Analysis
-
max time kernel
151s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
04-12-2021 00:42
Static task
static1
Behavioral task
behavioral1
Sample
2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe
Resource
win10-en-20211104
General
-
Target
2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe
-
Size
248KB
-
MD5
52f51409a4cff209b33fb051f9467301
-
SHA1
859c1ad8bb06e5a7baab2779497f7c4bf32ca390
-
SHA256
2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab
-
SHA512
2b9bcd082f078b25e0a288d1cffbdb1f02c7b202862c82e492d476626f44d3740f0d3aac46074f7d21ada29ede9738cf10d12532734cbb335eac48b33d422f75
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
https://cinems.club/search.php
https://clothes.surf/search.php
Extracted
redline
92.255.76.197:38637
Extracted
redline
1
45.9.20.59:46287
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1712-151-0x00000000022B0000-0x00000000022DE000-memory.dmp family_redline behavioral1/memory/1712-153-0x0000000002340000-0x000000000236C000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\9683.exe family_redline C:\Users\Admin\AppData\Local\Temp\9683.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
-
suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
13C2.exeSmartClock.exe341D.exe610A.exe6FD0.exe9683.exepid process 516 13C2.exe 4552 SmartClock.exe 648 341D.exe 1552 610A.exe 1712 6FD0.exe 2640 9683.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 2060 -
Drops startup file 1 IoCs
Processes:
13C2.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 13C2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4612 3796 WerFault.exe DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe341D.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 341D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 341D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 341D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
610A.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 610A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 610A.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1396 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXENETSTAT.EXEipconfig.exeipconfig.exepid process 2352 NETSTAT.EXE 2656 NETSTAT.EXE 2608 ipconfig.exe 5084 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\SOFTWARE\Microsoft\Internet Explorer\Main Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{505CD990-549B-11EC-B34F-F23AFFACC4A0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 4552 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exepid process 3564 2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe 3564 2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 2060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2060 -
Suspicious behavior: MapViewOfSection 52 IoCs
Processes:
2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe341D.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 3564 2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe 648 341D.exe 2060 2060 2060 2060 2060 2060 1380 explorer.exe 1380 explorer.exe 2060 2060 4460 explorer.exe 4460 explorer.exe 2060 2060 2300 explorer.exe 2300 explorer.exe 2060 2060 1208 explorer.exe 1208 explorer.exe 2060 2060 2204 explorer.exe 2204 explorer.exe 2204 explorer.exe 2204 explorer.exe 2060 2060 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
6FD0.exeWMIC.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 2060 Token: SeCreatePagefilePrivilege 2060 Token: SeShutdownPrivilege 2060 Token: SeCreatePagefilePrivilege 2060 Token: SeShutdownPrivilege 2060 Token: SeCreatePagefilePrivilege 2060 Token: SeShutdownPrivilege 2060 Token: SeCreatePagefilePrivilege 2060 Token: SeShutdownPrivilege 2060 Token: SeCreatePagefilePrivilege 2060 Token: SeShutdownPrivilege 2060 Token: SeCreatePagefilePrivilege 2060 Token: SeDebugPrivilege 1712 6FD0.exe Token: SeIncreaseQuotaPrivilege 4932 WMIC.exe Token: SeSecurityPrivilege 4932 WMIC.exe Token: SeTakeOwnershipPrivilege 4932 WMIC.exe Token: SeLoadDriverPrivilege 4932 WMIC.exe Token: SeSystemProfilePrivilege 4932 WMIC.exe Token: SeSystemtimePrivilege 4932 WMIC.exe Token: SeProfSingleProcessPrivilege 4932 WMIC.exe Token: SeIncBasePriorityPrivilege 4932 WMIC.exe Token: SeCreatePagefilePrivilege 4932 WMIC.exe Token: SeBackupPrivilege 4932 WMIC.exe Token: SeRestorePrivilege 4932 WMIC.exe Token: SeShutdownPrivilege 4932 WMIC.exe Token: SeDebugPrivilege 4932 WMIC.exe Token: SeSystemEnvironmentPrivilege 4932 WMIC.exe Token: SeRemoteShutdownPrivilege 4932 WMIC.exe Token: SeUndockPrivilege 4932 WMIC.exe Token: SeManageVolumePrivilege 4932 WMIC.exe Token: 33 4932 WMIC.exe Token: 34 4932 WMIC.exe Token: 35 4932 WMIC.exe Token: 36 4932 WMIC.exe Token: SeIncreaseQuotaPrivilege 4932 WMIC.exe Token: SeSecurityPrivilege 4932 WMIC.exe Token: SeTakeOwnershipPrivilege 4932 WMIC.exe Token: SeLoadDriverPrivilege 4932 WMIC.exe Token: SeSystemProfilePrivilege 4932 WMIC.exe Token: SeSystemtimePrivilege 4932 WMIC.exe Token: SeProfSingleProcessPrivilege 4932 WMIC.exe Token: SeIncBasePriorityPrivilege 4932 WMIC.exe Token: SeCreatePagefilePrivilege 4932 WMIC.exe Token: SeBackupPrivilege 4932 WMIC.exe Token: SeRestorePrivilege 4932 WMIC.exe Token: SeShutdownPrivilege 4932 WMIC.exe Token: SeDebugPrivilege 4932 WMIC.exe Token: SeSystemEnvironmentPrivilege 4932 WMIC.exe Token: SeRemoteShutdownPrivilege 4932 WMIC.exe Token: SeUndockPrivilege 4932 WMIC.exe Token: SeManageVolumePrivilege 4932 WMIC.exe Token: 33 4932 WMIC.exe Token: 34 4932 WMIC.exe Token: 35 4932 WMIC.exe Token: 36 4932 WMIC.exe Token: SeIncreaseQuotaPrivilege 4628 WMIC.exe Token: SeSecurityPrivilege 4628 WMIC.exe Token: SeTakeOwnershipPrivilege 4628 WMIC.exe Token: SeLoadDriverPrivilege 4628 WMIC.exe Token: SeSystemProfilePrivilege 4628 WMIC.exe Token: SeSystemtimePrivilege 4628 WMIC.exe Token: SeProfSingleProcessPrivilege 4628 WMIC.exe Token: SeIncBasePriorityPrivilege 4628 WMIC.exe Token: SeCreatePagefilePrivilege 4628 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4916 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4916 iexplore.exe 4916 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
RuntimeBroker.exepid process 3460 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13C2.execmd.exe610A.execmd.exedescription pid process target process PID 2060 wrote to memory of 516 2060 13C2.exe PID 2060 wrote to memory of 516 2060 13C2.exe PID 2060 wrote to memory of 516 2060 13C2.exe PID 516 wrote to memory of 4552 516 13C2.exe SmartClock.exe PID 516 wrote to memory of 4552 516 13C2.exe SmartClock.exe PID 516 wrote to memory of 4552 516 13C2.exe SmartClock.exe PID 2060 wrote to memory of 648 2060 341D.exe PID 2060 wrote to memory of 648 2060 341D.exe PID 2060 wrote to memory of 648 2060 341D.exe PID 2060 wrote to memory of 1552 2060 610A.exe PID 2060 wrote to memory of 1552 2060 610A.exe PID 2060 wrote to memory of 1552 2060 610A.exe PID 2060 wrote to memory of 1712 2060 6FD0.exe PID 2060 wrote to memory of 1712 2060 6FD0.exe PID 2060 wrote to memory of 1712 2060 6FD0.exe PID 2060 wrote to memory of 2640 2060 9683.exe PID 2060 wrote to memory of 2640 2060 9683.exe PID 2060 wrote to memory of 2640 2060 9683.exe PID 2060 wrote to memory of 1228 2060 cmd.exe PID 2060 wrote to memory of 1228 2060 cmd.exe PID 1228 wrote to memory of 4932 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4932 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4628 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4628 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4316 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4316 1228 cmd.exe WMIC.exe PID 1552 wrote to memory of 5048 1552 610A.exe cmd.exe PID 1552 wrote to memory of 5048 1552 610A.exe cmd.exe PID 1552 wrote to memory of 5048 1552 610A.exe cmd.exe PID 5048 wrote to memory of 1396 5048 cmd.exe timeout.exe PID 5048 wrote to memory of 1396 5048 cmd.exe timeout.exe PID 5048 wrote to memory of 1396 5048 cmd.exe timeout.exe PID 1228 wrote to memory of 392 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 392 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 672 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 672 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4496 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 4496 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 2900 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 2900 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 3820 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 3820 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 5032 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 5032 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 1752 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 1752 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 2712 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 2712 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 3160 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 3160 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 3148 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 3148 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 2560 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 2560 1228 cmd.exe WMIC.exe PID 1228 wrote to memory of 5084 1228 cmd.exe ipconfig.exe PID 1228 wrote to memory of 5084 1228 cmd.exe ipconfig.exe PID 1228 wrote to memory of 2164 1228 cmd.exe ROUTE.EXE PID 1228 wrote to memory of 2164 1228 cmd.exe ROUTE.EXE PID 1228 wrote to memory of 5076 1228 cmd.exe netsh.exe PID 1228 wrote to memory of 5076 1228 cmd.exe netsh.exe PID 1228 wrote to memory of 3660 1228 cmd.exe systeminfo.exe PID 1228 wrote to memory of 3660 1228 cmd.exe systeminfo.exe PID 1228 wrote to memory of 744 1228 cmd.exe tasklist.exe PID 1228 wrote to memory of 744 1228 cmd.exe tasklist.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:3236
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3796
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3796 -s 9002⤵
- Program crash
PID:4612
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3460
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:3252
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2704
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2424
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe"C:\Users\Admin\AppData\Local\Temp\2ad536248b31c68f944b660e6062e9ddf76a9f4dff85edb300a1e3def3f395ab.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3564
-
C:\Users\Admin\AppData\Local\Temp\13C2.exeC:\Users\Admin\AppData\Local\Temp\13C2.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:4552
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca1⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\341D.exeC:\Users\Admin\AppData\Local\Temp\341D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:648
-
C:\Users\Admin\AppData\Local\Temp\610A.exeC:\Users\Admin\AppData\Local\Temp\610A.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\nSXdFiAn & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\610A.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1396
-
C:\Users\Admin\AppData\Local\Temp\6FD0.exeC:\Users\Admin\AppData\Local\Temp\6FD0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
C:\Users\Admin\AppData\Local\Temp\9683.exeC:\Users\Admin\AppData\Local\Temp\9683.exe1⤵
- Executes dropped EXE
PID:2640
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵PID:4316
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵PID:392
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵PID:672
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵PID:4496
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵PID:2900
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵PID:3820
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵PID:5032
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵PID:1752
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵PID:2712
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵PID:3160
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵PID:3148
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵PID:2560
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
PID:5084 -
C:\Windows\system32\ROUTE.EXEroute print2⤵PID:2164
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵PID:5076
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:3660 -
C:\Windows\system32\tasklist.exetasklist /v2⤵
- Enumerates processes with tasklist
PID:744 -
C:\Windows\system32\net.exenet accounts /domain2⤵PID:752
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain3⤵PID:3056
-
C:\Windows\system32\net.exenet share2⤵PID:4348
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share3⤵PID:1116
-
C:\Windows\system32\net.exenet user2⤵PID:1312
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user3⤵PID:1376
-
C:\Windows\system32\net.exenet user /domain2⤵PID:708
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain3⤵PID:872
-
C:\Windows\system32\net.exenet use2⤵PID:648
-
C:\Windows\system32\net.exenet group2⤵PID:1624
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group3⤵PID:1428
-
C:\Windows\system32\net.exenet localgroup2⤵PID:3548
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup3⤵PID:1808
-
C:\Windows\system32\NETSTAT.EXEnetstat -r2⤵
- Gathers network information
PID:2352 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print3⤵PID:2392
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print4⤵PID:2452
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao2⤵
- Gathers network information
PID:2656 -
C:\Windows\system32\schtasks.exeschtasks /query2⤵PID:3468
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
PID:2608
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4724
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4916 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4332
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4592
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:1380
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4460
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:2300
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:1208
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:2204
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:3068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
86c76df3f0feed13d6ad6f9155156369
SHA1330e82600381f68d6f6914b50b451b6c59901b26
SHA2564dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf
SHA512078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c
-
MD5
86c76df3f0feed13d6ad6f9155156369
SHA1330e82600381f68d6f6914b50b451b6c59901b26
SHA2564dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf
SHA512078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c
-
MD5
1376f7a946efb7a5595c2170d65d1fe1
SHA1b7a322c20d642f10c8e54d77cd83ae1ae9ce9a15
SHA2563e10aac14249e44e173410380f1bf8bc0cdffa6c41a3af5d7302a4ade08fcb17
SHA5127be82c4856ccd67f861a1a47b1154b73ae0fe49773347033f1752af488d756b6829dbe1dea0b210821db38d9f819bedf15f1f068ac0845e5cf3059180c147437
-
MD5
1376f7a946efb7a5595c2170d65d1fe1
SHA1b7a322c20d642f10c8e54d77cd83ae1ae9ce9a15
SHA2563e10aac14249e44e173410380f1bf8bc0cdffa6c41a3af5d7302a4ade08fcb17
SHA5127be82c4856ccd67f861a1a47b1154b73ae0fe49773347033f1752af488d756b6829dbe1dea0b210821db38d9f819bedf15f1f068ac0845e5cf3059180c147437
-
MD5
82110a103b476a17c1101aaa5e8055b1
SHA1d057ef2238472cf4e06036a05f4032fbec886916
SHA2565e7db43de5ef8828522139068ec177682b149758816bcd0634c19fc7f2dca117
SHA51238749174c31b9430ca63178673f0b421f8dd80bf40c5eacd793add33ada4217bb5690f46bea6a283d9d821d72fc6ba8820c62594f7cfe39693107e9714481847
-
MD5
82110a103b476a17c1101aaa5e8055b1
SHA1d057ef2238472cf4e06036a05f4032fbec886916
SHA2565e7db43de5ef8828522139068ec177682b149758816bcd0634c19fc7f2dca117
SHA51238749174c31b9430ca63178673f0b421f8dd80bf40c5eacd793add33ada4217bb5690f46bea6a283d9d821d72fc6ba8820c62594f7cfe39693107e9714481847
-
MD5
a8162fc2e944d87a356dea9a716b043d
SHA1b5b76a20f49139d1f2dcd1384efefb86cd41b5bd
SHA256d7c447f3e23cf6d10f9638688e5e88baddd70460a1a6f37f4cf18f51044c18b0
SHA512d82f2f068097ab7f71579d57f47acce91d007fd4b6a7f97e876291c22ff5805e59b41404653c70072cf3dbd4a71f8993fb8918b4165ddd6802d3f133321e6b1f
-
MD5
a8162fc2e944d87a356dea9a716b043d
SHA1b5b76a20f49139d1f2dcd1384efefb86cd41b5bd
SHA256d7c447f3e23cf6d10f9638688e5e88baddd70460a1a6f37f4cf18f51044c18b0
SHA512d82f2f068097ab7f71579d57f47acce91d007fd4b6a7f97e876291c22ff5805e59b41404653c70072cf3dbd4a71f8993fb8918b4165ddd6802d3f133321e6b1f
-
MD5
4e5fe8a22a14736c55ebf904f874c9ba
SHA124c65a9f6126185b70fa611cfe1e1bca5ca613fa
SHA256fb56b8a9525b0b9eaa62310ca97847128328ebb2ebd5625af1f3238adc4e411b
SHA5126c5815831a9f73ec7929643c7fdef13e794696091eddcde215aad7becd1df59fd921ca829289b05394f59f8a1bcae196e5a39c3dd1fb613306efa8ddbbdd0012
-
MD5
d1601b2d3dc840193c550140c3fc633f
SHA1b5a72e474a4ee5638fc923bd4a7b11fba4dfde1f
SHA25658a0c28c06281428ffa0a6bb5dba25e2d5005b882e32263b9a5c02b715ebc68c
SHA51241f008b122fb341fa5b9fe45974a9c1359cba368bf9d1c0c7d93d51ab8e4ee64255f68cd8d45e54edbce246be79c6c5dbc17e16bd84f12a423e378a897198743
-
MD5
b963abf9a7967b3a22da64c9193fc932
SHA10831556392b56c00b07f04deb5474c4202c545e8
SHA2566c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5
SHA51264514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2
-
MD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
MD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
MD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
MD5
00464761d4a2e5ff0c4bc70cd4925840
SHA19ea55f1851603a2f70bf6e02d8925090ec07f6e4
SHA256a046e40d3b81bb22a801e8dac17d1552e0ecedbdda716e1a6bc9ae96e084af76
SHA5129d052fd53ac20da2bc7c23a334dab2c48a5fc94903ed08ffbd5beb1ca7fcf5cc14945ae3025f569e47c44beeb0543187b9b357fffa86a0919636c2cf8d7c8357
-
MD5
bf81c9da7f51aebc5427f4fbb8ddd970
SHA1eb913d87a17281bb4e273b1dae04d79432d059fe
SHA256da57d6f9c9f2c43c30c512d473262c8f0dcbb8f4ac98fbdbeff650d347332924
SHA51205db220b088c80a9953efb40fd21cfc0be0a5929b032b1d564a1d1fefa32f775ba81d101213056ec5e4d311c430ddc9a3d3164f5c4d69b170b3208e1458c8a11
-
MD5
bf81c9da7f51aebc5427f4fbb8ddd970
SHA1eb913d87a17281bb4e273b1dae04d79432d059fe
SHA256da57d6f9c9f2c43c30c512d473262c8f0dcbb8f4ac98fbdbeff650d347332924
SHA51205db220b088c80a9953efb40fd21cfc0be0a5929b032b1d564a1d1fefa32f775ba81d101213056ec5e4d311c430ddc9a3d3164f5c4d69b170b3208e1458c8a11
-
MD5
00464761d4a2e5ff0c4bc70cd4925840
SHA19ea55f1851603a2f70bf6e02d8925090ec07f6e4
SHA256a046e40d3b81bb22a801e8dac17d1552e0ecedbdda716e1a6bc9ae96e084af76
SHA5129d052fd53ac20da2bc7c23a334dab2c48a5fc94903ed08ffbd5beb1ca7fcf5cc14945ae3025f569e47c44beeb0543187b9b357fffa86a0919636c2cf8d7c8357
-
MD5
b963abf9a7967b3a22da64c9193fc932
SHA10831556392b56c00b07f04deb5474c4202c545e8
SHA2566c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5
SHA51264514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2
-
MD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
MD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
MD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5