Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
20-08-2020 11:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe
Resource
win10v200722
General
-
Target
SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe
-
Size
1.4MB
-
MD5
7afa1658a6f338122d355720b4864ed2
-
SHA1
d2d6012eba6cea513f1d7b267b562b35b738d46e
-
SHA256
38d0f6d2d2ccd86e63232e4c702202b167be54dd3c8e21d289f21f4d3775a1e5
-
SHA512
a74585ff241320d340a8242d53ed58d853e25b85b3c5ccce0019c8fdcbc3e8df1b01eadd73ccf820bf193852b527702d4f2c95ddcbb0b6e1456d375e04839c2d
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/492-140-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral2/memory/492-142-0x0000000000403BEE-mapping.dmp disable_win_def behavioral2/memory/3460-141-0x0000000000400000-0x000000000040C000-memory.dmp disable_win_def behavioral2/memory/3460-144-0x000000000040616E-mapping.dmp disable_win_def behavioral2/memory/2396-189-0x000000000040616E-mapping.dmp disable_win_def behavioral2/memory/4116-195-0x0000000000403BEE-mapping.dmp disable_win_def -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
Processes:
yara_rule raccoon_log_file -
ModiLoader First Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3076-118-0x00000000027A0000-0x00000000027C9000-memory.dmp modiloader_stage1 behavioral2/memory/2640-119-0x00000000007D0000-0x00000000007F9000-memory.dmp modiloader_stage1 -
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3076-120-0x0000000004800000-0x000000000484B000-memory.dmp modiloader_stage2 -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
Jvdacbs.exePkdfshbas.exeJvdacbs.exePkdfshbas.exeac.exerc.exeds1.exeds2.exe5awVbijRY4.exeHfhNacg0tL.exeRLdzxAehYB.exeZAyQFtIRIC.exeds2.exeds1.exeRLdzxAehYB.exeZAyQFtIRIC.exepid process 3836 Jvdacbs.exe 1964 Pkdfshbas.exe 632 Jvdacbs.exe 664 Pkdfshbas.exe 1972 ac.exe 3076 rc.exe 2328 ds1.exe 2576 ds2.exe 2640 5awVbijRY4.exe 1140 HfhNacg0tL.exe 3220 RLdzxAehYB.exe 968 ZAyQFtIRIC.exe 492 ds2.exe 3460 ds1.exe 2396 RLdzxAehYB.exe 4116 ZAyQFtIRIC.exe -
Loads dropped DLL 13 IoCs
Processes:
Pkdfshbas.exeJvdacbs.exeSecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exepid process 664 Pkdfshbas.exe 664 Pkdfshbas.exe 664 Pkdfshbas.exe 632 Jvdacbs.exe 632 Jvdacbs.exe 632 Jvdacbs.exe 632 Jvdacbs.exe 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ds2.exeZAyQFtIRIC.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ds2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ds2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ZAyQFtIRIC.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exedescription ioc process File created C:\Users\Admin\AppData\LocalLow\cr6im03b56g32r\desktop.ini SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 7 IoCs
Processes:
Jvdacbs.exePkdfshbas.exeSecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exeds2.exeds1.exeRLdzxAehYB.exeZAyQFtIRIC.exedescription pid process target process PID 3836 set thread context of 632 3836 Jvdacbs.exe Jvdacbs.exe PID 1964 set thread context of 664 1964 Pkdfshbas.exe Pkdfshbas.exe PID 336 set thread context of 1268 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe PID 2576 set thread context of 492 2576 ds2.exe ds2.exe PID 2328 set thread context of 3460 2328 ds1.exe ds1.exe PID 3220 set thread context of 2396 3220 RLdzxAehYB.exe RLdzxAehYB.exe PID 968 set thread context of 4116 968 ZAyQFtIRIC.exe ZAyQFtIRIC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Pkdfshbas.exeJvdacbs.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Pkdfshbas.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jvdacbs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Jvdacbs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2956 timeout.exe 3408 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3972 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Jvdacbs.exeds1.exeds2.exeac.exeds1.exepid process 632 Jvdacbs.exe 632 Jvdacbs.exe 2328 ds1.exe 2328 ds1.exe 2576 ds2.exe 2576 ds2.exe 1972 ac.exe 1972 ac.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe 3460 ds1.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Jvdacbs.exePkdfshbas.exeSecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exepid process 3836 Jvdacbs.exe 1964 Pkdfshbas.exe 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exeds1.exeds2.exeac.exeds1.exeRLdzxAehYB.exeZAyQFtIRIC.exeHfhNacg0tL.exeRLdzxAehYB.exepowershell.exedescription pid process Token: SeDebugPrivilege 3972 taskkill.exe Token: SeDebugPrivilege 2328 ds1.exe Token: SeDebugPrivilege 2576 ds2.exe Token: SeDebugPrivilege 1972 ac.exe Token: SeDebugPrivilege 3460 ds1.exe Token: SeDebugPrivilege 3220 RLdzxAehYB.exe Token: SeDebugPrivilege 968 ZAyQFtIRIC.exe Token: SeDebugPrivilege 1140 HfhNacg0tL.exe Token: SeDebugPrivilege 2396 RLdzxAehYB.exe Token: SeDebugPrivilege 3472 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exeJvdacbs.exePkdfshbas.exepid process 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 3836 Jvdacbs.exe 1964 Pkdfshbas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exeJvdacbs.exePkdfshbas.exeJvdacbs.exePkdfshbas.execmd.execmd.exeSecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.execmd.exerc.exedescription pid process target process PID 336 wrote to memory of 3836 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe Jvdacbs.exe PID 336 wrote to memory of 3836 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe Jvdacbs.exe PID 336 wrote to memory of 3836 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe Jvdacbs.exe PID 336 wrote to memory of 1964 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe Pkdfshbas.exe PID 336 wrote to memory of 1964 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe Pkdfshbas.exe PID 336 wrote to memory of 1964 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe Pkdfshbas.exe PID 3836 wrote to memory of 632 3836 Jvdacbs.exe Jvdacbs.exe PID 3836 wrote to memory of 632 3836 Jvdacbs.exe Jvdacbs.exe PID 3836 wrote to memory of 632 3836 Jvdacbs.exe Jvdacbs.exe PID 3836 wrote to memory of 632 3836 Jvdacbs.exe Jvdacbs.exe PID 1964 wrote to memory of 664 1964 Pkdfshbas.exe Pkdfshbas.exe PID 1964 wrote to memory of 664 1964 Pkdfshbas.exe Pkdfshbas.exe PID 1964 wrote to memory of 664 1964 Pkdfshbas.exe Pkdfshbas.exe PID 1964 wrote to memory of 664 1964 Pkdfshbas.exe Pkdfshbas.exe PID 336 wrote to memory of 1268 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe PID 336 wrote to memory of 1268 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe PID 336 wrote to memory of 1268 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe PID 336 wrote to memory of 1268 336 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe PID 632 wrote to memory of 1972 632 Jvdacbs.exe ac.exe PID 632 wrote to memory of 1972 632 Jvdacbs.exe ac.exe PID 632 wrote to memory of 1972 632 Jvdacbs.exe ac.exe PID 632 wrote to memory of 3076 632 Jvdacbs.exe rc.exe PID 632 wrote to memory of 3076 632 Jvdacbs.exe rc.exe PID 632 wrote to memory of 3076 632 Jvdacbs.exe rc.exe PID 632 wrote to memory of 2328 632 Jvdacbs.exe ds1.exe PID 632 wrote to memory of 2328 632 Jvdacbs.exe ds1.exe PID 632 wrote to memory of 2328 632 Jvdacbs.exe ds1.exe PID 632 wrote to memory of 2576 632 Jvdacbs.exe ds2.exe PID 632 wrote to memory of 2576 632 Jvdacbs.exe ds2.exe PID 632 wrote to memory of 2576 632 Jvdacbs.exe ds2.exe PID 664 wrote to memory of 2720 664 Pkdfshbas.exe cmd.exe PID 664 wrote to memory of 2720 664 Pkdfshbas.exe cmd.exe PID 664 wrote to memory of 2720 664 Pkdfshbas.exe cmd.exe PID 632 wrote to memory of 4000 632 Jvdacbs.exe cmd.exe PID 632 wrote to memory of 4000 632 Jvdacbs.exe cmd.exe PID 632 wrote to memory of 4000 632 Jvdacbs.exe cmd.exe PID 2720 wrote to memory of 3972 2720 cmd.exe taskkill.exe PID 2720 wrote to memory of 3972 2720 cmd.exe taskkill.exe PID 2720 wrote to memory of 3972 2720 cmd.exe taskkill.exe PID 4000 wrote to memory of 2956 4000 cmd.exe timeout.exe PID 4000 wrote to memory of 2956 4000 cmd.exe timeout.exe PID 4000 wrote to memory of 2956 4000 cmd.exe timeout.exe PID 1268 wrote to memory of 2640 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 5awVbijRY4.exe PID 1268 wrote to memory of 2640 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 5awVbijRY4.exe PID 1268 wrote to memory of 2640 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe 5awVbijRY4.exe PID 1268 wrote to memory of 1140 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe HfhNacg0tL.exe PID 1268 wrote to memory of 1140 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe HfhNacg0tL.exe PID 1268 wrote to memory of 1140 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe HfhNacg0tL.exe PID 1268 wrote to memory of 3220 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe RLdzxAehYB.exe PID 1268 wrote to memory of 3220 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe RLdzxAehYB.exe PID 1268 wrote to memory of 3220 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe RLdzxAehYB.exe PID 1268 wrote to memory of 968 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe ZAyQFtIRIC.exe PID 1268 wrote to memory of 968 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe ZAyQFtIRIC.exe PID 1268 wrote to memory of 968 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe ZAyQFtIRIC.exe PID 1268 wrote to memory of 3068 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe cmd.exe PID 1268 wrote to memory of 3068 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe cmd.exe PID 1268 wrote to memory of 3068 1268 SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe cmd.exe PID 3068 wrote to memory of 3408 3068 cmd.exe timeout.exe PID 3068 wrote to memory of 3408 3068 cmd.exe timeout.exe PID 3068 wrote to memory of 3408 3068 cmd.exe timeout.exe PID 3076 wrote to memory of 1324 3076 rc.exe Notepad.exe PID 3076 wrote to memory of 1324 3076 rc.exe Notepad.exe PID 3076 wrote to memory of 1324 3076 rc.exe Notepad.exe PID 3076 wrote to memory of 1324 3076 rc.exe Notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"C:\Users\Admin\AppData\Local\Temp\Jvdacbs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\ac.exe"C:\Users\Admin\AppData\Local\Temp\ac.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFPQqbpSPeun" /XML "C:\Users\Admin\AppData\Local\Temp\tmp66ED.tmp"5⤵
- Creates scheduled task(s)
PID:60 -
C:\Users\Admin\AppData\Local\Temp\rc.exe"C:\Users\Admin\AppData\Local\Temp\rc.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Notepad.exe"C:\Windows\System32\Notepad.exe"5⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\ds1.exe"C:\Users\Admin\AppData\Local\Temp\ds1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\ds1.exe"{path}"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\bombnptk.inf6⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\ds2.exe"C:\Users\Admin\AppData\Local\Temp\ds2.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\ds2.exe"{path}"5⤵
- Executes dropped EXE
- Windows security modification
PID:492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "Jvdacbs.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 35⤵
- Delays execution with timeout.exe
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 664 & erase C:\Users\Admin\AppData\Local\Temp\Pkdfshbas.exe & RD /S /Q C:\\ProgramData\\752104097351926\\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 6645⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\5awVbijRY4.exe"C:\Users\Admin\AppData\Local\Temp\5awVbijRY4.exe"3⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\HfhNacg0tL.exe"C:\Users\Admin\AppData\Local\Temp\HfhNacg0tL.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\RLdzxAehYB.exe"C:\Users\Admin\AppData\Local\Temp\RLdzxAehYB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\RLdzxAehYB.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\0tag4jk2.inf5⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\ZAyQFtIRIC.exe"C:\Users\Admin\AppData\Local\Temp\ZAyQFtIRIC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:968 -
C:\Users\Admin\AppData\Local\Temp\ZAyQFtIRIC.exe"{path}"4⤵
- Executes dropped EXE
- Windows security modification
PID:4116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵PID:4252
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Stealer.25838.3310.27240.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3408
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵PID:1716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2