bfec782864d9d5e917689739d6d4fe
SHA5121a18ecb988fac522f25cf4849273601f2549f5686bd16225f9e82b66f53547f7c3c64e171560e037c2999c9349ce63f4922d8e2e3c595ce2fe04fb1ea45fa87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
MD51c400d233070530c717a810d7f9bc99e
SHA1fa66c5898f1359c7a0fa4b36ca5292e12e0a12e2
SHA25658b407b0ddf17fbf78fcb2e2dad4fabaada9bd88641f19941480951a200ae4e0
SHA51219dd9c72b2fbd97f8015fa7214313a010a088cb4706488097457c14a38f0ee72101b2556cb5371ea77e89978d54ad213fb83b95833c4a7745c8bcc56b0410a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BE8B021F9E811DFC8C8A28572A17C05A_7B15B1C5BB1E8058D3F0EC6C583B6CDF
MD508f9add176a0faa7093973e46ed71379
SHA1882082b0b60f16cbbb979ba9285c14e31073277a
SHA2563f7b09b98db060a4f7ba12de7a68b9ed4de53593cb1779d4a2959e559f9cbb5c
SHA51241d3f15bd447e387f361cfaeae1bcdd773ca6509c4710c576b1ac4e01d5fcada7473124d212d23a577276fed80e3addafad79daa06fbc67fc78eac87f74b53a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
MD5c0f0689182a146d34195144913736960
SHA19644473b68e3ab1e47d182e945bff2ecc1bf5ab0
SHA256d58bd93051dd3bdcbcb1ea3eb9a13de35594863ba8f2aa9cdbe2bcbe97c80579
SHA51210759fee288420e8f36b0a214ad9663983c3053a657f5355f5dc0c5a2084f53b02b702dad0d5d0bc924dab4564c85a40fd969814a005767fa0be91541b06d4d2
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
3b3e2078794ef404d5bed1fcb51b4028
SHA1de39e0bb12461b793ca646f140e0c63491470585
SHA25652bf8d69eba6c941b967160a369791b79a37c8826e5fca8980d46b0f22c2de95
SHA51213a0b1c47325070822b6ddf22ef62df6e14b6139a54f9981cbf6a4b04735410cef27e5a9b93e9a4e48a5640634df75b5d1fc610a32d30df848344eb9cdec2ff6
-
MD5
9e563b46e63ca13f7cf03bbd14eaefa5
SHA10a6fc61a13c331514fb3eba655c13c07aea63ffb
SHA256abc6a9b643cf54a291afd18374eba189a336e39e773f09f35b9d347ddacc2796
SHA512811dc1cc755cf6383335a154d6cffcb1a8d3b344631768677514b26cc587b41e27cf3413746c9d48e5d4445ddbc648b91c2e488dbce2fc4035ca33cc5bfe6163
-
MD5
9e563b46e63ca13f7cf03bbd14eaefa5
SHA10a6fc61a13c331514fb3eba655c13c07aea63ffb
SHA256abc6a9b643cf54a291afd18374eba189a336e39e773f09f35b9d347ddacc2796
SHA512811dc1cc755cf6383335a154d6cffcb1a8d3b344631768677514b26cc587b41e27cf3413746c9d48e5d4445ddbc648b91c2e488dbce2fc4035ca33cc5bfe6163
-
MD5
9e563b46e63ca13f7cf03bbd14eaefa5
SHA10a6fc61a13c331514fb3eba655c13c07aea63ffb
SHA256abc6a9b643cf54a291afd18374eba189a336e39e773f09f35b9d347ddacc2796
SHA512811dc1cc755cf6383335a154d6cffcb1a8d3b344631768677514b26cc587b41e27cf3413746c9d48e5d4445ddbc648b91c2e488dbce2fc4035ca33cc5bfe6163
-
MD5
65bf4a013e67a1d06a78e385ce3d1462
SHA1a346df50229470acdc6c3a05ce89310eb50d4f90
SHA256f91c59a4e7c426578c67ccfeeb3f4ff7a2f131bf1bf8ca891553f398be9d4d01
SHA512eff2d319b6a40f246dfb90effb8a893b335a4d727101f5471f37e3d33a9c01280dfb22dc2c77972f064d0e1ecc8654b6ba482ee9f6facbd9a56ab18f3e03319e
-
MD5
65bf4a013e67a1d06a78e385ce3d1462
SHA1a346df50229470acdc6c3a05ce89310eb50d4f90
SHA256f91c59a4e7c426578c67ccfeeb3f4ff7a2f131bf1bf8ca891553f398be9d4d01
SHA512eff2d319b6a40f246dfb90effb8a893b335a4d727101f5471f37e3d33a9c01280dfb22dc2c77972f064d0e1ecc8654b6ba482ee9f6facbd9a56ab18f3e03319e
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
a0b18973fa8650d6bfe602d943fecb9a
SHA1f14ba35c814105dd53b88711ce9e465d53016721
SHA256898abdb2d9de0344e5b43ac7e4330faeb03d97aa0a3c37e0a37da0ed4d732e9b
SHA512173d673dd9931eef91552cbf5f995e44360500ace337edcb2bd0c6126c3c8526afcafd19d9716633bccce909da1853772abb205c0ee2f209254d5014d8f2993d
-
MD5
724f1f14757645359032578c2da18829
SHA154585d37916287f8a0b783fbdff4ce077c33165e
SHA2567a7a291079a29f31c6e724db4d0611308f68831f8d5724e36c13643f822b0d49
SHA5122d64dde2aedf1593467e6f265029887baaf65b594f1798cda20bf52723ab164da3d28b28104950d1e0d68580e617058e317c093537f04dbeb355949d355c2f85
-
MD5
9ad87bc472a966629b508a6c155ab530
SHA183f350731342353500b15e5365d0d2ad02a94307
SHA256f0f7f9f3d293065a8554c6b9e4757bf511dd3577636ca1a075e0afd206250e5e
SHA5128507bb3de1496dd8ad699821219c6b00e0dbc3fb42849e89533be950245a28d77b5ba5b5b78aeea79faf340b210d52b89c8190591cab99f619bdcaf94d5bdfd5
-
MD5
9ad87bc472a966629b508a6c155ab530
SHA183f350731342353500b15e5365d0d2ad02a94307
SHA256f0f7f9f3d293065a8554c6b9e4757bf511dd3577636ca1a075e0afd206250e5e
SHA5128507bb3de1496dd8ad699821219c6b00e0dbc3fb42849e89533be950245a28d77b5ba5b5b78aeea79faf340b210d52b89c8190591cab99f619bdcaf94d5bdfd5
-
MD5
b0734884163fe8c6d226c83d3362a545
SHA120543d38521e35320c8a26b66e4ccfd69b6aff9f
SHA256c993c3db69bb53b38d030aecdc13d2b5263c403d738fafa7d4774acfddac428f
SHA512fc1aaa136b9457956ea1b986d955923c1fcd78e4c491cc700c0a100f7b555830408d892a81b49159b42710ccc5deb7a5121421af0391448702864b8f246ea345
-
MD5
b0734884163fe8c6d226c83d3362a545
SHA120543d38521e35320c8a26b66e4ccfd69b6aff9f
SHA256c993c3db69bb53b38d030aecdc13d2b5263c403d738fafa7d4774acfddac428f
SHA512fc1aaa136b9457956ea1b986d955923c1fcd78e4c491cc700c0a100f7b555830408d892a81b49159b42710ccc5deb7a5121421af0391448702864b8f246ea345
-
MD5
b0734884163fe8c6d226c83d3362a545
SHA120543d38521e35320c8a26b66e4ccfd69b6aff9f
SHA256c993c3db69bb53b38d030aecdc13d2b5263c403d738fafa7d4774acfddac428f
SHA512fc1aaa136b9457956ea1b986d955923c1fcd78e4c491cc700c0a100f7b555830408d892a81b49159b42710ccc5deb7a5121421af0391448702864b8f246ea345
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
MD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
MD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
MD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
MD5
9e682f1eb98a9d41468fc3e50f907635
SHA185e0ceca36f657ddf6547aa0744f0855a27527ee
SHA256830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d
SHA512230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed
-
MD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
MD5
556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2
-
MD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f