Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10_x64 -
resource
win10-ja-20210920 -
submitted
11-10-2021 06:33
Static task
static1
Behavioral task
behavioral1
Sample
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe
Resource
win10-en-20210920
Behavioral task
behavioral4
Sample
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe
Resource
win10-ja-20210920
General
-
Target
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe
-
Size
557KB
-
MD5
513d95f880ef4b0522a50c4374e40f1f
-
SHA1
b89d35ab5f89a5c984ea7d4a46ced8e1603a866b
-
SHA256
a28d456ec326f62b15dc6257859619c1a2dc6817f332adb9c87fbb146676dc00
-
SHA512
922d8d138fdf2dfb77770697c57def5973d07a4d64fe5d7effeee30987330dd2611b97cb9df8da78d0cb42a35673800224fd49b6fe44f4c4f0e38dd00a6eb750
Malware Config
Extracted
warzonerat
176.126.86.243:2021
Signatures
-
Registers COM server for autorun 1 TTPs
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\for 176.126.86.243.exe warzonerat C:\Users\Admin\AppData\Local\Temp\for 176.126.86.243.exe warzonerat C:\ProgramData\microsoftupdate.exe warzonerat C:\ProgramData\microsoftupdate.exe warzonerat -
Executes dropped EXE 3 IoCs
Processes:
for 176.126.86.243.exeBTC STEALER.exemicrosoftupdate.exepid process 4388 for 176.126.86.243.exe 2760 BTC STEALER.exe 3880 microsoftupdate.exe -
Drops startup file 1 IoCs
Processes:
BTC STEALER.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdater.lnk BTC STEALER.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
for 176.126.86.243.exeBTC STEALER.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\windowsdefender = "C:\\ProgramData\\microsoftupdate.exe" for 176.126.86.243.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdater = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\BTC STEALER.exe\" .." BTC STEALER.exe -
Processes:
BTC STEALER.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BTC STEALER.exe -
Drops file in System32 directory 4 IoCs
Processes:
OfficeC2RClient.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-wal OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-shm OfficeC2RClient.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exedescription pid process target process PID 3924 set thread context of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 23 IoCs
Processes:
OfficeC2RClient.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,17110988,7153487,39965824,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,941 10,1329 15,941 15,941 6,1329 100,1329 6" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe -
Modifies registry class 44 IoCs
Processes:
FileSyncConfig.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\FolderValueFlags = "40" FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DEFAULTICON FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INPROCSERVER32 FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\TargetKnownFolder = "{a52bba46-e9e1-435f-b3d9-28daa648c0f6}" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\System.IsPinnedToNameSpaceTree = "1" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SHELLFOLDER FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\CLSID = "{0E5AAE11-A475-4c5b-AB00-C66DE400274E}" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32\ = "%systemroot%\\system32\\shell32.dll" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe,0" FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INSTANCE\INITPROPERTYBAG FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32 FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32\ = "%systemroot%\\SysWow64\\shell32.dll" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\TargetKnownFolder = "{a52bba46-e9e1-435f-b3d9-28daa648c0f6}" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INSTANCE\INITPROPERTYBAG FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SHELLFOLDER FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ = "OneDrive" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\System.IsPinnedToNameSpaceTree = "1" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SortOrderIndex = "66" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\Attributes = "4034920525" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\Attributes = "17" FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SortOrderIndex = "66" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32 FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INPROCSERVER32 FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\Attributes = "17" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\Attributes = "4034920525" FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DEFAULTICON FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe,0" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\FolderValueFlags = "40" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\CLSID = "{0E5AAE11-A475-4c5b-AB00-C66DE400274E}" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ = "OneDrive" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder FileSyncConfig.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exepid process 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exedescription pid process Token: SeDebugPrivilege 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OfficeC2RClient.exepid process 3168 OfficeC2RClient.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exeSECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exefor 176.126.86.243.exemicrosoftupdate.exedescription pid process target process PID 3924 wrote to memory of 1400 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe schtasks.exe PID 3924 wrote to memory of 1400 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe schtasks.exe PID 3924 wrote to memory of 1400 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe schtasks.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 3924 wrote to memory of 1436 3924 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe PID 1436 wrote to memory of 4388 1436 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe for 176.126.86.243.exe PID 1436 wrote to memory of 4388 1436 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe for 176.126.86.243.exe PID 1436 wrote to memory of 4388 1436 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe for 176.126.86.243.exe PID 1436 wrote to memory of 2760 1436 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe BTC STEALER.exe PID 1436 wrote to memory of 2760 1436 SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe BTC STEALER.exe PID 4388 wrote to memory of 3880 4388 for 176.126.86.243.exe microsoftupdate.exe PID 4388 wrote to memory of 3880 4388 for 176.126.86.243.exe microsoftupdate.exe PID 4388 wrote to memory of 3880 4388 for 176.126.86.243.exe microsoftupdate.exe PID 3880 wrote to memory of 3628 3880 microsoftupdate.exe cmd.exe PID 3880 wrote to memory of 3628 3880 microsoftupdate.exe cmd.exe PID 3880 wrote to memory of 3628 3880 microsoftupdate.exe cmd.exe PID 3880 wrote to memory of 3628 3880 microsoftupdate.exe cmd.exe PID 3880 wrote to memory of 3628 3880 microsoftupdate.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe"C:\Users\Admin\AppData\Local\Temp\SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qHBYWHQISskoYw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA535.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe"C:\Users\Admin\AppData\Local\Temp\SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\for 176.126.86.243.exe"C:\Users\Admin\AppData\Local\Temp\for 176.126.86.243.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\microsoftupdate.exe"C:\ProgramData\microsoftupdate.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\BTC STEALER.exe"C:\Users\Admin\AppData\Local\Temp\BTC STEALER.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.180.0905.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.180.0905.0007\FileSyncConfig.exe"1⤵
- Modifies registry class
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\microsoftupdate.exeMD5
bd5f146a5f4796e27868d4ca83dae4ee
SHA1cfa2a086c52c94d387c0ab19b514881b47ab4490
SHA256066c455fdfc44d36695e2e0a97c41c25e8d2d21a90576f649159b16af4ffd860
SHA5125f2cfffde1a60fc3810330304611c39b8350fdc7b87e5e0e2a4186647ab8a68ca23cd5259bc3672db0c3505ff9fcccad5797f511531a7eabc6bc56b705e129a4
-
C:\ProgramData\microsoftupdate.exeMD5
bd5f146a5f4796e27868d4ca83dae4ee
SHA1cfa2a086c52c94d387c0ab19b514881b47ab4490
SHA256066c455fdfc44d36695e2e0a97c41c25e8d2d21a90576f649159b16af4ffd860
SHA5125f2cfffde1a60fc3810330304611c39b8350fdc7b87e5e0e2a4186647ab8a68ca23cd5259bc3672db0c3505ff9fcccad5797f511531a7eabc6bc56b705e129a4
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SECOND-STATEMENT OF ACCOUNT_2021-10-04989829.bat.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
C:\Users\Admin\AppData\Local\Temp\BTC STEALER.exeMD5
2c97c34c375bd1fe92a6ff4c272c2096
SHA1af1b4c20af78ce0247d69a8bddaa6234a02692ef
SHA256321c0146561f0448a08d290535bdcc7e8fb606648ab6b5be5330e7fdc2866427
SHA51299b9599a27b151a5c8cf960feb9c1696312a8b3c4f1397744c6d6891af773fc5708acac9ddad8a968ef0badb7f5905eddd2a3c75d3d5170ad33bbf5012904235
-
C:\Users\Admin\AppData\Local\Temp\BTC STEALER.exeMD5
2c97c34c375bd1fe92a6ff4c272c2096
SHA1af1b4c20af78ce0247d69a8bddaa6234a02692ef
SHA256321c0146561f0448a08d290535bdcc7e8fb606648ab6b5be5330e7fdc2866427
SHA51299b9599a27b151a5c8cf960feb9c1696312a8b3c4f1397744c6d6891af773fc5708acac9ddad8a968ef0badb7f5905eddd2a3c75d3d5170ad33bbf5012904235
-
C:\Users\Admin\AppData\Local\Temp\for 176.126.86.243.exeMD5
bd5f146a5f4796e27868d4ca83dae4ee
SHA1cfa2a086c52c94d387c0ab19b514881b47ab4490
SHA256066c455fdfc44d36695e2e0a97c41c25e8d2d21a90576f649159b16af4ffd860
SHA5125f2cfffde1a60fc3810330304611c39b8350fdc7b87e5e0e2a4186647ab8a68ca23cd5259bc3672db0c3505ff9fcccad5797f511531a7eabc6bc56b705e129a4
-
C:\Users\Admin\AppData\Local\Temp\for 176.126.86.243.exeMD5
bd5f146a5f4796e27868d4ca83dae4ee
SHA1cfa2a086c52c94d387c0ab19b514881b47ab4490
SHA256066c455fdfc44d36695e2e0a97c41c25e8d2d21a90576f649159b16af4ffd860
SHA5125f2cfffde1a60fc3810330304611c39b8350fdc7b87e5e0e2a4186647ab8a68ca23cd5259bc3672db0c3505ff9fcccad5797f511531a7eabc6bc56b705e129a4
-
memory/1400-125-0x0000000000000000-mapping.dmp
-
memory/1436-127-0x000000000042E77E-mapping.dmp
-
memory/1436-126-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1436-132-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/2760-136-0x0000000000000000-mapping.dmp
-
memory/2760-139-0x00000000007E0000-0x00000000007E2000-memory.dmpFilesize
8KB
-
memory/2760-144-0x00000000007E2000-0x00000000007E4000-memory.dmpFilesize
8KB
-
memory/3628-145-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/3628-143-0x0000000000000000-mapping.dmp
-
memory/3880-140-0x0000000000000000-mapping.dmp
-
memory/3924-123-0x0000000008080000-0x00000000080D3000-memory.dmpFilesize
332KB
-
memory/3924-115-0x0000000000700000-0x0000000000701000-memory.dmpFilesize
4KB
-
memory/3924-119-0x0000000004FA0000-0x000000000549E000-memory.dmpFilesize
5.0MB
-
memory/3924-124-0x00000000083A0000-0x00000000083A1000-memory.dmpFilesize
4KB
-
memory/3924-122-0x0000000005270000-0x000000000527A000-memory.dmpFilesize
40KB
-
memory/3924-118-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/3924-117-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/3924-120-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/3924-121-0x0000000007FE0000-0x0000000007FE1000-memory.dmpFilesize
4KB
-
memory/4388-133-0x0000000000000000-mapping.dmp