Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
04-12-2021 01:06
Static task
static1
Behavioral task
behavioral1
Sample
7807ae2f5d4c1c497ef541b09ef8c85f.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
7807ae2f5d4c1c497ef541b09ef8c85f.exe
Resource
win10-en-20211104
General
-
Target
7807ae2f5d4c1c497ef541b09ef8c85f.exe
-
Size
334KB
-
MD5
7807ae2f5d4c1c497ef541b09ef8c85f
-
SHA1
d3fc1cdec9c424511261335cc144bb80bd8e6229
-
SHA256
29d358633a06305d5facd9d1e290254a4a925f0b50f61473e4094fd8ca7a0a70
-
SHA512
83dce014813d70dc634385069a79e5cd3f8ec8276950220863ee64258218b900a758156f74bbc5b71e91ae55b4496d2595e4a43cae4b74df5d9a0291de3343cf
Malware Config
Extracted
smokeloader
2020
http://membro.at/upload/
http://jeevanpunetha.com/upload/
http://misipu.cn/upload/
http://zavodooo.ru/upload/
http://targiko.ru/upload/
http://vues3d.com/upload/
https://cinems.club/search.php
https://clothes.surf/search.php
Extracted
redline
92.255.76.197:38637
Extracted
redline
1
45.9.20.59:46287
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2400-151-0x00000000022F0000-0x000000000231E000-memory.dmp family_redline behavioral2/memory/2400-153-0x0000000002440000-0x000000000246C000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\555F.exe family_redline C:\Users\Admin\AppData\Local\Temp\555F.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
DC23.exeSmartClock.exeF682.exe1B22.exe27A6.exe555F.exepid process 3752 DC23.exe 372 SmartClock.exe 1128 F682.exe 2096 1B22.exe 2400 27A6.exe 4948 555F.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 2436 -
Drops startup file 1 IoCs
Processes:
DC23.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk DC23.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
7807ae2f5d4c1c497ef541b09ef8c85f.exeF682.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7807ae2f5d4c1c497ef541b09ef8c85f.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7807ae2f5d4c1c497ef541b09ef8c85f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7807ae2f5d4c1c497ef541b09ef8c85f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F682.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F682.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F682.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1B22.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1B22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1B22.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1948 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXENETSTAT.EXEipconfig.exepid process 3852 ipconfig.exe 2576 NETSTAT.EXE 3748 NETSTAT.EXE 4880 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\SOFTWARE\Microsoft\Internet Explorer\Main Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B33E073C-549E-11EC-B34F-C6CD99C971BA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 372 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7807ae2f5d4c1c497ef541b09ef8c85f.exepid process 3584 7807ae2f5d4c1c497ef541b09ef8c85f.exe 3584 7807ae2f5d4c1c497ef541b09ef8c85f.exe 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 2436 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2436 -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
7807ae2f5d4c1c497ef541b09ef8c85f.exeF682.exeexplorer.exepid process 3584 7807ae2f5d4c1c497ef541b09ef8c85f.exe 1128 F682.exe 2436 2436 2436 2436 2436 2436 2884 explorer.exe 2884 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
27A6.exeWMIC.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeDebugPrivilege 2400 27A6.exe Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeShutdownPrivilege 2436 Token: SeCreatePagefilePrivilege 2436 Token: SeIncreaseQuotaPrivilege 2784 WMIC.exe Token: SeSecurityPrivilege 2784 WMIC.exe Token: SeTakeOwnershipPrivilege 2784 WMIC.exe Token: SeLoadDriverPrivilege 2784 WMIC.exe Token: SeSystemProfilePrivilege 2784 WMIC.exe Token: SeSystemtimePrivilege 2784 WMIC.exe Token: SeProfSingleProcessPrivilege 2784 WMIC.exe Token: SeIncBasePriorityPrivilege 2784 WMIC.exe Token: SeCreatePagefilePrivilege 2784 WMIC.exe Token: SeBackupPrivilege 2784 WMIC.exe Token: SeRestorePrivilege 2784 WMIC.exe Token: SeShutdownPrivilege 2784 WMIC.exe Token: SeDebugPrivilege 2784 WMIC.exe Token: SeSystemEnvironmentPrivilege 2784 WMIC.exe Token: SeRemoteShutdownPrivilege 2784 WMIC.exe Token: SeUndockPrivilege 2784 WMIC.exe Token: SeManageVolumePrivilege 2784 WMIC.exe Token: 33 2784 WMIC.exe Token: 34 2784 WMIC.exe Token: 35 2784 WMIC.exe Token: 36 2784 WMIC.exe Token: SeIncreaseQuotaPrivilege 2784 WMIC.exe Token: SeSecurityPrivilege 2784 WMIC.exe Token: SeTakeOwnershipPrivilege 2784 WMIC.exe Token: SeLoadDriverPrivilege 2784 WMIC.exe Token: SeSystemProfilePrivilege 2784 WMIC.exe Token: SeSystemtimePrivilege 2784 WMIC.exe Token: SeProfSingleProcessPrivilege 2784 WMIC.exe Token: SeIncBasePriorityPrivilege 2784 WMIC.exe Token: SeCreatePagefilePrivilege 2784 WMIC.exe Token: SeBackupPrivilege 2784 WMIC.exe Token: SeRestorePrivilege 2784 WMIC.exe Token: SeShutdownPrivilege 2784 WMIC.exe Token: SeDebugPrivilege 2784 WMIC.exe Token: SeSystemEnvironmentPrivilege 2784 WMIC.exe Token: SeRemoteShutdownPrivilege 2784 WMIC.exe Token: SeUndockPrivilege 2784 WMIC.exe Token: SeManageVolumePrivilege 2784 WMIC.exe Token: 33 2784 WMIC.exe Token: 34 2784 WMIC.exe Token: 35 2784 WMIC.exe Token: 36 2784 WMIC.exe Token: SeIncreaseQuotaPrivilege 608 WMIC.exe Token: SeSecurityPrivilege 608 WMIC.exe Token: SeTakeOwnershipPrivilege 608 WMIC.exe Token: SeLoadDriverPrivilege 608 WMIC.exe Token: SeSystemProfilePrivilege 608 WMIC.exe Token: SeSystemtimePrivilege 608 WMIC.exe Token: SeProfSingleProcessPrivilege 608 WMIC.exe Token: SeIncBasePriorityPrivilege 608 WMIC.exe Token: SeCreatePagefilePrivilege 608 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2036 iexplore.exe 2036 iexplore.exe 4336 IEXPLORE.EXE 4336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DC23.exe1B22.execmd.execmd.exedescription pid process target process PID 2436 wrote to memory of 3752 2436 DC23.exe PID 2436 wrote to memory of 3752 2436 DC23.exe PID 2436 wrote to memory of 3752 2436 DC23.exe PID 3752 wrote to memory of 372 3752 DC23.exe SmartClock.exe PID 3752 wrote to memory of 372 3752 DC23.exe SmartClock.exe PID 3752 wrote to memory of 372 3752 DC23.exe SmartClock.exe PID 2436 wrote to memory of 1128 2436 F682.exe PID 2436 wrote to memory of 1128 2436 F682.exe PID 2436 wrote to memory of 1128 2436 F682.exe PID 2436 wrote to memory of 2096 2436 1B22.exe PID 2436 wrote to memory of 2096 2436 1B22.exe PID 2436 wrote to memory of 2096 2436 1B22.exe PID 2436 wrote to memory of 2400 2436 27A6.exe PID 2436 wrote to memory of 2400 2436 27A6.exe PID 2436 wrote to memory of 2400 2436 27A6.exe PID 2436 wrote to memory of 4948 2436 555F.exe PID 2436 wrote to memory of 4948 2436 555F.exe PID 2436 wrote to memory of 4948 2436 555F.exe PID 2096 wrote to memory of 2884 2096 1B22.exe cmd.exe PID 2096 wrote to memory of 2884 2096 1B22.exe cmd.exe PID 2096 wrote to memory of 2884 2096 1B22.exe cmd.exe PID 2884 wrote to memory of 1948 2884 cmd.exe timeout.exe PID 2884 wrote to memory of 1948 2884 cmd.exe timeout.exe PID 2884 wrote to memory of 1948 2884 cmd.exe timeout.exe PID 2436 wrote to memory of 5088 2436 cmd.exe PID 2436 wrote to memory of 5088 2436 cmd.exe PID 5088 wrote to memory of 2784 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 2784 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 608 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 608 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 1212 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 1212 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 64 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 64 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 5064 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 5064 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 2772 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 2772 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 4304 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 4304 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 5012 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 5012 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 1984 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 1984 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 1904 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 1904 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 3672 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 3672 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 4068 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 4068 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 3204 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 3204 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 2136 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 2136 5088 cmd.exe WMIC.exe PID 5088 wrote to memory of 3852 5088 cmd.exe ipconfig.exe PID 5088 wrote to memory of 3852 5088 cmd.exe ipconfig.exe PID 5088 wrote to memory of 3876 5088 cmd.exe ROUTE.EXE PID 5088 wrote to memory of 3876 5088 cmd.exe ROUTE.EXE PID 5088 wrote to memory of 2312 5088 cmd.exe netsh.exe PID 5088 wrote to memory of 2312 5088 cmd.exe netsh.exe PID 5088 wrote to memory of 3952 5088 cmd.exe systeminfo.exe PID 5088 wrote to memory of 3952 5088 cmd.exe systeminfo.exe PID 5088 wrote to memory of 1912 5088 cmd.exe tasklist.exe PID 5088 wrote to memory of 1912 5088 cmd.exe tasklist.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7807ae2f5d4c1c497ef541b09ef8c85f.exe"C:\Users\Admin\AppData\Local\Temp\7807ae2f5d4c1c497ef541b09ef8c85f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3584
-
C:\Users\Admin\AppData\Local\Temp\DC23.exeC:\Users\Admin\AppData\Local\Temp\DC23.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:372
-
C:\Users\Admin\AppData\Local\Temp\F682.exeC:\Users\Admin\AppData\Local\Temp\F682.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1128
-
C:\Users\Admin\AppData\Local\Temp\1B22.exeC:\Users\Admin\AppData\Local\Temp\1B22.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\KLUGkskEQp & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1B22.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1948
-
C:\Users\Admin\AppData\Local\Temp\27A6.exeC:\Users\Admin\AppData\Local\Temp\27A6.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
C:\Users\Admin\AppData\Local\Temp\555F.exeC:\Users\Admin\AppData\Local\Temp\555F.exe1⤵
- Executes dropped EXE
PID:4948
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵PID:1212
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵PID:64
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵PID:5064
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵PID:2772
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵PID:4304
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵PID:5012
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵PID:1984
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵PID:1904
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵PID:3672
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵PID:4068
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵PID:3204
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵PID:2136
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
PID:3852 -
C:\Windows\system32\ROUTE.EXEroute print2⤵PID:3876
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵PID:2312
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:3952 -
C:\Windows\system32\tasklist.exetasklist /v2⤵
- Enumerates processes with tasklist
PID:1912 -
C:\Windows\system32\net.exenet accounts /domain2⤵PID:760
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain3⤵PID:3868
-
C:\Windows\system32\net.exenet share2⤵PID:68
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share3⤵PID:3752
-
C:\Windows\system32\net.exenet user2⤵PID:2976
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user3⤵PID:1160
-
C:\Windows\system32\net.exenet user /domain2⤵PID:1828
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain3⤵PID:3156
-
C:\Windows\system32\net.exenet use2⤵PID:1332
-
C:\Windows\system32\net.exenet group2⤵PID:1484
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group3⤵PID:3160
-
C:\Windows\system32\net.exenet localgroup2⤵PID:392
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup3⤵PID:1128
-
C:\Windows\system32\NETSTAT.EXEnetstat -r2⤵
- Gathers network information
PID:2576 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print3⤵PID:2636
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print4⤵PID:2940
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao2⤵
- Gathers network information
PID:3748 -
C:\Windows\system32\schtasks.exeschtasks /query2⤵PID:3524
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
PID:4880
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:1284
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4336
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:704
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:688
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:2884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
aac2b9407a57a02ec74c25f35ad8b1c7
SHA1fc61a87deb0d6eb0473f1da1e84f303799c29018
SHA2568aea16599b9ee75ce3c0702f59c822614c5359e20d26e6a16a3ecb470d3dac84
SHA5126770a347fafb23dea69e200d93d9a1cf0a85d81c3c2f27a0ce5cde1214554feb2f3e874e36203478e30404fb48b86091349915528cd79df39b56a797cc199309
-
MD5
aac2b9407a57a02ec74c25f35ad8b1c7
SHA1fc61a87deb0d6eb0473f1da1e84f303799c29018
SHA2568aea16599b9ee75ce3c0702f59c822614c5359e20d26e6a16a3ecb470d3dac84
SHA5126770a347fafb23dea69e200d93d9a1cf0a85d81c3c2f27a0ce5cde1214554feb2f3e874e36203478e30404fb48b86091349915528cd79df39b56a797cc199309
-
MD5
e6aab879e4ff5871cf719c314ad2ef64
SHA1f4fe02813d287df3fa98bbbf339fc454668fec78
SHA256e75807f1441ce92a00048df8398e639caf891cb89e5d542bdcbe9bc4aca05c8c
SHA5120673c87316a81eed48ef19925fe9ff54b0cbb018b2abdb5105b19f01e5f58ba4d6d5bd71e9cdefcd5001499839a7402c39fb9daaaf4bd40eaddd94ee655d751c
-
MD5
e6aab879e4ff5871cf719c314ad2ef64
SHA1f4fe02813d287df3fa98bbbf339fc454668fec78
SHA256e75807f1441ce92a00048df8398e639caf891cb89e5d542bdcbe9bc4aca05c8c
SHA5120673c87316a81eed48ef19925fe9ff54b0cbb018b2abdb5105b19f01e5f58ba4d6d5bd71e9cdefcd5001499839a7402c39fb9daaaf4bd40eaddd94ee655d751c
-
MD5
a8162fc2e944d87a356dea9a716b043d
SHA1b5b76a20f49139d1f2dcd1384efefb86cd41b5bd
SHA256d7c447f3e23cf6d10f9638688e5e88baddd70460a1a6f37f4cf18f51044c18b0
SHA512d82f2f068097ab7f71579d57f47acce91d007fd4b6a7f97e876291c22ff5805e59b41404653c70072cf3dbd4a71f8993fb8918b4165ddd6802d3f133321e6b1f
-
MD5
a8162fc2e944d87a356dea9a716b043d
SHA1b5b76a20f49139d1f2dcd1384efefb86cd41b5bd
SHA256d7c447f3e23cf6d10f9638688e5e88baddd70460a1a6f37f4cf18f51044c18b0
SHA512d82f2f068097ab7f71579d57f47acce91d007fd4b6a7f97e876291c22ff5805e59b41404653c70072cf3dbd4a71f8993fb8918b4165ddd6802d3f133321e6b1f
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
86c76df3f0feed13d6ad6f9155156369
SHA1330e82600381f68d6f6914b50b451b6c59901b26
SHA2564dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf
SHA512078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c
-
MD5
86c76df3f0feed13d6ad6f9155156369
SHA1330e82600381f68d6f6914b50b451b6c59901b26
SHA2564dc4954990ef29b8b1b66f23cd475d375cc759b2aabbfdde761abaafef975baf
SHA512078e22f7c6109abf532591dc429d6a58255a192c3a70324b769e5f2b79549d0814fa2330693484dccdc27427ef25526b5db4f3b574c521bed0ae27eadada789c
-
MD5
21ccbe287d2fa1dfd882dc45e06f8ac3
SHA13d875ded53e2a9cfba319302e6710c018409f941
SHA2567584fb389b3d932d6ba277feb01ec30bab25339e85b5f5aadf0330241aa6c77b
SHA512c9e0beea57bbb515cbe8fe4171cf88b6e89173d4a9ed2c827c1d8635a77d8af74bda20f19c5813b9db9fc0a8c1753c3035d0f2d0c2e846d47ceeb5a746768550
-
MD5
746084cfc75ee1df472ce3d6f6204c85
SHA17bc9d514576d6128f8c01275d7bd4d3146da6db6
SHA256d07239aeef2af7700788ee08c0698b66b9b885d1ee9dea5ef7d351b548744c43
SHA5122c90004561e92f9e39acde085343a96fe8a7955567d3acb51e7976b7ff2f222ed09086aec480472351355d8b5dcbfd338a7d22a4e69aad4aff9e02991e3333d2
-
MD5
b963abf9a7967b3a22da64c9193fc932
SHA10831556392b56c00b07f04deb5474c4202c545e8
SHA2566c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5
SHA51264514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2
-
MD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
MD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
MD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
MD5
763b8d0deda97e91ab467eecc77880ab
SHA1e039dc6ac85e4a19d6d5af4ff477002923e37982
SHA2560afa86629c49239f445a3989476de5c0c247ff6d77a65739c3419854f4c78a07
SHA512ad850f8c2664df8380f997bb7f8e0d823f93aca5faca1d49e6787e17259bad2d80e5a5d698888fc1d7215ecaae0a0d2328c2e23383bd07cd46075bee54b8c5b4
-
MD5
0de4a160418a758e51e76a66ac2eef76
SHA1a7fc1ff8858d5e7b8d6ec45bfc96ca780b6ac3ed
SHA256f0ff3c1d427969d587a348b34e3b2881e3d7dc5e6a187cd6074659db73d32dfb
SHA5124e2925964ffd375ecd70b29719e9f3458faad26d4fe191f6f2bc46ebe2a99b936425d1b34790be10221f7c568c678c1c880200acf5851a51ed95ecb4b0f30ba4
-
MD5
0de4a160418a758e51e76a66ac2eef76
SHA1a7fc1ff8858d5e7b8d6ec45bfc96ca780b6ac3ed
SHA256f0ff3c1d427969d587a348b34e3b2881e3d7dc5e6a187cd6074659db73d32dfb
SHA5124e2925964ffd375ecd70b29719e9f3458faad26d4fe191f6f2bc46ebe2a99b936425d1b34790be10221f7c568c678c1c880200acf5851a51ed95ecb4b0f30ba4
-
MD5
763b8d0deda97e91ab467eecc77880ab
SHA1e039dc6ac85e4a19d6d5af4ff477002923e37982
SHA2560afa86629c49239f445a3989476de5c0c247ff6d77a65739c3419854f4c78a07
SHA512ad850f8c2664df8380f997bb7f8e0d823f93aca5faca1d49e6787e17259bad2d80e5a5d698888fc1d7215ecaae0a0d2328c2e23383bd07cd46075bee54b8c5b4
-
MD5
b963abf9a7967b3a22da64c9193fc932
SHA10831556392b56c00b07f04deb5474c4202c545e8
SHA2566c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5
SHA51264514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2
-
MD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
MD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
MD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
42c6347146452117ae98dad4f06d6953
SHA1a113372acb37913a34e6d6e46c4b84004b3286aa
SHA256ea5a184fe57e1c2926bfc4b228ee0d338a66754779c665735b1176d3904ef399
SHA512d9b508bad5accab933ce6a961f2e46aa00b3b8c70c0233515271b32c6ee7be47141e3563a0c4b58354793b8fbe4e6da628a6890243695a047badf79691889da5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e