Overview
overview
10Static
static
toolspab2 (1).exe
windows7_x64
10toolspab2 (1).exe
windows10_x64
10toolspab2 (10).exe
windows7_x64
10toolspab2 (10).exe
windows10_x64
10toolspab2 (11).exe
windows7_x64
10toolspab2 (11).exe
windows10_x64
10toolspab2 (12).exe
windows7_x64
10toolspab2 (12).exe
windows10_x64
10toolspab2 (13).exe
windows7_x64
10toolspab2 (13).exe
windows10_x64
10toolspab2 (14).exe
windows7_x64
10toolspab2 (14).exe
windows10_x64
10toolspab2 (15).exe
windows7_x64
10toolspab2 (15).exe
windows10_x64
10toolspab2 (16).exe
windows7_x64
10toolspab2 (16).exe
windows10_x64
10toolspab2 (17).exe
windows7_x64
10toolspab2 (17).exe
windows10_x64
10toolspab2 (18).exe
windows7_x64
10toolspab2 (18).exe
windows10_x64
10toolspab2 (19).exe
windows7_x64
10toolspab2 (19).exe
windows10_x64
10toolspab2 (2).exe
windows7_x64
10toolspab2 (2).exe
windows10_x64
10toolspab2 (20).exe
windows7_x64
10toolspab2 (20).exe
windows10_x64
10toolspab2 (21).exe
windows7_x64
10toolspab2 (21).exe
windows10_x64
10toolspab2 (22).exe
windows7_x64
10toolspab2 (22).exe
windows10_x64
10toolspab2 (23).exe
windows7_x64
10toolspab2 (23).exe
windows10_x64
10Resubmissions
12-07-2021 16:55
210712-cvz622xsbj 1010-07-2021 13:25
210710-pdfh7kft96 1009-07-2021 23:00
210709-hewxkm1xlj 1009-07-2021 16:08
210709-5ql27kyjqa 1009-07-2021 14:08
210709-pt977a4bhe 1008-07-2021 22:09
210708-3ypfnj5j7x 1008-07-2021 13:30
210708-4hsk7y9f2x 1008-07-2021 12:14
210708-8t5f9z9egj 10Analysis
-
max time kernel
1800s -
max time network
1722s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
10-07-2021 13:25
Static task
static1
Behavioral task
behavioral1
Sample
toolspab2 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
toolspab2 (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
toolspab2 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
toolspab2 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
toolspab2 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
toolspab2 (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
toolspab2 (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
toolspab2 (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
toolspab2 (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
toolspab2 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
toolspab2 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
toolspab2 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
toolspab2 (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
toolspab2 (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
toolspab2 (16).exe
Resource
win7v20210408
Behavioral task
behavioral16
Sample
toolspab2 (16).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
toolspab2 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
toolspab2 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
toolspab2 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
toolspab2 (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
toolspab2 (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
toolspab2 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
toolspab2 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
toolspab2 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
toolspab2 (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
toolspab2 (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
toolspab2 (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
toolspab2 (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
toolspab2 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
toolspab2 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
toolspab2 (23).exe
Resource
win7v20210410
General
-
Target
toolspab2 (19).exe
-
Size
315KB
-
MD5
1d20e1f65938e837ef1b88f10f1bd6c3
-
SHA1
703d7098dbfc476d2181b7fc041cc23e49c368f1
-
SHA256
05cd7440851f13dd8f489bb3c06eba385d85d7d9a77a612049c04c541a88593d
-
SHA512
f9d333abe1f721b8d45d7bc6b5f286af09a8d233bd1d41f0ad891840cf742364aeca2cb6ccd6543f56a8eaf32804f82f72f961d16d5ba663ad706d164915a196
Malware Config
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral22/files/0x000200000001abb7-136.dat family_redline behavioral22/files/0x000200000001abb7-137.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 1504 C7F9.exe 3456 CBA3.exe 1304 CF8C.exe 776 D47F.exe 2140 DA6C.exe 3512 GXBbOc0Pa4.exe 2632 GXBbOc0Pa4.exe 2628 ebwjjcs 2464 sqlcmd.exe 3460 sqlcmd.exe 1572 ebwjjcs 2136 sqlcmd.exe 3032 sqlcmd.exe 3936 sqlcmd.exe 1772 sqlcmd.exe 648 sqlcmd.exe 3908 sqlcmd.exe 2044 sqlcmd.exe 3404 sqlcmd.exe 2908 sqlcmd.exe 2140 sqlcmd.exe 1796 sqlcmd.exe 3172 sqlcmd.exe 1332 sqlcmd.exe 2204 sqlcmd.exe 2196 sqlcmd.exe 2152 sqlcmd.exe 2768 sqlcmd.exe 2300 sqlcmd.exe 1492 ebwjjcs 2604 sqlcmd.exe 3316 sqlcmd.exe 752 ebwjjcs 2236 sqlcmd.exe 2968 sqlcmd.exe 2328 sqlcmd.exe 3508 sqlcmd.exe 1824 sqlcmd.exe 3840 sqlcmd.exe 1504 sqlcmd.exe 1000 sqlcmd.exe 152 sqlcmd.exe 652 sqlcmd.exe 1120 sqlcmd.exe 3696 sqlcmd.exe 2616 sqlcmd.exe 2776 sqlcmd.exe 2044 sqlcmd.exe 400 sqlcmd.exe 948 sqlcmd.exe 1056 sqlcmd.exe 1840 ebwjjcs 2212 sqlcmd.exe 3640 sqlcmd.exe 2324 ebwjjcs 2800 sqlcmd.exe 2000 sqlcmd.exe 3040 sqlcmd.exe 3608 sqlcmd.exe 3584 sqlcmd.exe 3560 sqlcmd.exe 3164 sqlcmd.exe 3700 sqlcmd.exe 3644 sqlcmd.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DA6C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DA6C.exe -
Deletes itself 1 IoCs
pid Process 3020 Process not Found -
Loads dropped DLL 3 IoCs
pid Process 4016 toolspab2 (19).exe 752 ebwjjcs 2324 ebwjjcs -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral22/files/0x000200000001abb7-136.dat themida behavioral22/files/0x000200000001abb7-137.dat themida behavioral22/memory/2140-139-0x0000000000280000-0x0000000000281000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DA6C.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2140 DA6C.exe -
Suspicious use of SetThreadContext 34 IoCs
description pid Process procid_target PID 3212 set thread context of 4016 3212 toolspab2 (19).exe 78 PID 3512 set thread context of 2632 3512 GXBbOc0Pa4.exe 90 PID 2464 set thread context of 3460 2464 sqlcmd.exe 104 PID 2628 set thread context of 1572 2628 ebwjjcs 107 PID 2136 set thread context of 3032 2136 sqlcmd.exe 109 PID 3936 set thread context of 1772 3936 sqlcmd.exe 111 PID 648 set thread context of 3908 648 sqlcmd.exe 113 PID 2044 set thread context of 3404 2044 sqlcmd.exe 115 PID 2908 set thread context of 2140 2908 sqlcmd.exe 117 PID 1796 set thread context of 3172 1796 sqlcmd.exe 119 PID 1332 set thread context of 2204 1332 sqlcmd.exe 121 PID 2196 set thread context of 2152 2196 sqlcmd.exe 123 PID 2768 set thread context of 2300 2768 sqlcmd.exe 125 PID 2604 set thread context of 3316 2604 sqlcmd.exe 128 PID 1492 set thread context of 752 1492 ebwjjcs 129 PID 2236 set thread context of 2968 2236 sqlcmd.exe 131 PID 2328 set thread context of 3508 2328 sqlcmd.exe 133 PID 1824 set thread context of 3840 1824 sqlcmd.exe 135 PID 1504 set thread context of 1000 1504 sqlcmd.exe 137 PID 152 set thread context of 652 152 sqlcmd.exe 139 PID 1120 set thread context of 3696 1120 sqlcmd.exe 141 PID 2616 set thread context of 2776 2616 sqlcmd.exe 143 PID 2044 set thread context of 400 2044 sqlcmd.exe 145 PID 948 set thread context of 1056 948 sqlcmd.exe 147 PID 2212 set thread context of 3640 2212 sqlcmd.exe 150 PID 1840 set thread context of 2324 1840 ebwjjcs 151 PID 2800 set thread context of 2000 2800 sqlcmd.exe 153 PID 3040 set thread context of 3608 3040 sqlcmd.exe 155 PID 3584 set thread context of 3560 3584 sqlcmd.exe 157 PID 3164 set thread context of 3700 3164 sqlcmd.exe 159 PID 3644 set thread context of 744 3644 sqlcmd.exe 161 PID 908 set thread context of 3772 908 sqlcmd.exe 163 PID 3720 set thread context of 1796 3720 sqlcmd.exe 165 PID 2240 set thread context of 1332 2240 sqlcmd.exe 167 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ebwjjcs Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ebwjjcs Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ebwjjcs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (19).exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (19).exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (19).exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ebwjjcs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ebwjjcs Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ebwjjcs -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3908 schtasks.exe 2636 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3772 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4016 toolspab2 (19).exe 4016 toolspab2 (19).exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Process not Found -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 4016 toolspab2 (19).exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 752 ebwjjcs 2324 ebwjjcs -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeDebugPrivilege 2140 DA6C.exe Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4016 3212 toolspab2 (19).exe 78 PID 3212 wrote to memory of 4016 3212 toolspab2 (19).exe 78 PID 3212 wrote to memory of 4016 3212 toolspab2 (19).exe 78 PID 3212 wrote to memory of 4016 3212 toolspab2 (19).exe 78 PID 3212 wrote to memory of 4016 3212 toolspab2 (19).exe 78 PID 3212 wrote to memory of 4016 3212 toolspab2 (19).exe 78 PID 3020 wrote to memory of 1504 3020 Process not Found 80 PID 3020 wrote to memory of 1504 3020 Process not Found 80 PID 3020 wrote to memory of 1504 3020 Process not Found 80 PID 3020 wrote to memory of 3456 3020 Process not Found 81 PID 3020 wrote to memory of 3456 3020 Process not Found 81 PID 3020 wrote to memory of 3456 3020 Process not Found 81 PID 3020 wrote to memory of 1304 3020 Process not Found 82 PID 3020 wrote to memory of 1304 3020 Process not Found 82 PID 3020 wrote to memory of 1304 3020 Process not Found 82 PID 3020 wrote to memory of 776 3020 Process not Found 83 PID 3020 wrote to memory of 776 3020 Process not Found 83 PID 3020 wrote to memory of 776 3020 Process not Found 83 PID 3020 wrote to memory of 2140 3020 Process not Found 84 PID 3020 wrote to memory of 2140 3020 Process not Found 84 PID 3020 wrote to memory of 2140 3020 Process not Found 84 PID 3020 wrote to memory of 2604 3020 Process not Found 85 PID 3020 wrote to memory of 2604 3020 Process not Found 85 PID 3020 wrote to memory of 2604 3020 Process not Found 85 PID 3020 wrote to memory of 2604 3020 Process not Found 85 PID 3020 wrote to memory of 2968 3020 Process not Found 86 PID 3020 wrote to memory of 2968 3020 Process not Found 86 PID 3020 wrote to memory of 2968 3020 Process not Found 86 PID 3020 wrote to memory of 940 3020 Process not Found 87 PID 3020 wrote to memory of 940 3020 Process not Found 87 PID 3020 wrote to memory of 940 3020 Process not Found 87 PID 3020 wrote to memory of 940 3020 Process not Found 87 PID 3020 wrote to memory of 3752 3020 Process not Found 88 PID 3020 wrote to memory of 3752 3020 Process not Found 88 PID 3020 wrote to memory of 3752 3020 Process not Found 88 PID 1504 wrote to memory of 3512 1504 C7F9.exe 89 PID 1504 wrote to memory of 3512 1504 C7F9.exe 89 PID 1504 wrote to memory of 3512 1504 C7F9.exe 89 PID 1504 wrote to memory of 1276 1504 C7F9.exe 92 PID 1504 wrote to memory of 1276 1504 C7F9.exe 92 PID 1504 wrote to memory of 1276 1504 C7F9.exe 92 PID 3512 wrote to memory of 2632 3512 GXBbOc0Pa4.exe 90 PID 3512 wrote to memory of 2632 3512 GXBbOc0Pa4.exe 90 PID 3512 wrote to memory of 2632 3512 GXBbOc0Pa4.exe 90 PID 3512 wrote to memory of 2632 3512 GXBbOc0Pa4.exe 90 PID 3512 wrote to memory of 2632 3512 GXBbOc0Pa4.exe 90 PID 2632 wrote to memory of 3908 2632 GXBbOc0Pa4.exe 93 PID 2632 wrote to memory of 3908 2632 GXBbOc0Pa4.exe 93 PID 2632 wrote to memory of 3908 2632 GXBbOc0Pa4.exe 93 PID 1276 wrote to memory of 3772 1276 cmd.exe 95 PID 1276 wrote to memory of 3772 1276 cmd.exe 95 PID 1276 wrote to memory of 3772 1276 cmd.exe 95 PID 3020 wrote to memory of 3760 3020 Process not Found 96 PID 3020 wrote to memory of 3760 3020 Process not Found 96 PID 3020 wrote to memory of 3760 3020 Process not Found 96 PID 3020 wrote to memory of 3760 3020 Process not Found 96 PID 3020 wrote to memory of 364 3020 Process not Found 97 PID 3020 wrote to memory of 364 3020 Process not Found 97 PID 3020 wrote to memory of 364 3020 Process not Found 97 PID 3020 wrote to memory of 3556 3020 Process not Found 98 PID 3020 wrote to memory of 3556 3020 Process not Found 98 PID 3020 wrote to memory of 3556 3020 Process not Found 98 PID 3020 wrote to memory of 3556 3020 Process not Found 98 PID 3020 wrote to memory of 3516 3020 Process not Found 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspab2 (19).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (19).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\toolspab2 (19).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (19).exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\C7F9.exeC:\Users\Admin\AppData\Local\Temp\C7F9.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\GXBbOc0Pa4.exe"C:\Users\Admin\AppData\Local\Temp\GXBbOc0Pa4.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\GXBbOc0Pa4.exe"C:\Users\Admin\AppData\Local\Temp\GXBbOc0Pa4.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"4⤵
- Creates scheduled task(s)
PID:3908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\C7F9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\CBA3.exeC:\Users\Admin\AppData\Local\Temp\CBA3.exe1⤵
- Executes dropped EXE
PID:3456
-
C:\Users\Admin\AppData\Local\Temp\CF8C.exeC:\Users\Admin\AppData\Local\Temp\CF8C.exe1⤵
- Executes dropped EXE
PID:1304
-
C:\Users\Admin\AppData\Local\Temp\D47F.exeC:\Users\Admin\AppData\Local\Temp\D47F.exe1⤵
- Executes dropped EXE
PID:776
-
C:\Users\Admin\AppData\Local\Temp\DA6C.exeC:\Users\Admin\AppData\Local\Temp\DA6C.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2604
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2968
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:940
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3752
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3760
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:364
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3556
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3516
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3780
-
C:\Users\Admin\AppData\Roaming\ebwjjcsC:\Users\Admin\AppData\Roaming\ebwjjcs1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2628 -
C:\Users\Admin\AppData\Roaming\ebwjjcsC:\Users\Admin\AppData\Roaming\ebwjjcs2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2464 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
PID:2636
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3032
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3936 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1772
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:648 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3908
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3404
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2908 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2140
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1796 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3172
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1332 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2196 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2768 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2300
-
-
C:\Users\Admin\AppData\Roaming\ebwjjcsC:\Users\Admin\AppData\Roaming\ebwjjcs1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Users\Admin\AppData\Roaming\ebwjjcsC:\Users\Admin\AppData\Roaming\ebwjjcs2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:752
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2604 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3316
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2236 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3508
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1824 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3840
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1504 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1000
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:152 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:652
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1120 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3696
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2616 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:400
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:948 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:1056
-
-
C:\Users\Admin\AppData\Roaming\ebwjjcsC:\Users\Admin\AppData\Roaming\ebwjjcs1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1840 -
C:\Users\Admin\AppData\Roaming\ebwjjcsC:\Users\Admin\AppData\Roaming\ebwjjcs2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2212 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3640
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:2000
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3040 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3608
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3584 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3560
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵
- Executes dropped EXE
PID:3700
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3644 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:744
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:908 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:3772
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:3720 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:1796
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe1⤵
- Suspicious use of SetThreadContext
PID:2240 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:1332
-