Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-10-2021 09:56
Static task
static1
Behavioral task
behavioral1
Sample
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe
Resource
win10v20210408
General
-
Target
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe
-
Size
175KB
-
MD5
16dac496ddda6108f8a0a5f5c29f777f
-
SHA1
9fc6750104fac8148800c9144aeee4e52a491b02
-
SHA256
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb
-
SHA512
f67a5a40f04e76d763257567105409d06e7c08b5426f0bd24886d54e6187c9e5d35549cae80b2af81852b4da773e0e53606e4ff268edaaf034c16113a3e88638
Malware Config
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Extracted
redline
159
190.2.136.29:3279
Extracted
redline
w1
109.234.34.165:12323
Extracted
raccoon
1.8.2
8d179b9e611eee525425544ee8c6d77360ab7cd9
-
url4cnc
http://teletop.top/agrybirdsgamerept
http://teleta.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3764-150-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3764-158-0x000000000041B222-mapping.dmp family_redline behavioral1/memory/3536-159-0x0000000000750000-0x0000000000781000-memory.dmp family_redline behavioral1/memory/3536-168-0x0000000002760000-0x000000000277C000-memory.dmp family_redline behavioral1/memory/3764-183-0x0000000004DD0000-0x00000000053D6000-memory.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1224-123-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei behavioral1/memory/1224-125-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei behavioral1/memory/1224-126-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei behavioral1/memory/1224-130-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
F860.exeFDFE.exe9E6.exe1224.exe1AE0.exe2F82.exe475362202.exe475362202.exefodhelper.exefodhelper.exepid Process 1224 F860.exe 2980 FDFE.exe 2648 9E6.exe 952 1224.exe 3536 1AE0.exe 792 2F82.exe 1932 475362202.exe 1648 475362202.exe 1356 fodhelper.exe 3488 fodhelper.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
F860.exe9E6.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F860.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F860.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9E6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9E6.exe -
Deletes itself 1 IoCs
Processes:
pid Process 2428 -
Loads dropped DLL 3 IoCs
Processes:
F860.exepid Process 1224 F860.exe 1224 F860.exe 1224 F860.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x00050000000155fd-132.dat themida behavioral1/memory/2648-137-0x0000000001360000-0x0000000001361000-memory.dmp themida behavioral1/files/0x00050000000155fd-1160.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
9E6.exeF860.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9E6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F860.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
F860.exe9E6.exepid Process 1224 F860.exe 2648 9E6.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exeFDFE.exe475362202.exefodhelper.exedescription pid Process procid_target PID 632 set thread context of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 2980 set thread context of 3764 2980 FDFE.exe 83 PID 1932 set thread context of 1648 1932 475362202.exe 92 PID 1356 set thread context of 3488 1356 fodhelper.exe 119 -
Drops file in Windows directory 8 IoCs
Processes:
powershell.exedescription ioc Process File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3256 1224 WerFault.exe 74 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3556 schtasks.exe 3896 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exepid Process 2080 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 2080 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 2428 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 2428 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 616 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exepid Process 2080 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exe1AE0.exe9E6.exeRegSvcs.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeRestorePrivilege 3256 WerFault.exe Token: SeBackupPrivilege 3256 WerFault.exe Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeDebugPrivilege 3256 WerFault.exe Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeDebugPrivilege 3536 1AE0.exe Token: SeDebugPrivilege 2648 9E6.exe Token: SeDebugPrivilege 3764 RegSvcs.exe Token: SeDebugPrivilege 3580 powershell.exe Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 1652 powershell.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeShutdownPrivilege 2428 Token: SeCreatePagefilePrivilege 2428 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid Process 2428 2428 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid Process 2428 2428 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 2428 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exeFDFE.exe2F82.exe1AE0.exe475362202.exepowershell.execsc.exe475362202.exedescription pid Process procid_target PID 632 wrote to memory of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 632 wrote to memory of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 632 wrote to memory of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 632 wrote to memory of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 632 wrote to memory of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 632 wrote to memory of 2080 632 2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe 72 PID 2428 wrote to memory of 1224 2428 74 PID 2428 wrote to memory of 1224 2428 74 PID 2428 wrote to memory of 1224 2428 74 PID 2428 wrote to memory of 2980 2428 76 PID 2428 wrote to memory of 2980 2428 76 PID 2428 wrote to memory of 2980 2428 76 PID 2428 wrote to memory of 2648 2428 78 PID 2428 wrote to memory of 2648 2428 78 PID 2428 wrote to memory of 2648 2428 78 PID 2428 wrote to memory of 952 2428 80 PID 2428 wrote to memory of 952 2428 80 PID 2428 wrote to memory of 952 2428 80 PID 2980 wrote to memory of 3764 2980 FDFE.exe 83 PID 2980 wrote to memory of 3764 2980 FDFE.exe 83 PID 2980 wrote to memory of 3764 2980 FDFE.exe 83 PID 2980 wrote to memory of 3764 2980 FDFE.exe 83 PID 2428 wrote to memory of 3536 2428 84 PID 2428 wrote to memory of 3536 2428 84 PID 2428 wrote to memory of 3536 2428 84 PID 2980 wrote to memory of 3764 2980 FDFE.exe 83 PID 2428 wrote to memory of 792 2428 87 PID 2428 wrote to memory of 792 2428 87 PID 2428 wrote to memory of 792 2428 87 PID 792 wrote to memory of 3580 792 2F82.exe 88 PID 792 wrote to memory of 3580 792 2F82.exe 88 PID 792 wrote to memory of 3580 792 2F82.exe 88 PID 3536 wrote to memory of 1932 3536 1AE0.exe 90 PID 3536 wrote to memory of 1932 3536 1AE0.exe 90 PID 3536 wrote to memory of 1932 3536 1AE0.exe 90 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 3580 wrote to memory of 1356 3580 powershell.exe 93 PID 3580 wrote to memory of 1356 3580 powershell.exe 93 PID 3580 wrote to memory of 1356 3580 powershell.exe 93 PID 1356 wrote to memory of 1260 1356 csc.exe 94 PID 1356 wrote to memory of 1260 1356 csc.exe 94 PID 1356 wrote to memory of 1260 1356 csc.exe 94 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1932 wrote to memory of 1648 1932 475362202.exe 92 PID 1648 wrote to memory of 3556 1648 475362202.exe 95 PID 1648 wrote to memory of 3556 1648 475362202.exe 95 PID 1648 wrote to memory of 3556 1648 475362202.exe 95 PID 3580 wrote to memory of 2596 3580 powershell.exe 97 PID 3580 wrote to memory of 2596 3580 powershell.exe 97 PID 3580 wrote to memory of 2596 3580 powershell.exe 97 PID 3580 wrote to memory of 1652 3580 powershell.exe 99 PID 3580 wrote to memory of 1652 3580 powershell.exe 99 PID 3580 wrote to memory of 1652 3580 powershell.exe 99 PID 3580 wrote to memory of 964 3580 powershell.exe 101 PID 3580 wrote to memory of 964 3580 powershell.exe 101 PID 3580 wrote to memory of 964 3580 powershell.exe 101 PID 3580 wrote to memory of 2068 3580 powershell.exe 103 PID 3580 wrote to memory of 2068 3580 powershell.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe"C:\Users\Admin\AppData\Local\Temp\2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe"C:\Users\Admin\AppData\Local\Temp\2ce71601fa23b3340d351bcf4a7ce45ba8c207df3be62146f987fba298b05bfb.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\F860.exeC:\Users\Admin\AppData\Local\Temp\F860.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 12642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\FDFE.exeC:\Users\Admin\AppData\Local\Temp\FDFE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\9E6.exeC:\Users\Admin\AppData\Local\Temp\9E6.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
C:\Users\Admin\AppData\Local\Temp\1224.exeC:\Users\Admin\AppData\Local\Temp\1224.exe1⤵
- Executes dropped EXE
PID:952
-
C:\Users\Admin\AppData\Local\Temp\1AE0.exeC:\Users\Admin\AppData\Local\Temp\1AE0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\475362202.exe"C:\Users\Admin\AppData\Local\Temp\475362202.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\475362202.exeC:\Users\Admin\AppData\Local\Temp\475362202.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"4⤵
- Creates scheduled task(s)
PID:3556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F82.exeC:\Users\Admin\AppData\Local\Temp\2F82.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rudw1t01\rudw1t01.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6571.tmp" "c:\Users\Admin\AppData\Local\Temp\rudw1t01\CSC5D483C6DF943CB8D111B916C7B4922.TMP"4⤵PID:1260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:1220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1540
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:2532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:340
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:1344
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:3064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:648
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:1612
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:3068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1772
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:380
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exeC:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1356 -
C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exeC:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe2⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"3⤵
- Creates scheduled task(s)
PID:3896
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f3068198b62b4b70404ec46694d632be
SHA17b0b31ae227cf2a78cb751573a9d07f755104ea0
SHA256bd0fab28319be50795bd6aa9692742ba12539b136036acce2e0403f10a779fc8
SHA512ef285a93898a9436219540f247beb52da69242d05069b3f50d1761bb956ebb8468aeaeadcb87dd7a09f5039c479a31f313c83c4a63c2b2f789f1fe55b4fa9795
-
MD5
fca0bfc8b0d37eab0b75c773882c8c0c
SHA15791c1090645b42575d0100e97c56d444406c194
SHA256e8dfe564f572301aa67110c28d0d6850133705a72f6ada7e96c16a65aa3d8da2
SHA512d6a91a7223ffa99cdf0ed8a56dda350ffd5982f2b1da521ade028ccb097e4014ef0ac2a8546896f5ecb7be23346a8add5e61e0dc0ecc8a9471596045ee8b7b7c
-
MD5
fca0bfc8b0d37eab0b75c773882c8c0c
SHA15791c1090645b42575d0100e97c56d444406c194
SHA256e8dfe564f572301aa67110c28d0d6850133705a72f6ada7e96c16a65aa3d8da2
SHA512d6a91a7223ffa99cdf0ed8a56dda350ffd5982f2b1da521ade028ccb097e4014ef0ac2a8546896f5ecb7be23346a8add5e61e0dc0ecc8a9471596045ee8b7b7c
-
MD5
f5c4d463115dc020d5ec1756da0258a0
SHA1b66eb6992d7c0191d1255ae0ada35b6403221425
SHA256fa0bcd10cdc9df5fe9806e16a933d71d49c93fb6b21e75e2215bb728212b570e
SHA512854bbe52abf339b75e68c20aef0b905fb29c4c2580a44b957b6d6b02889b78a44f6605a2e45f61f358b7b63d3530b61f6bad513f0672bcef06268d9ea1c55350
-
MD5
f5c4d463115dc020d5ec1756da0258a0
SHA1b66eb6992d7c0191d1255ae0ada35b6403221425
SHA256fa0bcd10cdc9df5fe9806e16a933d71d49c93fb6b21e75e2215bb728212b570e
SHA512854bbe52abf339b75e68c20aef0b905fb29c4c2580a44b957b6d6b02889b78a44f6605a2e45f61f358b7b63d3530b61f6bad513f0672bcef06268d9ea1c55350
-
MD5
2686d02fd6a82432c2bbfccdf7f334de
SHA175c80a6877c6e0724d19de0f5149bed186760e27
SHA25635270b20b568beb5f844e1b8c9bfe53498cfbac02633a9cb3ca5927a2cba4e4d
SHA51222333918e2fed9e39c967313f77844b6bc4f3a2dbfe97223c08def7b80057b7c89f5b75460575172e99c11ee2b824c66e4417588a12ae6a314968c2a34d01698
-
MD5
2686d02fd6a82432c2bbfccdf7f334de
SHA175c80a6877c6e0724d19de0f5149bed186760e27
SHA25635270b20b568beb5f844e1b8c9bfe53498cfbac02633a9cb3ca5927a2cba4e4d
SHA51222333918e2fed9e39c967313f77844b6bc4f3a2dbfe97223c08def7b80057b7c89f5b75460575172e99c11ee2b824c66e4417588a12ae6a314968c2a34d01698
-
MD5
db70c7f42b07a25fd11e7d0e43816a9f
SHA11a0bea42f1ee93890edb81b45a6e96398348fe0e
SHA256de340912baa570a143d025279595ce8cc66ca7d43a24ba6e2ebdb729649b06f0
SHA5124af3c634444f6337471c57a843384c5eb08b6ef2d0e8850d61df46ce441d4e6789fd3b2bf4c6d048284e143a212530eb9833d8bd123ab7f48d506702f35bc119
-
MD5
db70c7f42b07a25fd11e7d0e43816a9f
SHA11a0bea42f1ee93890edb81b45a6e96398348fe0e
SHA256de340912baa570a143d025279595ce8cc66ca7d43a24ba6e2ebdb729649b06f0
SHA5124af3c634444f6337471c57a843384c5eb08b6ef2d0e8850d61df46ce441d4e6789fd3b2bf4c6d048284e143a212530eb9833d8bd123ab7f48d506702f35bc119
-
MD5
db70c7f42b07a25fd11e7d0e43816a9f
SHA11a0bea42f1ee93890edb81b45a6e96398348fe0e
SHA256de340912baa570a143d025279595ce8cc66ca7d43a24ba6e2ebdb729649b06f0
SHA5124af3c634444f6337471c57a843384c5eb08b6ef2d0e8850d61df46ce441d4e6789fd3b2bf4c6d048284e143a212530eb9833d8bd123ab7f48d506702f35bc119
-
MD5
e76fbeba883358d5b660b3aacbc59836
SHA11d7049647a7b1bf008c12fa17e2c27832b215bd8
SHA2567f061b78c4b3cba6950bbb540a6c1595c45a1318f662d196647e77c01d027e2d
SHA512eb983832a6fdd98a7829439934e087aee69dfdfcca7f22104b69061399033bc73c0a363ffaf303fba81bebef03087ba8500dbed2fea265f8973d9358aa6103cb
-
MD5
e76fbeba883358d5b660b3aacbc59836
SHA11d7049647a7b1bf008c12fa17e2c27832b215bd8
SHA2567f061b78c4b3cba6950bbb540a6c1595c45a1318f662d196647e77c01d027e2d
SHA512eb983832a6fdd98a7829439934e087aee69dfdfcca7f22104b69061399033bc73c0a363ffaf303fba81bebef03087ba8500dbed2fea265f8973d9358aa6103cb
-
MD5
86f28c786f513a1d3c770dfea2aee499
SHA12666a98deab2188f1ea43c02f2cdcc7cf29eb3a3
SHA2565f839b5ecfb8b2a57eb7023a640bba23ed8c95791be439ab3f121a6ced0bb6cf
SHA512e8affa29834e1e660e0e0ab6c67c301040e1b9e026355cf5b8a71551440a19950d32b7bf70cfdf7e11aae21e9fc902f9673938179abd1d891461c7631af62caf
-
MD5
86f28c786f513a1d3c770dfea2aee499
SHA12666a98deab2188f1ea43c02f2cdcc7cf29eb3a3
SHA2565f839b5ecfb8b2a57eb7023a640bba23ed8c95791be439ab3f121a6ced0bb6cf
SHA512e8affa29834e1e660e0e0ab6c67c301040e1b9e026355cf5b8a71551440a19950d32b7bf70cfdf7e11aae21e9fc902f9673938179abd1d891461c7631af62caf
-
MD5
1eba0d5807acd00840d7f0a897d3d00e
SHA1fd06e6d1fd068ba5a6a40c5a4324d0a4192c847f
SHA256c17316ca6d248f467b2aa44bc67d2ca32040a35864ef0c0c10446d5bd5c6ff18
SHA512a9a2111a6355a2794a02ec7eebb302ece4e56802d5abc357f0ae6e30c9422786102511db7da4481cc4781bda6469a1d14cc67b3646a04c242755b1bda1c51740
-
MD5
1eba0d5807acd00840d7f0a897d3d00e
SHA1fd06e6d1fd068ba5a6a40c5a4324d0a4192c847f
SHA256c17316ca6d248f467b2aa44bc67d2ca32040a35864ef0c0c10446d5bd5c6ff18
SHA512a9a2111a6355a2794a02ec7eebb302ece4e56802d5abc357f0ae6e30c9422786102511db7da4481cc4781bda6469a1d14cc67b3646a04c242755b1bda1c51740
-
MD5
e25ddaedd61d9aa1b4bf9960db86105a
SHA198eea302a5573a220fb6472d822101ff9251672f
SHA25606b910ec98505eace68c708de8453d02df41e3b760b90f7b8a4e452c18bbc087
SHA512747a5540767a706cfae90226f653376010b3485e1a404b08558af40192c4f7766aefd9e5d4d8568b6402bbe0faadc679bcc9e6fb265f39719219ab8dda99409d
-
MD5
794bf0ae26a7efb0c516cf4a7692c501
SHA1c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2
SHA25697753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825
SHA51220c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
6213cf02c9bffbfafb6a202f793f1c2d
SHA1d0de4935259ec18b09a718ce7eec81db46b33e09
SHA256e8ef7d876af1c96d132336df90c545c47de119b22e0330678b966138fb36b3e1
SHA512a8f83eb3051aa9846cd7a8950f4f22c17ed4d2b3ca0dfe0c467da7b81640fc1f63fa2c1eaa248d7bb10c12b8d7071be93279193818184ec1a323356e94e273f7
-
MD5
db70c7f42b07a25fd11e7d0e43816a9f
SHA11a0bea42f1ee93890edb81b45a6e96398348fe0e
SHA256de340912baa570a143d025279595ce8cc66ca7d43a24ba6e2ebdb729649b06f0
SHA5124af3c634444f6337471c57a843384c5eb08b6ef2d0e8850d61df46ce441d4e6789fd3b2bf4c6d048284e143a212530eb9833d8bd123ab7f48d506702f35bc119
-
MD5
db70c7f42b07a25fd11e7d0e43816a9f
SHA11a0bea42f1ee93890edb81b45a6e96398348fe0e
SHA256de340912baa570a143d025279595ce8cc66ca7d43a24ba6e2ebdb729649b06f0
SHA5124af3c634444f6337471c57a843384c5eb08b6ef2d0e8850d61df46ce441d4e6789fd3b2bf4c6d048284e143a212530eb9833d8bd123ab7f48d506702f35bc119
-
MD5
db70c7f42b07a25fd11e7d0e43816a9f
SHA11a0bea42f1ee93890edb81b45a6e96398348fe0e
SHA256de340912baa570a143d025279595ce8cc66ca7d43a24ba6e2ebdb729649b06f0
SHA5124af3c634444f6337471c57a843384c5eb08b6ef2d0e8850d61df46ce441d4e6789fd3b2bf4c6d048284e143a212530eb9833d8bd123ab7f48d506702f35bc119
-
MD5
6ddb2643bcce7d17da5a2d87379bd4f0
SHA13d7fccbc1fe6c1c469afd014bbfacb546acf2024
SHA256b973a3f5eae71cf88246161bd668e7d3d4e2db3cc41639e90f194d4952dd5c1c
SHA51249bf7303922830e87441025d098092684c8ce91f9973ea61f4ffc8bdd2980add06cadd91d145b0cc35ff2de3206a40ea796b2b545acb0b3ccbc119df2764b0b5
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
712f07658a5b415a43fbabc4026809ae
SHA126ff5e0e506719ae7cc684e4fd8564b6cf3e9629
SHA25621ae4c698d26d5d07552999dcc891dd9e550f16356472c3c7b9577137a32dbd3
SHA5121917f4045ad72751aa8bd1c7ff2cf03f22b157745419982e183b7179d2f924b173ed24242bc1adc4b5105c55bef9bbc73e7667bfc8fb74694026e17efdae6b2b
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c