Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
toolspab2 (1).exe
windows7_x64
10toolspab2 (1).exe
windows10_x64
10toolspab2 (10).exe
windows7_x64
10toolspab2 (10).exe
windows10_x64
10toolspab2 (11).exe
windows7_x64
10toolspab2 (11).exe
windows10_x64
10toolspab2 (12).exe
windows7_x64
10toolspab2 (12).exe
windows10_x64
10toolspab2 (13).exe
windows7_x64
10toolspab2 (13).exe
windows10_x64
10toolspab2 (14).exe
windows7_x64
10toolspab2 (14).exe
windows10_x64
10toolspab2 (15).exe
windows7_x64
10toolspab2 (15).exe
windows10_x64
10toolspab2 (16).exe
windows7_x64
10toolspab2 (16).exe
windows10_x64
10toolspab2 (17).exe
windows7_x64
10toolspab2 (17).exe
windows10_x64
10toolspab2 (18).exe
windows7_x64
10toolspab2 (18).exe
windows10_x64
10toolspab2 (19).exe
windows7_x64
10toolspab2 (19).exe
windows10_x64
10toolspab2 (2).exe
windows7_x64
10toolspab2 (2).exe
windows10_x64
10toolspab2 (20).exe
windows7_x64
10toolspab2 (20).exe
windows10_x64
10toolspab2 (21).exe
windows7_x64
10toolspab2 (21).exe
windows10_x64
10toolspab2 (22).exe
windows7_x64
10toolspab2 (22).exe
windows10_x64
10toolspab2 (23).exe
windows7_x64
10toolspab2 (23).exe
windows10_x64
10Resubmissions
12/07/2021, 16:55
210712-cvz622xsbj 1010/07/2021, 13:25
210710-pdfh7kft96 1009/07/2021, 23:00
210709-hewxkm1xlj 1009/07/2021, 16:08
210709-5ql27kyjqa 1009/07/2021, 14:08
210709-pt977a4bhe 1008/07/2021, 22:09
210708-3ypfnj5j7x 1008/07/2021, 13:30
210708-4hsk7y9f2x 1008/07/2021, 12:14
210708-8t5f9z9egj 10Analysis
-
max time kernel
1802s -
max time network
1283s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
10/07/2021, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
toolspab2 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
toolspab2 (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
toolspab2 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
toolspab2 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
toolspab2 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
toolspab2 (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
toolspab2 (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
toolspab2 (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
toolspab2 (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
toolspab2 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
toolspab2 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
toolspab2 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
toolspab2 (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
toolspab2 (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
toolspab2 (16).exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
toolspab2 (16).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
toolspab2 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
toolspab2 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
toolspab2 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
toolspab2 (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
toolspab2 (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
toolspab2 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
toolspab2 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
toolspab2 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
toolspab2 (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
toolspab2 (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
toolspab2 (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
toolspab2 (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
toolspab2 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
toolspab2 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
toolspab2 (23).exe
Resource
win7v20210410
General
-
Target
toolspab2 (18).exe
-
Size
315KB
-
MD5
1d20e1f65938e837ef1b88f10f1bd6c3
-
SHA1
703d7098dbfc476d2181b7fc041cc23e49c368f1
-
SHA256
05cd7440851f13dd8f489bb3c06eba385d85d7d9a77a612049c04c541a88593d
-
SHA512
f9d333abe1f721b8d45d7bc6b5f286af09a8d233bd1d41f0ad891840cf742364aeca2cb6ccd6543f56a8eaf32804f82f72f961d16d5ba663ad706d164915a196
Malware Config
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
redline
1
45.32.235.238:45555
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral20/files/0x000200000001ab36-157.dat family_redline behavioral20/files/0x000200000001ab36-158.dat family_redline behavioral20/memory/2648-175-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral20/memory/2648-176-0x0000000000417E96-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 3776 9A51.exe 3624 9BBA.exe 3848 9E7A.exe 2496 A234.exe 3952 A429.exe 3520 A989.exe 2168 AEF9.exe 4000 9E7A.exe 184 B7D3.exe 2648 9E7A.exe 3668 5X6HCW5dEP.exe 3644 5X6HCW5dEP.exe 3776 sqlcmd.exe 2180 sqlcmd.exe 2360 sqlcmd.exe 584 sqlcmd.exe 3016 sqlcmd.exe 1576 sqlcmd.exe 3416 sqlcmd.exe 3288 sqlcmd.exe 2276 sqlcmd.exe 3508 sqlcmd.exe 2284 sqlcmd.exe 3712 sqlcmd.exe 1216 sqlcmd.exe 1856 sqlcmd.exe 3376 sqlcmd.exe 3836 sqlcmd.exe 3884 uthbcri 2428 uthbcri 1212 sqlcmd.exe 1736 sqlcmd.exe 3680 sqlcmd.exe 900 sqlcmd.exe 3040 sqlcmd.exe 1332 sqlcmd.exe 2024 sqlcmd.exe 2712 sqlcmd.exe 2204 sqlcmd.exe 3972 sqlcmd.exe 3804 sqlcmd.exe 2280 sqlcmd.exe 3500 sqlcmd.exe 544 sqlcmd.exe 1084 sqlcmd.exe 676 sqlcmd.exe 2276 sqlcmd.exe 948 sqlcmd.exe 1012 sqlcmd.exe 944 sqlcmd.exe 68 uthbcri 2120 uthbcri 2396 sqlcmd.exe 2080 sqlcmd.exe 2060 sqlcmd.exe 2940 sqlcmd.exe 2040 sqlcmd.exe 2812 sqlcmd.exe 2972 sqlcmd.exe 3188 sqlcmd.exe 3052 sqlcmd.exe 3528 sqlcmd.exe 3736 sqlcmd.exe 196 sqlcmd.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B7D3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B7D3.exe -
Deletes itself 1 IoCs
pid Process 3024 Process not Found -
Loads dropped DLL 8 IoCs
pid Process 3620 toolspab2 (18).exe 2496 A234.exe 2496 A234.exe 2496 A234.exe 2496 A234.exe 2496 A234.exe 2120 uthbcri 856 uthbcri -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral20/files/0x000200000001ab36-157.dat themida behavioral20/files/0x000200000001ab36-158.dat themida behavioral20/memory/184-161-0x0000000000F80000-0x0000000000F81000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B7D3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 184 B7D3.exe -
Suspicious use of SetThreadContext 35 IoCs
description pid Process procid_target PID 4000 set thread context of 3620 4000 toolspab2 (18).exe 77 PID 3848 set thread context of 2648 3848 9E7A.exe 88 PID 3668 set thread context of 3644 3668 5X6HCW5dEP.exe 95 PID 3776 set thread context of 2180 3776 sqlcmd.exe 108 PID 2360 set thread context of 584 2360 sqlcmd.exe 112 PID 3016 set thread context of 1576 3016 sqlcmd.exe 114 PID 3416 set thread context of 3288 3416 sqlcmd.exe 116 PID 2276 set thread context of 3508 2276 sqlcmd.exe 118 PID 2284 set thread context of 3712 2284 sqlcmd.exe 120 PID 1216 set thread context of 1856 1216 sqlcmd.exe 122 PID 3376 set thread context of 3836 3376 sqlcmd.exe 124 PID 3884 set thread context of 2428 3884 uthbcri 126 PID 1212 set thread context of 1736 1212 sqlcmd.exe 128 PID 3680 set thread context of 900 3680 sqlcmd.exe 130 PID 3040 set thread context of 1332 3040 sqlcmd.exe 132 PID 2024 set thread context of 2712 2024 sqlcmd.exe 134 PID 2204 set thread context of 3972 2204 sqlcmd.exe 136 PID 3804 set thread context of 2280 3804 sqlcmd.exe 138 PID 3500 set thread context of 544 3500 sqlcmd.exe 140 PID 1084 set thread context of 676 1084 sqlcmd.exe 142 PID 2276 set thread context of 948 2276 sqlcmd.exe 144 PID 1012 set thread context of 944 1012 sqlcmd.exe 146 PID 68 set thread context of 2120 68 uthbcri 148 PID 2396 set thread context of 2080 2396 sqlcmd.exe 150 PID 2060 set thread context of 2940 2060 sqlcmd.exe 152 PID 2040 set thread context of 2812 2040 sqlcmd.exe 154 PID 2972 set thread context of 3188 2972 sqlcmd.exe 156 PID 3052 set thread context of 3528 3052 sqlcmd.exe 158 PID 3736 set thread context of 196 3736 sqlcmd.exe 160 PID 2716 set thread context of 1904 2716 sqlcmd.exe 162 PID 416 set thread context of 3848 416 sqlcmd.exe 164 PID 2664 set thread context of 2216 2664 sqlcmd.exe 166 PID 3844 set thread context of 2548 3844 sqlcmd.exe 168 PID 1212 set thread context of 856 1212 uthbcri 170 PID 3704 set thread context of 788 3704 sqlcmd.exe 172 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (18).exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (18).exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uthbcri Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (18).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uthbcri Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uthbcri Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uthbcri Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uthbcri Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uthbcri -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2144 schtasks.exe 2216 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2296 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3620 toolspab2 (18).exe 3620 toolspab2 (18).exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 Process not Found -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 3620 toolspab2 (18).exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 2120 uthbcri 856 uthbcri -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeDebugPrivilege 184 B7D3.exe Token: SeDebugPrivilege 2648 9E7A.exe Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3776 9A51.exe 3624 9BBA.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3024 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3620 4000 toolspab2 (18).exe 77 PID 4000 wrote to memory of 3620 4000 toolspab2 (18).exe 77 PID 4000 wrote to memory of 3620 4000 toolspab2 (18).exe 77 PID 4000 wrote to memory of 3620 4000 toolspab2 (18).exe 77 PID 4000 wrote to memory of 3620 4000 toolspab2 (18).exe 77 PID 4000 wrote to memory of 3620 4000 toolspab2 (18).exe 77 PID 3024 wrote to memory of 3776 3024 Process not Found 79 PID 3024 wrote to memory of 3776 3024 Process not Found 79 PID 3024 wrote to memory of 3776 3024 Process not Found 79 PID 3024 wrote to memory of 3624 3024 Process not Found 80 PID 3024 wrote to memory of 3624 3024 Process not Found 80 PID 3024 wrote to memory of 3624 3024 Process not Found 80 PID 3024 wrote to memory of 3848 3024 Process not Found 81 PID 3024 wrote to memory of 3848 3024 Process not Found 81 PID 3024 wrote to memory of 3848 3024 Process not Found 81 PID 3024 wrote to memory of 2496 3024 Process not Found 83 PID 3024 wrote to memory of 2496 3024 Process not Found 83 PID 3024 wrote to memory of 2496 3024 Process not Found 83 PID 3024 wrote to memory of 3952 3024 Process not Found 84 PID 3024 wrote to memory of 3952 3024 Process not Found 84 PID 3024 wrote to memory of 3952 3024 Process not Found 84 PID 3848 wrote to memory of 4000 3848 9E7A.exe 85 PID 3848 wrote to memory of 4000 3848 9E7A.exe 85 PID 3848 wrote to memory of 4000 3848 9E7A.exe 85 PID 3024 wrote to memory of 3520 3024 Process not Found 86 PID 3024 wrote to memory of 3520 3024 Process not Found 86 PID 3024 wrote to memory of 3520 3024 Process not Found 86 PID 3024 wrote to memory of 2168 3024 Process not Found 87 PID 3024 wrote to memory of 2168 3024 Process not Found 87 PID 3024 wrote to memory of 2168 3024 Process not Found 87 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3024 wrote to memory of 184 3024 Process not Found 89 PID 3024 wrote to memory of 184 3024 Process not Found 89 PID 3024 wrote to memory of 184 3024 Process not Found 89 PID 3024 wrote to memory of 416 3024 Process not Found 90 PID 3024 wrote to memory of 416 3024 Process not Found 90 PID 3024 wrote to memory of 416 3024 Process not Found 90 PID 3024 wrote to memory of 416 3024 Process not Found 90 PID 3024 wrote to memory of 3240 3024 Process not Found 91 PID 3024 wrote to memory of 3240 3024 Process not Found 91 PID 3024 wrote to memory of 3240 3024 Process not Found 91 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3848 wrote to memory of 2648 3848 9E7A.exe 88 PID 3024 wrote to memory of 1060 3024 Process not Found 92 PID 3024 wrote to memory of 1060 3024 Process not Found 92 PID 3024 wrote to memory of 1060 3024 Process not Found 92 PID 3024 wrote to memory of 1060 3024 Process not Found 92 PID 3024 wrote to memory of 1048 3024 Process not Found 93 PID 3024 wrote to memory of 1048 3024 Process not Found 93 PID 3024 wrote to memory of 1048 3024 Process not Found 93 PID 2496 wrote to memory of 3668 2496 A234.exe 94 PID 2496 wrote to memory of 3668 2496 A234.exe 94 PID 2496 wrote to memory of 3668 2496 A234.exe 94 PID 2496 wrote to memory of 3532 2496 A234.exe 96 PID 2496 wrote to memory of 3532 2496 A234.exe 96 PID 2496 wrote to memory of 3532 2496 A234.exe 96 PID 3668 wrote to memory of 3644 3668 5X6HCW5dEP.exe 95 PID 3668 wrote to memory of 3644 3668 5X6HCW5dEP.exe 95 PID 3668 wrote to memory of 3644 3668 5X6HCW5dEP.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (18).exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\9A51.exeC:\Users\Admin\AppData\Local\Temp\9A51.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3776
-
C:\Users\Admin\AppData\Local\Temp\9BBA.exeC:\Users\Admin\AppData\Local\Temp\9BBA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3624
-
C:\Users\Admin\AppData\Local\Temp\9E7A.exeC:\Users\Admin\AppData\Local\Temp\9E7A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\9E7A.exeC:\Users\Admin\AppData\Local\Temp\9E7A.exe2⤵
- Executes dropped EXE
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\9E7A.exeC:\Users\Admin\AppData\Local\Temp\9E7A.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\A234.exeC:\Users\Admin\AppData\Local\Temp\A234.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\5X6HCW5dEP.exe"C:\Users\Admin\AppData\Local\Temp\5X6HCW5dEP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\5X6HCW5dEP.exe"C:\Users\Admin\AppData\Local\Temp\5X6HCW5dEP.exe"3⤵
- Executes dropped EXE
PID:3644 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"4⤵
- Creates scheduled task(s)
PID:2144
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\A234.exe"2⤵PID:3532
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\A429.exeC:\Users\Admin\AppData\Local\Temp\A429.exe1⤵
- Executes dropped EXE
PID:3952
-
C:\Users\Admin\AppData\Local\Temp\A989.exeC:\Users\Admin\AppData\Local\Temp\A989.exe1⤵
- Executes dropped EXE
PID:3520
-
C:\Users\Admin\AppData\Local\Temp\AEF9.exeC:\Users\Admin\AppData\Local\Temp\AEF9.exe1⤵
- Executes dropped EXE
PID:2168
-
C:\Users\Admin\AppData\Local\Temp\B7D3.exeC:\Users\Admin\AppData\Local\Temp\B7D3.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:184
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:416
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3240
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1060
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1048
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3240
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3856
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2732
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3584
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2728
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3776 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
PID:2216
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2360 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:584
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3016 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1576
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3416 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2276 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3508
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2284 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1216 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3376 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3836
-
-
C:\Users\Admin\AppData\Roaming\uthbcriC:\Users\Admin\AppData\Roaming\uthbcri1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3884 -
C:\Users\Admin\AppData\Roaming\uthbcriC:\Users\Admin\AppData\Roaming\uthbcri2⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1212 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1736
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:900
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3040 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1332
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3972
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3804 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3500 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:544
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:676
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2276 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:948
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1012 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:944
-
-
C:\Users\Admin\AppData\Roaming\uthbcriC:\Users\Admin\AppData\Roaming\uthbcri1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:68 -
C:\Users\Admin\AppData\Roaming\uthbcriC:\Users\Admin\AppData\Roaming\uthbcri2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2120
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2396 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2080
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2060 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2040 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2812
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3188
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3052 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3528
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:196
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:2716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:1904
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:416 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:3848
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:2664 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:2216
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:3844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:2548
-
-
C:\Users\Admin\AppData\Roaming\uthbcriC:\Users\Admin\AppData\Roaming\uthbcri1⤵
- Suspicious use of SetThreadContext
PID:1212 -
C:\Users\Admin\AppData\Roaming\uthbcriC:\Users\Admin\AppData\Roaming\uthbcri2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:856
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:3704 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:788
-