Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-12-2021 04:22
Static task
static1
Behavioral task
behavioral1
Sample
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe
Resource
win10-en-20211014
General
-
Target
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe
-
Size
248KB
-
MD5
e307fe0a3c486d12b1978f3f9c5f1662
-
SHA1
8d3ce9de0c1ff9d00f78936a4d144e5183834807
-
SHA256
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036
-
SHA512
b62b76e88cb73a143a273ab771c1a3b9ad4c2f3bbd1cd4e8226f4ef21190b419dad604c23ec729caf4b1f0dd91da7d882de7588cce4d302451a5766cea008bdb
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
remcos
3.3.2 Pro
J3J3-US
kent0mushinec0n3t.casacam.net:32095
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Pin.exe
-
copy_folder
J3J3-US
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
J3J3-US
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-TFIQE4
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
J3J3-US
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Extracted
raccoon
1.8.3-hotfix
b620be4c85b4051a92040003edbc322be4eb082d
-
url4cnc
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/844-141-0x00000000009B0000-0x0000000000B25000-memory.dmp family_redline behavioral1/memory/2520-178-0x00000000008C0000-0x00000000009D0000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 3688 created 3148 3688 WerFault.exe 1327.exe PID 2304 created 1420 2304 WerFault.exe 6B5A.exe -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
4BF.exe4BF.exe1327.exe6B5A.exe7493.exe7A50.exe6B5A.exe8B97.exe9647.exePin.exepid process 4540 4BF.exe 4436 4BF.exe 3148 1327.exe 652 6B5A.exe 844 7493.exe 1152 7A50.exe 1420 6B5A.exe 1796 8B97.exe 2520 9647.exe 2704 Pin.exe -
Deletes itself 1 IoCs
Processes:
pid process 2776 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Pin.exe7A50.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Pin.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\J3J3-US = "\"C:\\Users\\Admin\\AppData\\Roaming\\J3J3-US\\Pin.exe\"" Pin.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7A50.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\J3J3-US = "\"C:\\Users\\Admin\\AppData\\Roaming\\J3J3-US\\Pin.exe\"" 7A50.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe4BF.exe6B5A.exedescription pid process target process PID 2124 set thread context of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 4540 set thread context of 4436 4540 4BF.exe 4BF.exe PID 652 set thread context of 1420 652 6B5A.exe 6B5A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3688 3148 WerFault.exe 1327.exe 2452 1152 WerFault.exe 7A50.exe 2820 1152 WerFault.exe 7A50.exe 3940 1152 WerFault.exe 7A50.exe 4272 1152 WerFault.exe 7A50.exe 4068 1152 WerFault.exe 7A50.exe 2300 1152 WerFault.exe 7A50.exe 936 1152 WerFault.exe 7A50.exe 5060 2704 WerFault.exe Pin.exe 812 2704 WerFault.exe Pin.exe 1272 2704 WerFault.exe Pin.exe 1184 2704 WerFault.exe Pin.exe 2304 1420 WerFault.exe 6B5A.exe 1720 2704 WerFault.exe Pin.exe 1884 2704 WerFault.exe Pin.exe 2132 2704 WerFault.exe Pin.exe 2128 2704 WerFault.exe Pin.exe 2348 2704 WerFault.exe Pin.exe 2628 2704 WerFault.exe Pin.exe 2984 2704 WerFault.exe Pin.exe 3512 2704 WerFault.exe Pin.exe 3732 2704 WerFault.exe Pin.exe 3472 2704 WerFault.exe Pin.exe 3116 2704 WerFault.exe Pin.exe 3428 2704 WerFault.exe Pin.exe 2172 2704 WerFault.exe Pin.exe 3836 2704 WerFault.exe Pin.exe 3700 2704 WerFault.exe Pin.exe 4108 2704 WerFault.exe Pin.exe 2096 2704 WerFault.exe Pin.exe 3336 2704 WerFault.exe Pin.exe 3816 2704 WerFault.exe Pin.exe 4452 2704 WerFault.exe Pin.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe4BF.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4BF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4BF.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4BF.exe -
Modifies registry class 1 IoCs
Processes:
7A50.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings 7A50.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exepid process 724 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 724 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Pin.exepid process 2776 2704 Pin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe4BF.exepid process 724 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4436 4BF.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe9647.exeWerFault.exeWerFault.exe7493.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeRestorePrivilege 3688 WerFault.exe Token: SeBackupPrivilege 3688 WerFault.exe Token: SeDebugPrivilege 3688 WerFault.exe Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 2452 WerFault.exe Token: SeDebugPrivilege 2820 WerFault.exe Token: SeDebugPrivilege 3940 WerFault.exe Token: SeDebugPrivilege 4272 WerFault.exe Token: SeDebugPrivilege 4068 WerFault.exe Token: SeDebugPrivilege 2300 WerFault.exe Token: SeDebugPrivilege 936 WerFault.exe Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 2520 9647.exe Token: SeDebugPrivilege 5060 WerFault.exe Token: SeDebugPrivilege 812 WerFault.exe Token: SeDebugPrivilege 844 7493.exe Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 1272 WerFault.exe Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 1184 WerFault.exe Token: SeDebugPrivilege 2304 WerFault.exe Token: SeDebugPrivilege 1720 WerFault.exe Token: SeDebugPrivilege 1884 WerFault.exe Token: SeDebugPrivilege 2132 WerFault.exe Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 2128 WerFault.exe Token: SeDebugPrivilege 2348 WerFault.exe Token: SeDebugPrivilege 2628 WerFault.exe Token: SeDebugPrivilege 2984 WerFault.exe Token: SeDebugPrivilege 3512 WerFault.exe Token: SeDebugPrivilege 3732 WerFault.exe Token: SeDebugPrivilege 3472 WerFault.exe Token: SeDebugPrivilege 3116 WerFault.exe Token: SeDebugPrivilege 3428 WerFault.exe Token: SeDebugPrivilege 2172 WerFault.exe Token: SeDebugPrivilege 3836 WerFault.exe Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 3700 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Pin.exepid process 2704 Pin.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe4BF.exe6B5A.exe7A50.exeWScript.execmd.exePin.exedescription pid process target process PID 2124 wrote to memory of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 2124 wrote to memory of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 2124 wrote to memory of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 2124 wrote to memory of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 2124 wrote to memory of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 2124 wrote to memory of 724 2124 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe 4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe PID 2776 wrote to memory of 4540 2776 4BF.exe PID 2776 wrote to memory of 4540 2776 4BF.exe PID 2776 wrote to memory of 4540 2776 4BF.exe PID 4540 wrote to memory of 4436 4540 4BF.exe 4BF.exe PID 4540 wrote to memory of 4436 4540 4BF.exe 4BF.exe PID 4540 wrote to memory of 4436 4540 4BF.exe 4BF.exe PID 4540 wrote to memory of 4436 4540 4BF.exe 4BF.exe PID 4540 wrote to memory of 4436 4540 4BF.exe 4BF.exe PID 4540 wrote to memory of 4436 4540 4BF.exe 4BF.exe PID 2776 wrote to memory of 3148 2776 1327.exe PID 2776 wrote to memory of 3148 2776 1327.exe PID 2776 wrote to memory of 3148 2776 1327.exe PID 2776 wrote to memory of 652 2776 6B5A.exe PID 2776 wrote to memory of 652 2776 6B5A.exe PID 2776 wrote to memory of 652 2776 6B5A.exe PID 2776 wrote to memory of 844 2776 7493.exe PID 2776 wrote to memory of 844 2776 7493.exe PID 2776 wrote to memory of 844 2776 7493.exe PID 2776 wrote to memory of 1152 2776 7A50.exe PID 2776 wrote to memory of 1152 2776 7A50.exe PID 2776 wrote to memory of 1152 2776 7A50.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 652 wrote to memory of 1420 652 6B5A.exe 6B5A.exe PID 2776 wrote to memory of 1796 2776 8B97.exe PID 2776 wrote to memory of 1796 2776 8B97.exe PID 2776 wrote to memory of 1796 2776 8B97.exe PID 2776 wrote to memory of 2520 2776 9647.exe PID 2776 wrote to memory of 2520 2776 9647.exe PID 2776 wrote to memory of 2520 2776 9647.exe PID 1152 wrote to memory of 2356 1152 7A50.exe WScript.exe PID 1152 wrote to memory of 2356 1152 7A50.exe WScript.exe PID 1152 wrote to memory of 2356 1152 7A50.exe WScript.exe PID 2356 wrote to memory of 3600 2356 WScript.exe cmd.exe PID 2356 wrote to memory of 3600 2356 WScript.exe cmd.exe PID 2356 wrote to memory of 3600 2356 WScript.exe cmd.exe PID 3600 wrote to memory of 2704 3600 cmd.exe Pin.exe PID 3600 wrote to memory of 2704 3600 cmd.exe Pin.exe PID 3600 wrote to memory of 2704 3600 cmd.exe Pin.exe PID 2704 wrote to memory of 2084 2704 Pin.exe svchost.exe PID 2704 wrote to memory of 2084 2704 Pin.exe svchost.exe PID 2704 wrote to memory of 2084 2704 Pin.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe"C:\Users\Admin\AppData\Local\Temp\4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe"C:\Users\Admin\AppData\Local\Temp\4cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4BF.exeC:\Users\Admin\AppData\Local\Temp\4BF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4BF.exeC:\Users\Admin\AppData\Local\Temp\4BF.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1327.exeC:\Users\Admin\AppData\Local\Temp\1327.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 4762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6B5A.exeC:\Users\Admin\AppData\Local\Temp\6B5A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6B5A.exeC:\Users\Admin\AppData\Local\Temp\6B5A.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 8763⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7493.exeC:\Users\Admin\AppData\Local\Temp\7493.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7A50.exeC:\Users\Admin\AppData\Local\Temp\7A50.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 6322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 10642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 11042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 9762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeC:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 6765⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 7205⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 6685⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 6805⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 8125⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 7205⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 8205⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 8725⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 9325⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 10205⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 10485⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 10925⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 11365⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 11765⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 12085⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 12285⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 12685⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 12965⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 12285⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 12565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 13765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 14685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 15085⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 15325⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\8B97.exeC:\Users\Admin\AppData\Local\Temp\8B97.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\9647.exeC:\Users\Admin\AppData\Local\Temp\9647.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1327.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\1327.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\4BF.exeMD5
e307fe0a3c486d12b1978f3f9c5f1662
SHA18d3ce9de0c1ff9d00f78936a4d144e5183834807
SHA2564cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036
SHA512b62b76e88cb73a143a273ab771c1a3b9ad4c2f3bbd1cd4e8226f4ef21190b419dad604c23ec729caf4b1f0dd91da7d882de7588cce4d302451a5766cea008bdb
-
C:\Users\Admin\AppData\Local\Temp\4BF.exeMD5
e307fe0a3c486d12b1978f3f9c5f1662
SHA18d3ce9de0c1ff9d00f78936a4d144e5183834807
SHA2564cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036
SHA512b62b76e88cb73a143a273ab771c1a3b9ad4c2f3bbd1cd4e8226f4ef21190b419dad604c23ec729caf4b1f0dd91da7d882de7588cce4d302451a5766cea008bdb
-
C:\Users\Admin\AppData\Local\Temp\4BF.exeMD5
e307fe0a3c486d12b1978f3f9c5f1662
SHA18d3ce9de0c1ff9d00f78936a4d144e5183834807
SHA2564cf30b31cc33da057ccb53a20c0a24be8f62dea31f04f77cb65b931120c82036
SHA512b62b76e88cb73a143a273ab771c1a3b9ad4c2f3bbd1cd4e8226f4ef21190b419dad604c23ec729caf4b1f0dd91da7d882de7588cce4d302451a5766cea008bdb
-
C:\Users\Admin\AppData\Local\Temp\6B5A.exeMD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
C:\Users\Admin\AppData\Local\Temp\6B5A.exeMD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
C:\Users\Admin\AppData\Local\Temp\6B5A.exeMD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
C:\Users\Admin\AppData\Local\Temp\7493.exeMD5
4df0d4be3b3abb5ca237d11013411885
SHA17b9376e633769eb52a70ec887143826f924f6fee
SHA2562cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813
SHA51214e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7
-
C:\Users\Admin\AppData\Local\Temp\7493.exeMD5
4df0d4be3b3abb5ca237d11013411885
SHA17b9376e633769eb52a70ec887143826f924f6fee
SHA2562cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813
SHA51214e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7
-
C:\Users\Admin\AppData\Local\Temp\7A50.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
C:\Users\Admin\AppData\Local\Temp\7A50.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
C:\Users\Admin\AppData\Local\Temp\8B97.exeMD5
4d96f213bfbba34ffba4986724d3a99c
SHA1b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526
SHA256f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7
SHA5124e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937
-
C:\Users\Admin\AppData\Local\Temp\8B97.exeMD5
4d96f213bfbba34ffba4986724d3a99c
SHA1b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526
SHA256f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7
SHA5124e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937
-
C:\Users\Admin\AppData\Local\Temp\9647.exeMD5
40f480638f2e8462929a662217a64c5b
SHA1e72a9399e1ba8d61f26ba9a6e300e92d8bcd656e
SHA2564602413ecd189f0a449f0ae14ba743d35a1b179bb6d2dc227dec2dd048611f60
SHA512da9a5d796821f9fc648e2a8b0ccda133f1f276b2c55cc06b5cf158da805b1c6147348fc2e5f8177a96c78d9b178bb1321fd693dcf615f10584d2ae90a689c365
-
C:\Users\Admin\AppData\Local\Temp\9647.exeMD5
40f480638f2e8462929a662217a64c5b
SHA1e72a9399e1ba8d61f26ba9a6e300e92d8bcd656e
SHA2564602413ecd189f0a449f0ae14ba743d35a1b179bb6d2dc227dec2dd048611f60
SHA512da9a5d796821f9fc648e2a8b0ccda133f1f276b2c55cc06b5cf158da805b1c6147348fc2e5f8177a96c78d9b178bb1321fd693dcf615f10584d2ae90a689c365
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
256e7a70ca1ef93cff42b57fc0fc46c1
SHA19906eb27fbc1347a1e28d1ec7093a73d918f189c
SHA256e2f56d838a6183db9a39c3f8c63c20823efbd985abbfbe3ff5b47927c2a8d548
SHA512645cfc259d5551b00184126fffaad9b645ba673c433a76109935eadd711907b73f9df86c77078769bad3ae0e89b86f3cf9811e2cc54ca3e0a54b1ccd16a5f350
-
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
C:\Users\Admin\AppData\Roaming\J3J3-US\Pin.exeMD5
6f78f5cf377470fc449263eaf2231dac
SHA1067211e73b880a6a7c9c01ac2c309ea49579ad1f
SHA2562fae5c7782b7c0cf7e205c1cf79400ef3c88c261b51882fb7f5dadab37013cf9
SHA512cc4c07d4b7072391e8c3d182f6a0f85f6994a40b0e0f4d8d2158cd9c6f112e58e2f45f3fff3205c9e7c2e18940f24f713e558aa608683fb897346953d05e758c
-
memory/652-163-0x0000000000790000-0x000000000081F000-memory.dmpFilesize
572KB
-
memory/652-135-0x0000000000000000-mapping.dmp
-
memory/652-157-0x0000000000591000-0x00000000005F7000-memory.dmpFilesize
408KB
-
memory/724-118-0x0000000000402F47-mapping.dmp
-
memory/724-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/844-149-0x0000000071000000-0x0000000071080000-memory.dmpFilesize
512KB
-
memory/844-201-0x0000000005DB0000-0x0000000005DB1000-memory.dmpFilesize
4KB
-
memory/844-142-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/844-143-0x0000000075000000-0x00000000751C2000-memory.dmpFilesize
1.8MB
-
memory/844-144-0x0000000000960000-0x00000000009A3000-memory.dmpFilesize
268KB
-
memory/844-145-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/844-146-0x0000000073B80000-0x0000000073C71000-memory.dmpFilesize
964KB
-
memory/844-147-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/844-165-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/844-205-0x0000000006470000-0x0000000006471000-memory.dmpFilesize
4KB
-
memory/844-203-0x0000000005ED0000-0x0000000005ED1000-memory.dmpFilesize
4KB
-
memory/844-141-0x00000000009B0000-0x0000000000B25000-memory.dmpFilesize
1.5MB
-
memory/844-153-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/844-154-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/844-155-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/844-156-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/844-158-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/844-138-0x0000000000000000-mapping.dmp
-
memory/844-160-0x0000000074450000-0x00000000749D4000-memory.dmpFilesize
5.5MB
-
memory/844-199-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/844-220-0x0000000006190000-0x0000000006191000-memory.dmpFilesize
4KB
-
memory/844-166-0x000000006F2C0000-0x000000006F30B000-memory.dmpFilesize
300KB
-
memory/844-161-0x0000000075650000-0x0000000076998000-memory.dmpFilesize
19.3MB
-
memory/1152-173-0x0000000000510000-0x00000000005BE000-memory.dmpFilesize
696KB
-
memory/1152-150-0x0000000000000000-mapping.dmp
-
memory/1152-174-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/1420-200-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/1420-196-0x000000000346C000-0x00000000034BB000-memory.dmpFilesize
316KB
-
memory/1420-167-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/1420-198-0x00000000033C0000-0x000000000344F000-memory.dmpFilesize
572KB
-
memory/1420-197-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/1420-159-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/1420-162-0x0000000000456A80-mapping.dmp
-
memory/1796-168-0x0000000000000000-mapping.dmp
-
memory/1796-171-0x0000000002780000-0x00000000027C7000-memory.dmpFilesize
284KB
-
memory/2124-115-0x00000000004F9000-0x0000000000502000-memory.dmpFilesize
36KB
-
memory/2124-116-0x00000000005E0000-0x00000000005E9000-memory.dmpFilesize
36KB
-
memory/2356-202-0x0000000000000000-mapping.dmp
-
memory/2520-193-0x0000000075650000-0x0000000076998000-memory.dmpFilesize
19.3MB
-
memory/2520-192-0x0000000074450000-0x00000000749D4000-memory.dmpFilesize
5.5MB
-
memory/2520-182-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/2520-184-0x0000000071000000-0x0000000071080000-memory.dmpFilesize
512KB
-
memory/2520-187-0x0000000000AD0000-0x0000000000B7E000-memory.dmpFilesize
696KB
-
memory/2520-189-0x0000000002670000-0x0000000002671000-memory.dmpFilesize
4KB
-
memory/2520-190-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/2520-209-0x0000000005510000-0x0000000005511000-memory.dmpFilesize
4KB
-
memory/2520-180-0x0000000075000000-0x00000000751C2000-memory.dmpFilesize
1.8MB
-
memory/2520-195-0x000000006F2C0000-0x000000006F30B000-memory.dmpFilesize
300KB
-
memory/2520-217-0x0000000007120000-0x0000000007121000-memory.dmpFilesize
4KB
-
memory/2520-179-0x0000000000B20000-0x0000000000B21000-memory.dmpFilesize
4KB
-
memory/2520-178-0x00000000008C0000-0x00000000009D0000-memory.dmpFilesize
1.1MB
-
memory/2520-216-0x0000000006A20000-0x0000000006A21000-memory.dmpFilesize
4KB
-
memory/2520-175-0x0000000000000000-mapping.dmp
-
memory/2520-181-0x0000000073B80000-0x0000000073C71000-memory.dmpFilesize
964KB
-
memory/2704-213-0x0000000000000000-mapping.dmp
-
memory/2704-221-0x0000000000400000-0x0000000000504000-memory.dmpFilesize
1.0MB
-
memory/2704-219-0x00000000007C0000-0x0000000000835000-memory.dmpFilesize
468KB
-
memory/2704-218-0x0000000000581000-0x00000000005C6000-memory.dmpFilesize
276KB
-
memory/2776-119-0x0000000002390000-0x00000000023A6000-memory.dmpFilesize
88KB
-
memory/2776-134-0x00000000029E0000-0x00000000029F6000-memory.dmpFilesize
88KB
-
memory/3148-133-0x0000000000400000-0x0000000002B64000-memory.dmpFilesize
39.4MB
-
memory/3148-132-0x00000000001F0000-0x00000000001F9000-memory.dmpFilesize
36KB
-
memory/3148-128-0x0000000000000000-mapping.dmp
-
memory/3148-131-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/3600-211-0x0000000000000000-mapping.dmp
-
memory/4436-125-0x0000000000402F47-mapping.dmp
-
memory/4540-127-0x0000000000450000-0x000000000059A000-memory.dmpFilesize
1.3MB
-
memory/4540-120-0x0000000000000000-mapping.dmp
-
memory/4540-123-0x00000000006D8000-0x00000000006E1000-memory.dmpFilesize
36KB