Overview
overview
10Static
static
8694a45a29...38.exe
windows7_x64
108694a45a29...38.exe
windows7_x64
108694a45a29...38.exe
windows7_x64
108694a45a29...38.exe
windows11_x64
108694a45a29...38.exe
windows10_x64
108694a45a29...38.exe
windows10_x64
108694a45a29...38.exe
windows10_x64
108694a45a29...38.exe
windows10_x64
10Analysis
-
max time kernel
1813s -
max time network
1807s -
platform
windows11_x64 -
resource
win11 -
submitted
08-10-2021 19:47
Static task
static1
Behavioral task
behavioral1
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win11
Behavioral task
behavioral5
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win10-en-20210920
Behavioral task
behavioral8
Sample
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
Resource
win10-de-20210920
General
-
Target
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe
-
Size
166KB
-
MD5
c4b8aaf9c2ddefca7603e322146451a1
-
SHA1
46a1e8e37330703140a077bd1cf14200337c492e
-
SHA256
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38
-
SHA512
408ab911d245303669b39fc932e85219e2e15d16dc35ba48701da6089ddfa757fe92755a64b3c4f6e5a578f0d10fce1031055abb19cf17c7e1f52249bec4cf38
Malware Config
Extracted
smokeloader
2020
http://fazanaharahe10.top/
http://xandelissane20.top/
http://ustiassosale30.top/
http://cytheriata40.top/
http://ggiergionard50.top/
Extracted
redline
777
93.115.20.139:28978
Extracted
raccoon
1.8.2
c95bfeb977df680e3fb35c1ce322d091ffdbaf92
-
url4cnc
http://teletop.top/vvhotsummer
http://teleta.top/vvhotsummer
https://t.me/vvhotsummer
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/1856-187-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/1856-188-0x0000000000400000-0x0000000000422000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\2E3C.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2632 created 568 2632 WerFault.exe 23CB.exe PID 3208 created 2340 3208 WerFault.exe 3B3D.exe PID 2192 created 4384 2192 WerFault.exe 42B0.exe PID 2860 created 1908 2860 WerFault.exe 4A52.exe PID 1792 created 2860 1792 WerFault.exe EE8C.exe -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4384-237-0x0000000004C00000-0x0000000004CD6000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
1225.exe163D.exe23CB.exe163D.exe1225.exe2E3C.exe3B3D.exe42B0.exe4A52.exe583E.exe5C27.exe635C.exe7D5D.exesqtvvs.exeE9F7.exeEE8C.exepid process 1384 1225.exe 4628 163D.exe 568 23CB.exe 1856 163D.exe 3500 1225.exe 4928 2E3C.exe 2340 3B3D.exe 4384 42B0.exe 1908 4A52.exe 3216 583E.exe 3212 5C27.exe 2076 635C.exe 3284 7D5D.exe 408 sqtvvs.exe 3392 E9F7.exe 2860 EE8C.exe -
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7D5D.exe vmprotect C:\Users\Admin\AppData\Local\Temp\7D5D.exe vmprotect C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe vmprotect -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2E3C.exe583E.exeE9F7.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2E3C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2E3C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 583E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 583E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E9F7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E9F7.exe -
Loads dropped DLL 3 IoCs
Processes:
635C.exepid process 2076 635C.exe 2076 635C.exe 2076 635C.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\2E3C.exe themida behavioral4/memory/4928-208-0x0000000000640000-0x0000000000641000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\583E.exe themida C:\Users\Admin\AppData\Local\Temp\E9F7.exe themida -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
635C.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 635C.exe -
Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
Processes:
635C.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook 635C.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 635C.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
2E3C.exe583E.exeE9F7.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2E3C.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 583E.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E9F7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
2E3C.exe583E.exeE9F7.exepid process 4928 2E3C.exe 3216 583E.exe 3392 E9F7.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe163D.exe1225.exedescription pid process target process PID 3568 set thread context of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 4628 set thread context of 1856 4628 163D.exe 163D.exe PID 1384 set thread context of 3500 1384 1225.exe 1225.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1300 568 WerFault.exe 23CB.exe 3516 2340 WerFault.exe 3B3D.exe 4748 4384 WerFault.exe 42B0.exe 816 1908 WerFault.exe 4A52.exe 2000 2860 WerFault.exe EE8C.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe1225.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1225.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1225.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1225.exe -
Checks processor information in registry 2 TTPs 37 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.exesvchost.exeWaaSMedicAgent.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exepid process 1568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 1568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 3240 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3240 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe1225.exepid process 1568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 3500 1225.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exesvchost.exesvchost.exeWaaSMedicAgent.exeWerFault.exe163D.exe2E3C.exe5C27.exedescription pid process Token: SeSystemtimePrivilege 4124 svchost.exe Token: SeSystemtimePrivilege 4124 svchost.exe Token: SeIncBasePriorityPrivilege 4124 svchost.exe Token: SeShutdownPrivilege 836 svchost.exe Token: SeCreatePagefilePrivilege 836 svchost.exe Token: SeShutdownPrivilege 836 svchost.exe Token: SeCreatePagefilePrivilege 836 svchost.exe Token: SeShutdownPrivilege 836 svchost.exe Token: SeCreatePagefilePrivilege 836 svchost.exe Token: SeShutdownPrivilege 1980 svchost.exe Token: SeCreatePagefilePrivilege 1980 svchost.exe Token: SeTakeOwnershipPrivilege 3148 WaaSMedicAgent.exe Token: SeSecurityPrivilege 3148 WaaSMedicAgent.exe Token: SeRestorePrivilege 3148 WaaSMedicAgent.exe Token: SeBackupPrivilege 3148 WaaSMedicAgent.exe Token: SeShutdownPrivilege 836 svchost.exe Token: SeCreatePagefilePrivilege 836 svchost.exe Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeRestorePrivilege 1300 WerFault.exe Token: SeBackupPrivilege 1300 WerFault.exe Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeDebugPrivilege 1856 163D.exe Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeDebugPrivilege 4928 2E3C.exe Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeDebugPrivilege 3212 5C27.exe Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid process 3240 3240 3240 3240 3240 3240 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 3240 3240 3240 3240 3240 3240 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3240 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exesvchost.exe163D.exe1225.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 3568 wrote to memory of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 3568 wrote to memory of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 3568 wrote to memory of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 3568 wrote to memory of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 3568 wrote to memory of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 3568 wrote to memory of 1568 3568 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe 8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe PID 1980 wrote to memory of 2444 1980 svchost.exe MoUsoCoreWorker.exe PID 1980 wrote to memory of 2444 1980 svchost.exe MoUsoCoreWorker.exe PID 1980 wrote to memory of 1412 1980 svchost.exe MoUsoCoreWorker.exe PID 1980 wrote to memory of 1412 1980 svchost.exe MoUsoCoreWorker.exe PID 3240 wrote to memory of 1384 3240 1225.exe PID 3240 wrote to memory of 1384 3240 1225.exe PID 3240 wrote to memory of 1384 3240 1225.exe PID 3240 wrote to memory of 4628 3240 163D.exe PID 3240 wrote to memory of 4628 3240 163D.exe PID 3240 wrote to memory of 4628 3240 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 3240 wrote to memory of 568 3240 23CB.exe PID 3240 wrote to memory of 568 3240 23CB.exe PID 3240 wrote to memory of 568 3240 23CB.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 4628 wrote to memory of 1856 4628 163D.exe 163D.exe PID 1384 wrote to memory of 3500 1384 1225.exe 1225.exe PID 1384 wrote to memory of 3500 1384 1225.exe 1225.exe PID 1384 wrote to memory of 3500 1384 1225.exe 1225.exe PID 1384 wrote to memory of 3500 1384 1225.exe 1225.exe PID 1384 wrote to memory of 3500 1384 1225.exe 1225.exe PID 1384 wrote to memory of 3500 1384 1225.exe 1225.exe PID 3240 wrote to memory of 4928 3240 2E3C.exe PID 3240 wrote to memory of 4928 3240 2E3C.exe PID 3240 wrote to memory of 4928 3240 2E3C.exe PID 3240 wrote to memory of 2340 3240 3B3D.exe PID 3240 wrote to memory of 2340 3240 3B3D.exe PID 3240 wrote to memory of 2340 3240 3B3D.exe PID 2632 wrote to memory of 568 2632 WerFault.exe 23CB.exe PID 2632 wrote to memory of 568 2632 WerFault.exe 23CB.exe PID 3240 wrote to memory of 4384 3240 42B0.exe PID 3240 wrote to memory of 4384 3240 42B0.exe PID 3240 wrote to memory of 4384 3240 42B0.exe PID 3208 wrote to memory of 2340 3208 WerFault.exe 3B3D.exe PID 3208 wrote to memory of 2340 3208 WerFault.exe 3B3D.exe PID 3240 wrote to memory of 1908 3240 4A52.exe PID 3240 wrote to memory of 1908 3240 4A52.exe PID 3240 wrote to memory of 1908 3240 4A52.exe PID 2192 wrote to memory of 4384 2192 WerFault.exe 42B0.exe PID 2192 wrote to memory of 4384 2192 WerFault.exe 42B0.exe PID 3240 wrote to memory of 3216 3240 583E.exe PID 3240 wrote to memory of 3216 3240 583E.exe PID 3240 wrote to memory of 3216 3240 583E.exe PID 3240 wrote to memory of 3212 3240 5C27.exe PID 3240 wrote to memory of 3212 3240 5C27.exe PID 3240 wrote to memory of 3212 3240 5C27.exe PID 3240 wrote to memory of 2076 3240 635C.exe PID 3240 wrote to memory of 2076 3240 635C.exe PID 3240 wrote to memory of 2076 3240 635C.exe PID 2860 wrote to memory of 1908 2860 WerFault.exe 4A52.exe PID 2860 wrote to memory of 1908 2860 WerFault.exe 4A52.exe PID 3240 wrote to memory of 3284 3240 7D5D.exe PID 3240 wrote to memory of 3284 3240 7D5D.exe -
outlook_office_path 1 IoCs
Processes:
635C.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 635C.exe -
outlook_win_path 1 IoCs
Processes:
635C.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 635C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe"C:\Users\Admin\AppData\Local\Temp\8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe"C:\Users\Admin\AppData\Local\Temp\8694a45a295efd9a5114eca3c41fd4338e6ba029f497be4f66035ebf375cbd38.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1568
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv EJWqWBgKokG+t7Xaxpru4w.01⤵PID:4140
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv EJWqWBgKokG+t7Xaxpru4w.0.22⤵PID:2268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3084
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 707aeb6870ff9dd9acb8034b1b483156 EJWqWBgKokG+t7Xaxpru4w.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:2444
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:1412
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:3800
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 707aeb6870ff9dd9acb8034b1b483156 EJWqWBgKokG+t7Xaxpru4w.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:3836
-
C:\Users\Admin\AppData\Local\Temp\1225.exeC:\Users\Admin\AppData\Local\Temp\1225.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\1225.exeC:\Users\Admin\AppData\Local\Temp\1225.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3500
-
C:\Users\Admin\AppData\Local\Temp\163D.exeC:\Users\Admin\AppData\Local\Temp\163D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\163D.exeC:\Users\Admin\AppData\Local\Temp\163D.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
C:\Users\Admin\AppData\Local\Temp\23CB.exeC:\Users\Admin\AppData\Local\Temp\23CB.exe1⤵
- Executes dropped EXE
PID:568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
C:\Users\Admin\AppData\Local\Temp\2E3C.exeC:\Users\Admin\AppData\Local\Temp\2E3C.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
C:\Users\Admin\AppData\Local\Temp\3B3D.exeC:\Users\Admin\AppData\Local\Temp\3B3D.exe1⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 2362⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 568 -ip 5681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2632
-
C:\Users\Admin\AppData\Local\Temp\42B0.exeC:\Users\Admin\AppData\Local\Temp\42B0.exe1⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 3002⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2340 -ip 23401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3208
-
C:\Users\Admin\AppData\Local\Temp\4A52.exeC:\Users\Admin\AppData\Local\Temp\4A52.exe1⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4384 -ip 43841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2192
-
C:\Users\Admin\AppData\Local\Temp\583E.exeC:\Users\Admin\AppData\Local\Temp\583E.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3216
-
C:\Users\Admin\AppData\Local\Temp\5C27.exeC:\Users\Admin\AppData\Local\Temp\5C27.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
C:\Users\Admin\AppData\Local\Temp\635C.exeC:\Users\Admin\AppData\Local\Temp\635C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1908 -ip 19081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\7D5D.exeC:\Users\Admin\AppData\Local\Temp\7D5D.exe1⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"2⤵
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\3⤵PID:1440
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵PID:2916
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F3⤵
- Creates scheduled task(s)
PID:3564
-
C:\Users\Admin\AppData\Local\Temp\E9F7.exeC:\Users\Admin\AppData\Local\Temp\E9F7.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\EE8C.exeC:\Users\Admin\AppData\Local\Temp\EE8C.exe1⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 2562⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2860 -ip 28601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
MD5
e07da89fc7e325db9d25e845e27027a8
SHA14b6a03bcdb46f325984cbbb6302ff79f33637e19
SHA25694ab73c00494d10a2159175b81e23047621451e3a566e5a0b1222379db634aaf
SHA5121e33e34595ebb6ce129d0244199d29722c916c036da542c3001f84b10a964b96cec7a9fdd19e120d7840614b307b504be993a4f8538d54382aa4944575476dda
-
MD5
46688f6ec22bb95e2b114feab7524a0b
SHA1a8d385425c0101129f3031fdb463159fa9093b04
SHA2566bf3893c625b01899a59e2646e9c34f994e526ca799bf7eba24b069595f4d978
SHA5128689f78315811006ce98ae0ea46911d9d1d33e11769912578a1c58af8096f1a56873e32fed91b9d5614cd332590916300c4b4e47d118255f6be8af7c7ffa667b
-
MD5
46688f6ec22bb95e2b114feab7524a0b
SHA1a8d385425c0101129f3031fdb463159fa9093b04
SHA2566bf3893c625b01899a59e2646e9c34f994e526ca799bf7eba24b069595f4d978
SHA5128689f78315811006ce98ae0ea46911d9d1d33e11769912578a1c58af8096f1a56873e32fed91b9d5614cd332590916300c4b4e47d118255f6be8af7c7ffa667b
-
MD5
46688f6ec22bb95e2b114feab7524a0b
SHA1a8d385425c0101129f3031fdb463159fa9093b04
SHA2566bf3893c625b01899a59e2646e9c34f994e526ca799bf7eba24b069595f4d978
SHA5128689f78315811006ce98ae0ea46911d9d1d33e11769912578a1c58af8096f1a56873e32fed91b9d5614cd332590916300c4b4e47d118255f6be8af7c7ffa667b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
4e77860c3d327d661d481433cd7c2b7f
SHA127ec68f26eb1b36044d71a64d2d399b06d2248a4
SHA25648f51e29fc5411f2193d99ff98a4c6d9a6c92623125255442a0620e12993c747
SHA5127a3b2c56911e82f17bca41fc4260c81a8287244497e88e1bdb6017901a632402d796a0f207402ed3ca975d6c8d37f2575057829f0459ab9616efcefb274429ca
-
MD5
4e77860c3d327d661d481433cd7c2b7f
SHA127ec68f26eb1b36044d71a64d2d399b06d2248a4
SHA25648f51e29fc5411f2193d99ff98a4c6d9a6c92623125255442a0620e12993c747
SHA5127a3b2c56911e82f17bca41fc4260c81a8287244497e88e1bdb6017901a632402d796a0f207402ed3ca975d6c8d37f2575057829f0459ab9616efcefb274429ca
-
MD5
4e77860c3d327d661d481433cd7c2b7f
SHA127ec68f26eb1b36044d71a64d2d399b06d2248a4
SHA25648f51e29fc5411f2193d99ff98a4c6d9a6c92623125255442a0620e12993c747
SHA5127a3b2c56911e82f17bca41fc4260c81a8287244497e88e1bdb6017901a632402d796a0f207402ed3ca975d6c8d37f2575057829f0459ab9616efcefb274429ca
-
MD5
aa58d1f4f6f46fbde9cde947ee130ac1
SHA14d85d425431ee3413a115f80a9d6871c451b7148
SHA256d82cd9ccf5444a3429ffe98e69c5d54403cc61484646eb9902f7ca8b5686a561
SHA5129c1d9bceb7366a0f54b421eaca363b2543bdae10f3395fd16d5d254a0924ad51469a335b51ef1c732a5d7b045709bb99376b8de60d674b05511e041b0f710e2d
-
MD5
aa58d1f4f6f46fbde9cde947ee130ac1
SHA14d85d425431ee3413a115f80a9d6871c451b7148
SHA256d82cd9ccf5444a3429ffe98e69c5d54403cc61484646eb9902f7ca8b5686a561
SHA5129c1d9bceb7366a0f54b421eaca363b2543bdae10f3395fd16d5d254a0924ad51469a335b51ef1c732a5d7b045709bb99376b8de60d674b05511e041b0f710e2d
-
MD5
dd8a2cdd496f64590ff7d109578bcafb
SHA1af670c9d07a6c173b078208d59ee87a456008e98
SHA2568b0ce7f9bc14bd2a9d418ee89bd05157ebd1c624f5561194947cbc3e0af5debe
SHA512cd5c4d3cb2eff8cfa478ab008e5cdce47ac68da5894374c059df0c4ddb5352cd5930a0bbec71d706a3d00085126fc42eec0991db88f6474e0fdac2a8881fde25
-
MD5
20fe1450230d861579e323ffd7ba5485
SHA1971e83ba0ff1cbbdc9e1ac1ff6cd1c9ae38ce633
SHA2560cbd381e5c415c904ab13ab415f549b5b5711831fd20f46975c83fb4e03fc9e3
SHA512abf22e174d97ffe32dcaa14277e9f658e5e3c2d47c21efd40be2d645cb3639534cc22c73de59c83d0e9485fffe17e9064b40f953de42b8bd9d28da95d2ff753f
-
MD5
20fe1450230d861579e323ffd7ba5485
SHA1971e83ba0ff1cbbdc9e1ac1ff6cd1c9ae38ce633
SHA2560cbd381e5c415c904ab13ab415f549b5b5711831fd20f46975c83fb4e03fc9e3
SHA512abf22e174d97ffe32dcaa14277e9f658e5e3c2d47c21efd40be2d645cb3639534cc22c73de59c83d0e9485fffe17e9064b40f953de42b8bd9d28da95d2ff753f
-
MD5
047b7730310a945e1a587c5395c0638a
SHA1685e18a8f11c49fcd2829cd79fb4acdcd254f2fa
SHA2564ecf8f85d92f0d00fe80c0c8f7140888f8804b4834b94472960067fa54584a79
SHA512f3ad7a1cdb85c051a6fcd0fa415c242bf77bf9ee9ce4f571ecb16d4f28292e0f1ccf6d84ea9db0b71a88ecb0bc3946df6ac77526dfd7f3054f3c68a8ebc49120
-
MD5
047b7730310a945e1a587c5395c0638a
SHA1685e18a8f11c49fcd2829cd79fb4acdcd254f2fa
SHA2564ecf8f85d92f0d00fe80c0c8f7140888f8804b4834b94472960067fa54584a79
SHA512f3ad7a1cdb85c051a6fcd0fa415c242bf77bf9ee9ce4f571ecb16d4f28292e0f1ccf6d84ea9db0b71a88ecb0bc3946df6ac77526dfd7f3054f3c68a8ebc49120
-
MD5
5096b9646917d070cccc8bf7877f21f9
SHA1df654bb126cb97eb3342790a2b8cf67d2cc28206
SHA256249f07e35d8da87e6641d39687bda3fb4cc02ab62c0bbb47537eddce26888a9c
SHA512aa4065d7ce98d093fa1e1b0a20d4b6b0d49240593883da004845f508e978b22aa223649387a2dc8a774c1bdc5ba2c87057dc3c584ba8d379e22296089391b958
-
MD5
5096b9646917d070cccc8bf7877f21f9
SHA1df654bb126cb97eb3342790a2b8cf67d2cc28206
SHA256249f07e35d8da87e6641d39687bda3fb4cc02ab62c0bbb47537eddce26888a9c
SHA512aa4065d7ce98d093fa1e1b0a20d4b6b0d49240593883da004845f508e978b22aa223649387a2dc8a774c1bdc5ba2c87057dc3c584ba8d379e22296089391b958
-
MD5
57b5f410bba704152ed728ae30b26665
SHA1755da63fac5d2f95d600253a0a94e4d19c62eb96
SHA2562dbeea7c52d13a743dbdbdde06da28d1616ea6b1d765684fd3ec1a8f44040269
SHA512670a23161098b3c990f5c1c07ad86cb3fb14a61a62460f2e016d660331c07353a809ed5da92fa32e0e1d84512d8325fa3ecc896c0c2c10e1e8a6762a34cc416c
-
MD5
42161cff637993d514d1cc15ad5229af
SHA103ae4b56ba6f0fa6612d45f1f336fcc059d76178
SHA25666a92814d6e3eab407e0c49e9dd10a21b093dbd79e7b3dd2c89367c94658e3f3
SHA512722eeb2176d94254edf52a32ecd95eede02e0c518d924059520471e4232626b76041f9e6dcc586a8abc5a632ed013891c3dd92264cf891131a08d1baa0cadc8d
-
MD5
42161cff637993d514d1cc15ad5229af
SHA103ae4b56ba6f0fa6612d45f1f336fcc059d76178
SHA25666a92814d6e3eab407e0c49e9dd10a21b093dbd79e7b3dd2c89367c94658e3f3
SHA512722eeb2176d94254edf52a32ecd95eede02e0c518d924059520471e4232626b76041f9e6dcc586a8abc5a632ed013891c3dd92264cf891131a08d1baa0cadc8d
-
MD5
9dcec4cd98534038775474bedc66a237
SHA137c4e6955d492ba77b8b3101a46c0d9056a1620d
SHA2569b7927979f7205cc87f772dafa96ab34b9914c205f42a18de80d7eaec8bb9871
SHA51284c5d078c10fd1912004c98535096f16a8ffcd25f0387037ebc6482d1d6b501a455c5e59f5774b14f142d6222c6930f1a65cd923e89e865fc4a5c2a5d600ad01
-
MD5
61ac16369c6228d0e762519946fae610
SHA1851bff728927da7f5245488c5abb9b7787b0fa85
SHA2569ab460a5a88fb1c145c85a43bb56211c9209d650d25318f128a6a7f429b6bf45
SHA512c9c5d689e86dfec882fa43d183d176b6cbec36a205c8ab53352f0c6c73b202472fe80f0324a741b220331a7273e5ac68fdcc4f199560d50c865739fa51ad2aad
-
MD5
61ac16369c6228d0e762519946fae610
SHA1851bff728927da7f5245488c5abb9b7787b0fa85
SHA2569ab460a5a88fb1c145c85a43bb56211c9209d650d25318f128a6a7f429b6bf45
SHA512c9c5d689e86dfec882fa43d183d176b6cbec36a205c8ab53352f0c6c73b202472fe80f0324a741b220331a7273e5ac68fdcc4f199560d50c865739fa51ad2aad
-
MD5
9dcec4cd98534038775474bedc66a237
SHA137c4e6955d492ba77b8b3101a46c0d9056a1620d
SHA2569b7927979f7205cc87f772dafa96ab34b9914c205f42a18de80d7eaec8bb9871
SHA51284c5d078c10fd1912004c98535096f16a8ffcd25f0387037ebc6482d1d6b501a455c5e59f5774b14f142d6222c6930f1a65cd923e89e865fc4a5c2a5d600ad01
-
MD5
9dcec4cd98534038775474bedc66a237
SHA137c4e6955d492ba77b8b3101a46c0d9056a1620d
SHA2569b7927979f7205cc87f772dafa96ab34b9914c205f42a18de80d7eaec8bb9871
SHA51284c5d078c10fd1912004c98535096f16a8ffcd25f0387037ebc6482d1d6b501a455c5e59f5774b14f142d6222c6930f1a65cd923e89e865fc4a5c2a5d600ad01
-
MD5
696f26fdbaef21828cfb490c33a88e20
SHA102e7c5b4abc64177eccfe3678becbfe65f71d550
SHA256b793664decfade077601c56fb60a41f9d1f55fb29cc51653bf8a6131536648d0
SHA51277ebaacd90c606ef80226376d9cec9557c3669d4805c24b8bc0d4b3a04aa28003ec1983653199ab8cea1dc7af9d0b047fb9084da3fd977bdc4dd0f59310742cb
-
MD5
25a398ade67d1eb9974db341f4139a5b
SHA10fe163a25dc0c280fd334576605d0b988b8b5396
SHA2567f5b4e168ef2a2cf6e339400752a2e3c12afeecb355fc5507b7db36cb70ec910
SHA512e631adf0b0dbc126000d7662e1a89d2f53dd32e53337df09ce752f4cd9f064a1b6321eb0fdbf9f84776c856680ad555b6cf64d4a09ad9483e4058f7f1f539ca7
-
MD5
25a398ade67d1eb9974db341f4139a5b
SHA10fe163a25dc0c280fd334576605d0b988b8b5396
SHA2567f5b4e168ef2a2cf6e339400752a2e3c12afeecb355fc5507b7db36cb70ec910
SHA512e631adf0b0dbc126000d7662e1a89d2f53dd32e53337df09ce752f4cd9f064a1b6321eb0fdbf9f84776c856680ad555b6cf64d4a09ad9483e4058f7f1f539ca7