Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-02-2021 15:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe
-
Size
119KB
-
MD5
ed05d2c233a6a37bfbffd7b27c12d2b9
-
SHA1
221cfaece1b2b6a736f071b367a62d4f229e940e
-
SHA256
381d09e67a798dfc8f96b33822cf4b0616652f44275f382ee75b9b6c840e04f2
-
SHA512
465c3da441d3fc710213bc3793fb4ae36a22ab5b196a0309e4b2ce6b03796adfc53598ab562d3bf38aaf5b5d5e2ec44e02179a3621e0928810232437e6506296
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/960-52-0x0000000000400000-0x000000000042C000-memory.dmp family_redline behavioral1/memory/960-53-0x0000000000423FA2-mapping.dmp family_redline behavioral1/memory/960-56-0x0000000000400000-0x000000000042C000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 6 IoCs
Processes:
6878776.754906523.533591923.395288207.58716454.73591923.39pid process 1672 6878776.75 1436 4906523.53 1496 3591923.39 1660 5288207.58 1656 716454.7 960 3591923.39 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
716454.7description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 716454.7 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 716454.7 -
Loads dropped DLL 25 IoCs
Processes:
3591923.39regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 1496 3591923.39 1420 regsvr32.exe 2020 regsvr32.exe 288 regsvr32.exe 964 regsvr32.exe 1352 regsvr32.exe 1672 regsvr32.exe 2036 regsvr32.exe 1632 regsvr32.exe 1248 regsvr32.exe 1316 regsvr32.exe 1528 regsvr32.exe 1388 regsvr32.exe 1504 regsvr32.exe 2016 regsvr32.exe 1224 regsvr32.exe 1092 regsvr32.exe 1396 regsvr32.exe 1996 regsvr32.exe 2012 regsvr32.exe 960 regsvr32.exe 1792 regsvr32.exe 1420 regsvr32.exe 1004 regsvr32.exe 1016 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\ProgramData\716454.7 themida behavioral1/memory/1656-30-0x0000000001270000-0x0000000001271000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\LanguagePack = "C:\\Windows\\system32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\protect\\ccf533-fba533-b4cf1672-b254b1-84b0.db\"" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LanguagePack = "C:\\Windows\\system32\\regsvr32.exe /s \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\protect\\ccf533-fba533-b4cf1672-b254b1-84b0.db\"" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
716454.7description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 716454.7 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
716454.7pid process 1656 716454.7 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3591923.39description pid process target process PID 1496 set thread context of 960 1496 3591923.39 3591923.39 -
Processes:
716454.7description ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 716454.7 Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 716454.7 Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 716454.7 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6878776.75716454.73591923.395288207.58regsvr32.exepid process 1672 6878776.75 1672 6878776.75 1656 716454.7 1656 716454.7 960 3591923.39 1660 5288207.58 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe 1672 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe6878776.75716454.73591923.39regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid process Token: SeDebugPrivilege 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe Token: SeDebugPrivilege 1672 6878776.75 Token: SeDebugPrivilege 1656 716454.7 Token: SeDebugPrivilege 960 3591923.39 Token: SeCreateGlobalPrivilege 1672 regsvr32.exe Token: SeDebugPrivilege 1672 regsvr32.exe Token: SeCreateGlobalPrivilege 1632 regsvr32.exe Token: SeCreateGlobalPrivilege 1316 regsvr32.exe Token: SeCreateGlobalPrivilege 1388 regsvr32.exe Token: SeCreateGlobalPrivilege 2016 regsvr32.exe Token: SeCreateGlobalPrivilege 1092 regsvr32.exe Token: SeCreateGlobalPrivilege 1996 regsvr32.exe Token: SeCreateGlobalPrivilege 960 regsvr32.exe Token: SeCreateGlobalPrivilege 1420 regsvr32.exe Token: SeCreateGlobalPrivilege 1016 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe3591923.395288207.58regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1596 wrote to memory of 1672 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 6878776.75 PID 1596 wrote to memory of 1672 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 6878776.75 PID 1596 wrote to memory of 1672 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 6878776.75 PID 1596 wrote to memory of 1672 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 6878776.75 PID 1596 wrote to memory of 1436 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 4906523.53 PID 1596 wrote to memory of 1436 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 4906523.53 PID 1596 wrote to memory of 1436 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 4906523.53 PID 1596 wrote to memory of 1436 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 4906523.53 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1496 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 3591923.39 PID 1596 wrote to memory of 1660 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 5288207.58 PID 1596 wrote to memory of 1660 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 5288207.58 PID 1596 wrote to memory of 1660 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 5288207.58 PID 1596 wrote to memory of 1660 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 5288207.58 PID 1596 wrote to memory of 1656 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 716454.7 PID 1596 wrote to memory of 1656 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 716454.7 PID 1596 wrote to memory of 1656 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 716454.7 PID 1596 wrote to memory of 1656 1596 SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe 716454.7 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1496 wrote to memory of 960 1496 3591923.39 3591923.39 PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1660 wrote to memory of 1420 1660 5288207.58 regsvr32.exe PID 1420 wrote to memory of 2020 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 2020 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 2020 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 2020 1420 regsvr32.exe regsvr32.exe PID 1420 wrote to memory of 2020 1420 regsvr32.exe regsvr32.exe PID 2020 wrote to memory of 288 2020 regsvr32.exe regsvr32.exe PID 2020 wrote to memory of 288 2020 regsvr32.exe regsvr32.exe PID 2020 wrote to memory of 288 2020 regsvr32.exe regsvr32.exe PID 2020 wrote to memory of 288 2020 regsvr32.exe regsvr32.exe PID 2020 wrote to memory of 288 2020 regsvr32.exe regsvr32.exe PID 288 wrote to memory of 964 288 regsvr32.exe regsvr32.exe PID 288 wrote to memory of 964 288 regsvr32.exe regsvr32.exe PID 288 wrote to memory of 964 288 regsvr32.exe regsvr32.exe PID 288 wrote to memory of 964 288 regsvr32.exe regsvr32.exe PID 288 wrote to memory of 964 288 regsvr32.exe regsvr32.exe PID 964 wrote to memory of 1352 964 regsvr32.exe regsvr32.exe PID 964 wrote to memory of 1352 964 regsvr32.exe regsvr32.exe PID 964 wrote to memory of 1352 964 regsvr32.exe regsvr32.exe PID 964 wrote to memory of 1352 964 regsvr32.exe regsvr32.exe PID 964 wrote to memory of 1352 964 regsvr32.exe regsvr32.exe PID 1352 wrote to memory of 1672 1352 regsvr32.exe regsvr32.exe PID 1352 wrote to memory of 1672 1352 regsvr32.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.cm.19089.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\ProgramData\6878776.75"C:\ProgramData\6878776.75"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\ProgramData\4906523.53"C:\ProgramData\4906523.53"2⤵
- Executes dropped EXE
PID:1436 -
C:\ProgramData\3591923.39"C:\ProgramData\3591923.39"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\ProgramData\3591923.39"C:\ProgramData\3591923.39"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\ProgramData\5288207.58"C:\ProgramData\5288207.58"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 44⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 35⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 26⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\ProgramData\716454.7"C:\ProgramData\716454.7"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 11⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 02⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:2036 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1248 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1528 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1388 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1504 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1224 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1396 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:2012 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1792 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 13⤵
- Loads dropped DLL
PID:1004 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\protect\\f4e2d8-0dd3a1-cbcd1660-c5bbf0-f4c0.db" 04⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6918dc96448960f42ff64164e89929d6
SHA177dd79138c42843321f4c156cbd2e7e2666825fd
SHA2560da9a2cf8e4411f1ece2971e322631cca48a3de22884e72c519c80c76623e780
SHA512f59103ce28827d96cea85341a31e54a1ae722ff5c387b597f325050e76d254305c0b8c317edf335bc7a1af846429bcdc2429983622b9626e703b520f6339010a
-
MD5
6918dc96448960f42ff64164e89929d6
SHA177dd79138c42843321f4c156cbd2e7e2666825fd
SHA2560da9a2cf8e4411f1ece2971e322631cca48a3de22884e72c519c80c76623e780
SHA512f59103ce28827d96cea85341a31e54a1ae722ff5c387b597f325050e76d254305c0b8c317edf335bc7a1af846429bcdc2429983622b9626e703b520f6339010a
-
MD5
6918dc96448960f42ff64164e89929d6
SHA177dd79138c42843321f4c156cbd2e7e2666825fd
SHA2560da9a2cf8e4411f1ece2971e322631cca48a3de22884e72c519c80c76623e780
SHA512f59103ce28827d96cea85341a31e54a1ae722ff5c387b597f325050e76d254305c0b8c317edf335bc7a1af846429bcdc2429983622b9626e703b520f6339010a
-
MD5
812106381d9d1e2b02a890710b56b47d
SHA1e779d19559c8eb1a59be586a0309e559a0d175fa
SHA2564dc2cda6da2e009dea089f085bb193c06e8fe6239788c7250e64b92c4130b25c
SHA512cd4195284f26c76bcd67b2c08329c877325324dcf0137fe05224186f384180ed88ee9743cd0a984f8a7cefc93115d26accacc2b284a5090c4a9ec60f2d04e975
-
MD5
812106381d9d1e2b02a890710b56b47d
SHA1e779d19559c8eb1a59be586a0309e559a0d175fa
SHA2564dc2cda6da2e009dea089f085bb193c06e8fe6239788c7250e64b92c4130b25c
SHA512cd4195284f26c76bcd67b2c08329c877325324dcf0137fe05224186f384180ed88ee9743cd0a984f8a7cefc93115d26accacc2b284a5090c4a9ec60f2d04e975
-
MD5
d7345c600135d1cf0bf5654b4e62e4d7
SHA1ff337e5e406f2f202fd6e8c55ba698bb2469daaa
SHA256d620caed49949ebcbfd64a6fa71c0e896136b7d97c538aee66d063520bf18170
SHA512e5e152614d20939df201292fb581f16b07e570a661be2ee2372724b9f601a82b630ea7eb316dab34ef6aa19559db26469313b6a7c9fd292bcbe687e98175dafc
-
MD5
8ece2251ab92449e39a13e0e5fd01ee7
SHA19a38b32e8c7db75544687eac7d2afe5281adbf65
SHA256d9b2cec18cc84167a10a96b4761bf3de8c4314fea1fcb101074863ef6e187a0b
SHA51229b61d259f07490bd560139eb08f635dc95f7350b821c284f94601b993342c3a359aad5990a32bcd3a907d82d5e134468c73f0075700611b3d9325264ff6155f
-
MD5
8ece2251ab92449e39a13e0e5fd01ee7
SHA19a38b32e8c7db75544687eac7d2afe5281adbf65
SHA256d9b2cec18cc84167a10a96b4761bf3de8c4314fea1fcb101074863ef6e187a0b
SHA51229b61d259f07490bd560139eb08f635dc95f7350b821c284f94601b993342c3a359aad5990a32bcd3a907d82d5e134468c73f0075700611b3d9325264ff6155f
-
MD5
d143fb6fe3d6dff333bfc8bc9aaa034e
SHA1abf7d975dfe6b29602bb95fe38e91a03d049ac9b
SHA2565af08f747a5ae785dc18317e0a2db06d7764c7fdf48cd9c0176970c9f7fc79a8
SHA5128b445f417a6c1b694d1b55502974010ecf8f27e8887fdc0e10eb9f6d221daa09b792f6162189dd45fd2399f546cd7cade4ef0fd764af92e84bf38361ac27a950
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
6918dc96448960f42ff64164e89929d6
SHA177dd79138c42843321f4c156cbd2e7e2666825fd
SHA2560da9a2cf8e4411f1ece2971e322631cca48a3de22884e72c519c80c76623e780
SHA512f59103ce28827d96cea85341a31e54a1ae722ff5c387b597f325050e76d254305c0b8c317edf335bc7a1af846429bcdc2429983622b9626e703b520f6339010a
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d
-
MD5
8cdc078ea551a6b01778ec2be2cc359f
SHA1754cdf9019220976d3857ebfec7875a6ac1a249d
SHA256ae42f22a93a36ac02168764557980f5103c538286f77ad28ba54a269778143ea
SHA51226cbc034629c61b115ee579786f5b6fe9d44940ed3533c477fc8fdc6024036046c28c8922c8addb1d01ec0d421c971583f2fb6430ee9cbd2a5b991e5fc3de93d