Analysis
-
max time kernel
151s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
12-10-2021 10:40
Static task
static1
Behavioral task
behavioral1
Sample
00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe
Resource
win10-en-20210920
General
-
Target
00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe
-
Size
175KB
-
MD5
8ec7e909ea2aff4d5ebe1cd03a04519c
-
SHA1
68630780cf21e0e319f7419195bbf85b539f8ba3
-
SHA256
00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668
-
SHA512
e95ba0a810ff0f78a2f9937ced8189314c6abb8ac4767541b680bcb5a6dc199a6a6c9c2c5b9d4498fca37f561410ffbf69d5d6b46f0a337208c33aca77223820
Malware Config
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Extracted
raccoon
1.8.2
fbe5e97e7d069407605ee9138022aa82166657e6
-
url4cnc
http://telemirror.top/stevuitreen
http://tgmirror.top/stevuitreen
http://telegatt.top/stevuitreen
http://telegka.top/stevuitreen
http://telegin.top/stevuitreen
https://t.me/stevuitreen
Extracted
vidar
41.3
1033
https://mas.to/@oleg98
-
profile_id
1033
Extracted
redline
159
190.2.136.29:3279
Extracted
redline
w1
109.234.34.165:12323
Extracted
raccoon
1.8.2
8d179b9e611eee525425544ee8c6d77360ab7cd9
-
url4cnc
http://teletop.top/agrybirdsgamerept
http://teleta.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
redline
MegaProliv
93.115.20.139:28978
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral1/memory/4296-164-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/4296-169-0x000000000041B222-mapping.dmp family_redline behavioral1/memory/4844-183-0x0000000002420000-0x0000000002451000-memory.dmp family_redline behavioral1/memory/4844-191-0x0000000004FC0000-0x0000000004FDC000-memory.dmp family_redline behavioral1/memory/1728-250-0x000000000041B25E-mapping.dmp family_redline behavioral1/memory/1728-249-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1728-265-0x0000000005490000-0x0000000005A96000-memory.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Arkei Stealer Payload 4 IoCs
resource yara_rule behavioral1/memory/608-136-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei behavioral1/memory/608-142-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei behavioral1/memory/608-140-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei behavioral1/memory/608-143-0x0000000000400000-0x0000000000B71000-memory.dmp family_arkei -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/4328-131-0x0000000000400000-0x0000000001735000-memory.dmp family_vidar behavioral1/memory/4328-130-0x00000000033C0000-0x0000000003496000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 4572 6C2.exe 4328 BD4.exe 608 1B08.exe 1080 2123.exe 1788 320C.exe 2168 39ED.exe 4844 4393.exe 4948 51EC.exe 1564 5CDA.exe 1756 5CDA.exe 840 5CDA.exe 1728 5CDA.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1B08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1B08.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 320C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 320C.exe -
Deletes itself 1 IoCs
pid Process 3044 Process not Found -
Loads dropped DLL 10 IoCs
pid Process 608 1B08.exe 4328 BD4.exe 4328 BD4.exe 608 1B08.exe 608 1B08.exe 4572 6C2.exe 4572 6C2.exe 4572 6C2.exe 4572 6C2.exe 4572 6C2.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000500000001abf5-148.dat themida behavioral1/memory/1788-157-0x0000000000AB0000-0x0000000000AB1000-memory.dmp themida behavioral1/files/0x000500000001abf5-1183.dat themida -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 6C2.exe -
Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook 6C2.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook 6C2.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1B08.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 320C.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 608 1B08.exe 1788 320C.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3524 set thread context of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 1080 set thread context of 4296 1080 2123.exe 79 PID 1564 set thread context of 1728 1564 5CDA.exe 94 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2416 608 WerFault.exe 74 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BD4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BD4.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1132 timeout.exe 1664 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4932 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4356 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4068 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 4068 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found 3044 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 640 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4068 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeRestorePrivilege 2416 WerFault.exe Token: SeBackupPrivilege 2416 WerFault.exe Token: SeDebugPrivilege 2416 WerFault.exe Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeDebugPrivilege 4932 taskkill.exe Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeDebugPrivilege 4844 4393.exe Token: SeDebugPrivilege 4296 RegSvcs.exe Token: SeDebugPrivilege 1788 320C.exe Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 1728 5CDA.exe Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeShutdownPrivilege 3044 Process not Found Token: SeCreatePagefilePrivilege 3044 Process not Found Token: SeDebugPrivilege 4316 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3044 Process not Found 3044 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3044 Process not Found 3044 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 3524 wrote to memory of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 3524 wrote to memory of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 3524 wrote to memory of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 3524 wrote to memory of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 3524 wrote to memory of 4068 3524 00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe 70 PID 3044 wrote to memory of 4572 3044 Process not Found 72 PID 3044 wrote to memory of 4572 3044 Process not Found 72 PID 3044 wrote to memory of 4572 3044 Process not Found 72 PID 3044 wrote to memory of 4328 3044 Process not Found 73 PID 3044 wrote to memory of 4328 3044 Process not Found 73 PID 3044 wrote to memory of 4328 3044 Process not Found 73 PID 3044 wrote to memory of 608 3044 Process not Found 74 PID 3044 wrote to memory of 608 3044 Process not Found 74 PID 3044 wrote to memory of 608 3044 Process not Found 74 PID 3044 wrote to memory of 1080 3044 Process not Found 75 PID 3044 wrote to memory of 1080 3044 Process not Found 75 PID 3044 wrote to memory of 1080 3044 Process not Found 75 PID 3044 wrote to memory of 1788 3044 Process not Found 76 PID 3044 wrote to memory of 1788 3044 Process not Found 76 PID 3044 wrote to memory of 1788 3044 Process not Found 76 PID 3044 wrote to memory of 2168 3044 Process not Found 78 PID 3044 wrote to memory of 2168 3044 Process not Found 78 PID 3044 wrote to memory of 2168 3044 Process not Found 78 PID 1080 wrote to memory of 4296 1080 2123.exe 79 PID 1080 wrote to memory of 4296 1080 2123.exe 79 PID 1080 wrote to memory of 4296 1080 2123.exe 79 PID 1080 wrote to memory of 4296 1080 2123.exe 79 PID 1080 wrote to memory of 4296 1080 2123.exe 79 PID 3044 wrote to memory of 4844 3044 Process not Found 81 PID 3044 wrote to memory of 4844 3044 Process not Found 81 PID 3044 wrote to memory of 4844 3044 Process not Found 81 PID 3044 wrote to memory of 4948 3044 Process not Found 84 PID 3044 wrote to memory of 4948 3044 Process not Found 84 PID 3044 wrote to memory of 4948 3044 Process not Found 84 PID 3044 wrote to memory of 1564 3044 Process not Found 85 PID 3044 wrote to memory of 1564 3044 Process not Found 85 PID 3044 wrote to memory of 1564 3044 Process not Found 85 PID 4328 wrote to memory of 4660 4328 BD4.exe 87 PID 4328 wrote to memory of 4660 4328 BD4.exe 87 PID 4328 wrote to memory of 4660 4328 BD4.exe 87 PID 4660 wrote to memory of 4932 4660 cmd.exe 89 PID 4660 wrote to memory of 4932 4660 cmd.exe 89 PID 4660 wrote to memory of 4932 4660 cmd.exe 89 PID 4660 wrote to memory of 1132 4660 cmd.exe 91 PID 4660 wrote to memory of 1132 4660 cmd.exe 91 PID 4660 wrote to memory of 1132 4660 cmd.exe 91 PID 1564 wrote to memory of 1756 1564 5CDA.exe 92 PID 1564 wrote to memory of 1756 1564 5CDA.exe 92 PID 1564 wrote to memory of 1756 1564 5CDA.exe 92 PID 1564 wrote to memory of 840 1564 5CDA.exe 93 PID 1564 wrote to memory of 840 1564 5CDA.exe 93 PID 1564 wrote to memory of 840 1564 5CDA.exe 93 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 4948 wrote to memory of 2104 4948 51EC.exe 95 PID 4948 wrote to memory of 2104 4948 51EC.exe 95 PID 4948 wrote to memory of 2104 4948 51EC.exe 95 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 PID 1564 wrote to memory of 1728 1564 5CDA.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook 6C2.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 6C2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe"C:\Users\Admin\AppData\Local\Temp\00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe"C:\Users\Admin\AppData\Local\Temp\00fd83e40d8d72a43cacf66dccb74ac3667718e3de33dce519714ee2bede3668.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\6C2.exeC:\Users\Admin\AppData\Local\Temp\6C2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4572 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\6C2.exe"2⤵PID:2132
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1664
-
-
-
C:\Users\Admin\AppData\Local\Temp\BD4.exeC:\Users\Admin\AppData\Local\Temp\BD4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im BD4.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\BD4.exe" & del C:\ProgramData\*.dll & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im BD4.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\1B08.exeC:\Users\Admin\AppData\Local\Temp\1B08.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 13082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\2123.exeC:\Users\Admin\AppData\Local\Temp\2123.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\320C.exeC:\Users\Admin\AppData\Local\Temp\320C.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
C:\Users\Admin\AppData\Local\Temp\39ED.exeC:\Users\Admin\AppData\Local\Temp\39ED.exe1⤵
- Executes dropped EXE
PID:2168
-
C:\Users\Admin\AppData\Local\Temp\4393.exeC:\Users\Admin\AppData\Local\Temp\4393.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
C:\Users\Admin\AppData\Local\Temp\51EC.exeC:\Users\Admin\AppData\Local\Temp\51EC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0c5wtme4\0c5wtme4.cmdline"3⤵PID:2504
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB216.tmp" "c:\Users\Admin\AppData\Local\Temp\0c5wtme4\CSC2E024E78E9B14F14AA76194EC7169A12.TMP"4⤵PID:3980
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:1592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:3740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:1104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:4356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:3092
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:1960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:3792
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:3236
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:3968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:4864
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:1380
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:1972
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:1372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1200
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\5CDA.exeC:\Users\Admin\AppData\Local\Temp\5CDA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\5CDA.exeC:\Users\Admin\AppData\Local\Temp\5CDA.exe2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\5CDA.exeC:\Users\Admin\AppData\Local\Temp\5CDA.exe2⤵
- Executes dropped EXE
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\5CDA.exeC:\Users\Admin\AppData\Local\Temp\5CDA.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1728
-