Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
08-10-2021 15:07
211008-shl8xsefa9 1008-10-2021 05:38
211008-gbvqyadce8 1007-10-2021 18:28
211007-w4jayacge3 10Analysis
-
max time kernel
90s -
max time network
1810s -
platform
windows7_x64 -
resource
win7-de-20210920 -
submitted
08-10-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-de-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.9MB
-
MD5
0308d3044eda0db671c58c2a97cb3c10
-
SHA1
1737ab616a61d35b0bde0aaad949d9894e14be9e
-
SHA256
b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072
-
SHA512
29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e
Malware Config
Extracted
vidar
41.2
916
https://mas.to/@serg4325
-
profile_id
916
Extracted
smokeloader
2020
http://gmpeople.com/upload/
http://mile48.com/upload/
http://lecanardstsornin.com/upload/
http://m3600.com/upload/
http://camasirx.com/upload/
Extracted
redline
media214
91.121.67.60:2151
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral3/memory/2536-226-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2536-229-0x000000000041B23A-mapping.dmp family_redline behavioral3/memory/2536-232-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2536-227-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2536-225-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
resource yara_rule behavioral3/files/0x0005000000013271-108.dat family_socelars behavioral3/files/0x0005000000013271-161.dat family_socelars behavioral3/files/0x0005000000013271-163.dat family_socelars -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral3/memory/636-189-0x0000000000400000-0x0000000002E08000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x0005000000013066-70.dat aspack_v212_v242 behavioral3/files/0x0005000000013066-71.dat aspack_v212_v242 behavioral3/files/0x000600000001267c-72.dat aspack_v212_v242 behavioral3/files/0x000600000001267c-73.dat aspack_v212_v242 behavioral3/files/0x00050000000130d5-76.dat aspack_v212_v242 behavioral3/files/0x00050000000130d5-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 19 IoCs
pid Process 592 setup_installer.exe 1832 setup_install.exe 916 Thu161580bf75.exe 1732 Thu164ba03be19.exe 1804 Thu167d514d2a7ac5a.exe 1668 Thu1653d94a8da.exe 940 Thu16205451b994.exe 568 Thu166f9a8bbe80.exe 1684 Thu165bd34b1e1d4d81.exe 1564 Thu16466b26f8b7.exe 636 Thu1628aafb3efd7c3d.exe 1836 Thu16f584bd3686.exe 764 wNl6wHAMvfRoIXqbE0Esh6jf.exe 2436 6593719.scr 2468 1332080.scr 2552 146B.exe 2536 Thu164ba03be19.exe 2620 8988675.scr 2812 6627024.scr -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8988675.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8988675.scr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation Thu166f9a8bbe80.exe -
Loads dropped DLL 55 IoCs
pid Process 1796 setup_x86_x64_install.exe 592 setup_installer.exe 592 setup_installer.exe 592 setup_installer.exe 592 setup_installer.exe 592 setup_installer.exe 592 setup_installer.exe 1832 setup_install.exe 1832 setup_install.exe 1832 setup_install.exe 1832 setup_install.exe 1832 setup_install.exe 1832 setup_install.exe 1832 setup_install.exe 1832 setup_install.exe 1676 cmd.exe 1076 cmd.exe 1076 cmd.exe 1540 cmd.exe 1732 Thu164ba03be19.exe 1732 Thu164ba03be19.exe 1100 cmd.exe 1804 Thu167d514d2a7ac5a.exe 1804 Thu167d514d2a7ac5a.exe 1740 cmd.exe 1740 cmd.exe 1088 cmd.exe 976 cmd.exe 960 cmd.exe 960 cmd.exe 1416 cmd.exe 1416 cmd.exe 1668 Thu1653d94a8da.exe 1668 Thu1653d94a8da.exe 568 Thu166f9a8bbe80.exe 568 Thu166f9a8bbe80.exe 1564 Thu16466b26f8b7.exe 1564 Thu16466b26f8b7.exe 636 Thu1628aafb3efd7c3d.exe 636 Thu1628aafb3efd7c3d.exe 1728 cmd.exe 1684 Thu165bd34b1e1d4d81.exe 1684 Thu165bd34b1e1d4d81.exe 568 Thu166f9a8bbe80.exe 1072 WerFault.exe 1072 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1788 WerFault.exe 1072 WerFault.exe 1788 WerFault.exe 1732 Thu164ba03be19.exe 2536 Thu164ba03be19.exe 2536 Thu164ba03be19.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8988675.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com 33 ipinfo.io 34 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2620 8988675.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 2536 1732 Thu164ba03be19.exe 66 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1072 636 WerFault.exe 51 1788 568 WerFault.exe 49 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu16466b26f8b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu16466b26f8b7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Thu16466b26f8b7.exe -
Kills process with taskkill 1 IoCs
pid Process 2712 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Thu161580bf75.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Thu161580bf75.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Thu165bd34b1e1d4d81.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Thu165bd34b1e1d4d81.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Thu161580bf75.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1564 Thu16466b26f8b7.exe 1564 Thu16466b26f8b7.exe 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1564 Thu16466b26f8b7.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeCreateTokenPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeAssignPrimaryTokenPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeLockMemoryPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeIncreaseQuotaPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeMachineAccountPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeTcbPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeSecurityPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeTakeOwnershipPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeLoadDriverPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeSystemProfilePrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeSystemtimePrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeProfSingleProcessPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeIncBasePriorityPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeCreatePagefilePrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeCreatePermanentPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeBackupPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeRestorePrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeShutdownPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeAuditPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeSystemEnvironmentPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeChangeNotifyPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeRemoteShutdownPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeUndockPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeSyncAgentPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeEnableDelegationPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeManageVolumePrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeImpersonatePrivilege 1684 Thu165bd34b1e1d4d81.exe Token: SeCreateGlobalPrivilege 1684 Thu165bd34b1e1d4d81.exe Token: 31 1684 Thu165bd34b1e1d4d81.exe Token: 32 1684 Thu165bd34b1e1d4d81.exe Token: 33 1684 Thu165bd34b1e1d4d81.exe Token: 34 1684 Thu165bd34b1e1d4d81.exe Token: 35 1684 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1180 powershell.exe Token: SeDebugPrivilege 1072 WerFault.exe Token: SeDebugPrivilege 1788 WerFault.exe Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeDebugPrivilege 916 Thu161580bf75.exe Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1296 Process not Found 1296 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 1796 wrote to memory of 592 1796 setup_x86_x64_install.exe 28 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 592 wrote to memory of 1832 592 setup_installer.exe 29 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1688 1832 setup_install.exe 41 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1088 1832 setup_install.exe 31 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1740 1832 setup_install.exe 32 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1676 1832 setup_install.exe 33 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 1416 1832 setup_install.exe 34 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 976 1832 setup_install.exe 35 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 960 1832 setup_install.exe 36 PID 1832 wrote to memory of 1728 1832 setup_install.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS05222F16\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe4⤵
- Loads dropped DLL
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu166f9a8bbe80.exeThu166f9a8bbe80.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:568 -
C:\Users\Admin\Pictures\Adobe Films\wNl6wHAMvfRoIXqbE0Esh6jf.exe"C:\Users\Admin\Pictures\Adobe Films\wNl6wHAMvfRoIXqbE0Esh6jf.exe"6⤵
- Executes dropped EXE
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 14286⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone4⤵
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu16205451b994.exeThu16205451b994.exe /mixone5⤵
- Executes dropped EXE
PID:940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu161580bf75.exe4⤵
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu161580bf75.exeThu161580bf75.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Users\Admin\AppData\Roaming\6593719.scr"C:\Users\Admin\AppData\Roaming\6593719.scr" /S6⤵
- Executes dropped EXE
PID:2436
-
-
C:\Users\Admin\AppData\Roaming\1332080.scr"C:\Users\Admin\AppData\Roaming\1332080.scr" /S6⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Roaming\8988675.scr"C:\Users\Admin\AppData\Roaming\8988675.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2620
-
-
C:\Users\Admin\AppData\Roaming\6627024.scr"C:\Users\Admin\AppData\Roaming\6627024.scr" /S6⤵
- Executes dropped EXE
PID:2812
-
-
C:\Users\Admin\AppData\Roaming\7358781.scr"C:\Users\Admin\AppData\Roaming\7358781.scr" /S6⤵PID:2904
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe4⤵
- Loads dropped DLL
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu1628aafb3efd7c3d.exeThu1628aafb3efd7c3d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 7766⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe4⤵
- Loads dropped DLL
PID:976 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu165bd34b1e1d4d81.exeThu165bd34b1e1d4d81.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2640
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:2712
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe4⤵
- Loads dropped DLL
PID:960 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu16466b26f8b7.exeThu16466b26f8b7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe4⤵
- Loads dropped DLL
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu16f584bd3686.exeThu16f584bd3686.exe5⤵
- Executes dropped EXE
PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe4⤵PID:292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu164ba03be19.exe4⤵
- Loads dropped DLL
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu164ba03be19.exeThu164ba03be19.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu164ba03be19.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe4⤵
- Loads dropped DLL
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu1653d94a8da.exeThu1653d94a8da.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu1653d94a8da.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )6⤵PID:972
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe4⤵
- Loads dropped DLL
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\7zS05222F16\Thu167d514d2a7ac5a.exeThu167d514d2a7ac5a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\146B.exeC:\Users\Admin\AppData\Local\Temp\146B.exe1⤵
- Executes dropped EXE
PID:2552
-
C:\Windows\system32\taskeng.exetaskeng.exe {6DFA3D7F-9987-4AB7-9704-30342F85FF9F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2372
-
C:\Users\Admin\AppData\Roaming\dhacusdC:\Users\Admin\AppData\Roaming\dhacusd2⤵PID:2992
-
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:1220
-
-
C:\Users\Admin\AppData\Roaming\dhacusdC:\Users\Admin\AppData\Roaming\dhacusd2⤵PID:2556
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A22E435D-5773-4A29-A953-CAA85D4BAC71} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1000
-
C:\Windows\system32\taskeng.exetaskeng.exe {7C8C7D93-47E7-4AFD-845C-B20ED056E0E6} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1544
-
C:\Users\Admin\AppData\Roaming\dhacusdC:\Users\Admin\AppData\Roaming\dhacusd2⤵PID:2472
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D3646B41-B7DB-44F4-96F4-4D735967A809} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1568
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1