Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11-12-2021 20:25
Static task
static1
Behavioral task
behavioral1
Sample
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe
Resource
win10-en-20211208
General
-
Target
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe
-
Size
182KB
-
MD5
4e015961ae263f4831e73570f1f832db
-
SHA1
51972501e662965957b9fd19bc738f5e5d211ffa
-
SHA256
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35
-
SHA512
f2573c0f85447cc79c0a9398bef482237b8383767dd409a9b314f39ac6d985586e6fa954bb0d699daf554c21b04462581cb199be0a842a99ad23a45821508db3
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1276-138-0x0000000000EE0000-0x0000000000F49000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-163-0x00000000001E0000-0x00000000001FC000-memory.dmp family_arkei behavioral1/memory/1720-164-0x0000000000400000-0x0000000000827000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
C9A5.exeC9A5.exe4975.exeA3BB.exeA8EC.exeBC08.exeE23E.exeE627.exeE6B5.exeCAC.exeRitornata.exe.comRitornata.exe.comkgomzxwd.exepid process 924 C9A5.exe 2108 C9A5.exe 2696 4975.exe 1276 A3BB.exe 2376 A8EC.exe 1720 BC08.exe 2156 E23E.exe 3156 E627.exe 632 E6B5.exe 3248 CAC.exe 1148 Ritornata.exe.com 1232 Ritornata.exe.com 1228 kgomzxwd.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
E627.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E627.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E627.exe -
Deletes itself 1 IoCs
Processes:
pid process 3068 -
Drops startup file 1 IoCs
Processes:
Ritornata.exe.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WjVcWskkmD.url Ritornata.exe.com -
Loads dropped DLL 1 IoCs
Processes:
BC08.exepid process 1720 BC08.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
CAC.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce CAC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" CAC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
E627.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E627.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
A3BB.exeA8EC.exeE627.exepid process 1276 A3BB.exe 2376 A8EC.exe 3156 E627.exe 3156 E627.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exeC9A5.exekgomzxwd.exedescription pid process target process PID 3980 set thread context of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 924 set thread context of 2108 924 C9A5.exe C9A5.exe PID 1228 set thread context of 2932 1228 kgomzxwd.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
C9A5.exe4975.exeE23E.exe9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C9A5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4975.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4975.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E23E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C9A5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E23E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E23E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C9A5.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exepid process 3228 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 3228 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3068 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exeC9A5.exe4975.exeE23E.exepid process 3228 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 2108 C9A5.exe 2696 4975.exe 2156 E23E.exe 3068 3068 3068 3068 -
Suspicious use of AdjustPrivilegeToken 57 IoCs
Processes:
A3BB.exedescription pid process Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeDebugPrivilege 1276 A3BB.exe Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 Token: SeShutdownPrivilege 3068 Token: SeCreatePagefilePrivilege 3068 -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
Ritornata.exe.comRitornata.exe.compid process 1148 Ritornata.exe.com 3068 3068 1148 Ritornata.exe.com 1148 Ritornata.exe.com 3068 3068 1232 Ritornata.exe.com 3068 3068 1232 Ritornata.exe.com 1232 Ritornata.exe.com 3068 3068 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
Ritornata.exe.comRitornata.exe.compid process 1148 Ritornata.exe.com 1148 Ritornata.exe.com 1148 Ritornata.exe.com 1232 Ritornata.exe.com 1232 Ritornata.exe.com 1232 Ritornata.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exeC9A5.exeCAC.execmd.execmd.exeE6B5.exeRitornata.exe.comdescription pid process target process PID 3980 wrote to memory of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 3980 wrote to memory of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 3980 wrote to memory of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 3980 wrote to memory of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 3980 wrote to memory of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 3980 wrote to memory of 3228 3980 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe 9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe PID 3068 wrote to memory of 924 3068 C9A5.exe PID 3068 wrote to memory of 924 3068 C9A5.exe PID 3068 wrote to memory of 924 3068 C9A5.exe PID 924 wrote to memory of 2108 924 C9A5.exe C9A5.exe PID 924 wrote to memory of 2108 924 C9A5.exe C9A5.exe PID 924 wrote to memory of 2108 924 C9A5.exe C9A5.exe PID 924 wrote to memory of 2108 924 C9A5.exe C9A5.exe PID 924 wrote to memory of 2108 924 C9A5.exe C9A5.exe PID 924 wrote to memory of 2108 924 C9A5.exe C9A5.exe PID 3068 wrote to memory of 2696 3068 4975.exe PID 3068 wrote to memory of 2696 3068 4975.exe PID 3068 wrote to memory of 2696 3068 4975.exe PID 3068 wrote to memory of 1276 3068 A3BB.exe PID 3068 wrote to memory of 1276 3068 A3BB.exe PID 3068 wrote to memory of 1276 3068 A3BB.exe PID 3068 wrote to memory of 2376 3068 A8EC.exe PID 3068 wrote to memory of 2376 3068 A8EC.exe PID 3068 wrote to memory of 2376 3068 A8EC.exe PID 3068 wrote to memory of 1720 3068 BC08.exe PID 3068 wrote to memory of 1720 3068 BC08.exe PID 3068 wrote to memory of 1720 3068 BC08.exe PID 3068 wrote to memory of 2156 3068 E23E.exe PID 3068 wrote to memory of 2156 3068 E23E.exe PID 3068 wrote to memory of 2156 3068 E23E.exe PID 3068 wrote to memory of 3156 3068 E627.exe PID 3068 wrote to memory of 3156 3068 E627.exe PID 3068 wrote to memory of 3156 3068 E627.exe PID 3068 wrote to memory of 632 3068 E6B5.exe PID 3068 wrote to memory of 632 3068 E6B5.exe PID 3068 wrote to memory of 632 3068 E6B5.exe PID 3068 wrote to memory of 3248 3068 CAC.exe PID 3068 wrote to memory of 3248 3068 CAC.exe PID 3068 wrote to memory of 3248 3068 CAC.exe PID 3248 wrote to memory of 1956 3248 CAC.exe expand.exe PID 3248 wrote to memory of 1956 3248 CAC.exe expand.exe PID 3248 wrote to memory of 1956 3248 CAC.exe expand.exe PID 3248 wrote to memory of 1804 3248 CAC.exe cmd.exe PID 3248 wrote to memory of 1804 3248 CAC.exe cmd.exe PID 3248 wrote to memory of 1804 3248 CAC.exe cmd.exe PID 1804 wrote to memory of 2804 1804 cmd.exe cmd.exe PID 1804 wrote to memory of 2804 1804 cmd.exe cmd.exe PID 1804 wrote to memory of 2804 1804 cmd.exe cmd.exe PID 2804 wrote to memory of 3096 2804 cmd.exe findstr.exe PID 2804 wrote to memory of 3096 2804 cmd.exe findstr.exe PID 2804 wrote to memory of 3096 2804 cmd.exe findstr.exe PID 2804 wrote to memory of 1148 2804 cmd.exe Ritornata.exe.com PID 2804 wrote to memory of 1148 2804 cmd.exe Ritornata.exe.com PID 2804 wrote to memory of 1148 2804 cmd.exe Ritornata.exe.com PID 1804 wrote to memory of 1476 1804 cmd.exe PING.EXE PID 1804 wrote to memory of 1476 1804 cmd.exe PING.EXE PID 1804 wrote to memory of 1476 1804 cmd.exe PING.EXE PID 632 wrote to memory of 2112 632 E6B5.exe cmd.exe PID 632 wrote to memory of 2112 632 E6B5.exe cmd.exe PID 632 wrote to memory of 2112 632 E6B5.exe cmd.exe PID 1148 wrote to memory of 1232 1148 Ritornata.exe.com Ritornata.exe.com PID 1148 wrote to memory of 1232 1148 Ritornata.exe.com Ritornata.exe.com PID 1148 wrote to memory of 1232 1148 Ritornata.exe.com Ritornata.exe.com PID 632 wrote to memory of 64 632 E6B5.exe cmd.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe"C:\Users\Admin\AppData\Local\Temp\9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe"C:\Users\Admin\AppData\Local\Temp\9c21a7bd803ebd7f4d321ffe4cf821e562e6969dbc0746bba592e2a77cea4a35.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\C9A5.exeC:\Users\Admin\AppData\Local\Temp\C9A5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\C9A5.exeC:\Users\Admin\AppData\Local\Temp\C9A5.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\4975.exeC:\Users\Admin\AppData\Local\Temp\4975.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2696
-
C:\Users\Admin\AppData\Local\Temp\A3BB.exeC:\Users\Admin\AppData\Local\Temp\A3BB.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
C:\Users\Admin\AppData\Local\Temp\A8EC.exeC:\Users\Admin\AppData\Local\Temp\A8EC.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2376
-
C:\Users\Admin\AppData\Local\Temp\BC08.exeC:\Users\Admin\AppData\Local\Temp\BC08.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720
-
C:\Users\Admin\AppData\Local\Temp\E23E.exeC:\Users\Admin\AppData\Local\Temp\E23E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2156
-
C:\Users\Admin\AppData\Local\Temp\E627.exeC:\Users\Admin\AppData\Local\Temp\E627.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3156
-
C:\Users\Admin\AppData\Local\Temp\E6B5.exeC:\Users\Admin\AppData\Local\Temp\E6B5.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jqhnyzti\2⤵PID:2112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kgomzxwd.exe" C:\Windows\SysWOW64\jqhnyzti\2⤵PID:64
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jqhnyzti binPath= "C:\Windows\SysWOW64\jqhnyzti\kgomzxwd.exe /d\"C:\Users\Admin\AppData\Local\Temp\E6B5.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1880
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jqhnyzti "wifi internet conection"2⤵PID:2700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jqhnyzti2⤵PID:1304
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\CAC.exeC:\Users\Admin\AppData\Local\Temp\CAC.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\expand.exeexpand2⤵PID:1956
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sua.swf & ping 127.0.0.1 -n 302⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^rMRqhEQoWQMXQgLMfHZtmEjotrVzghKKxWsooRyoMqguqYanogPNqINnAJVlIvUIywCTXCDbBRanduoyKblqnXJMpSInVVmf$" Obliare.swf4⤵PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comRitornata.exe.com G4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritornata.exe.com G5⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1232
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 303⤵
- Runs ping.exe
PID:1476
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2696
-
C:\Windows\SysWOW64\jqhnyzti\kgomzxwd.exeC:\Windows\SysWOW64\jqhnyzti\kgomzxwd.exe /d"C:\Users\Admin\AppData\Local\Temp\E6B5.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1228 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2932
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
MD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
MD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
MD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
MD5
e26d8f7e34309ad9b0284ff505c7c6c7
SHA1c4dc22998c4d2a84fe8a847b3f49d8ccf57469dd
SHA2566c0b92289cd78bf44bd04f28e8438dcefcfdd6421d31ccd9695fbe08a48a1cb7
SHA5129567abf55f809e84cfff446aef7d5553c997886c2dff2f884dd7b7a8fd0f99d9dd4d0ba0e0708b3d91ab22b063304eb7c9e94d563120c8eca5858991bcfb20be
-
MD5
e26d8f7e34309ad9b0284ff505c7c6c7
SHA1c4dc22998c4d2a84fe8a847b3f49d8ccf57469dd
SHA2566c0b92289cd78bf44bd04f28e8438dcefcfdd6421d31ccd9695fbe08a48a1cb7
SHA5129567abf55f809e84cfff446aef7d5553c997886c2dff2f884dd7b7a8fd0f99d9dd4d0ba0e0708b3d91ab22b063304eb7c9e94d563120c8eca5858991bcfb20be
-
MD5
18b847c6bbc5816b488387b681ee5e2a
SHA12a025e1acd0f1bc5740177b7093b1d96359d2fe7
SHA25658f7efebd3a405758377f0188ceb347c46fa8c0927458bc9ee327e4a5ddcc551
SHA5121e2b402f7155fbf9928d431a7bcd3da25cdbce284c48c49ba91e40a9ac4b8c142c3d6339c00584c0a04a674e651d2ca7e7094a20143c91c624d097409b61d762
-
MD5
18b847c6bbc5816b488387b681ee5e2a
SHA12a025e1acd0f1bc5740177b7093b1d96359d2fe7
SHA25658f7efebd3a405758377f0188ceb347c46fa8c0927458bc9ee327e4a5ddcc551
SHA5121e2b402f7155fbf9928d431a7bcd3da25cdbce284c48c49ba91e40a9ac4b8c142c3d6339c00584c0a04a674e651d2ca7e7094a20143c91c624d097409b61d762
-
MD5
18b847c6bbc5816b488387b681ee5e2a
SHA12a025e1acd0f1bc5740177b7093b1d96359d2fe7
SHA25658f7efebd3a405758377f0188ceb347c46fa8c0927458bc9ee327e4a5ddcc551
SHA5121e2b402f7155fbf9928d431a7bcd3da25cdbce284c48c49ba91e40a9ac4b8c142c3d6339c00584c0a04a674e651d2ca7e7094a20143c91c624d097409b61d762
-
MD5
7b98554d2ad0041be3a00121d8fcf9c3
SHA1187a35c3e84d0b4afef32705987c840f6729e133
SHA256f83ad7329b642727ff0e4b9f4b690ad55588f605000ecb6643ac959f1a8f0b61
SHA512324abecfd87060a9dd7b7a151eb8502f72123c242dee4ac3387c6d6ba3c92f6a4a452a006e58bf897b1a8af803686c5975e58dfb29bb3bd45aebc810ed264cab
-
MD5
7b98554d2ad0041be3a00121d8fcf9c3
SHA1187a35c3e84d0b4afef32705987c840f6729e133
SHA256f83ad7329b642727ff0e4b9f4b690ad55588f605000ecb6643ac959f1a8f0b61
SHA512324abecfd87060a9dd7b7a151eb8502f72123c242dee4ac3387c6d6ba3c92f6a4a452a006e58bf897b1a8af803686c5975e58dfb29bb3bd45aebc810ed264cab
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
MD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
MD5
a5f465ca53a5f942de3ea850f4513cbe
SHA196cdb26ffabb01023ad6f0974b4e144be94d6153
SHA2568ee4b6dda5d2301ff5b82d96c6e1c5e0e51c2a0319729843c1ce539e1d3a658f
SHA5120f4f3b7442e45f062f82ce94fbc63d8e29067fdfa9e07eace8b7b7dcfe38900ca4a15b8b051e1d7d9587b49ee7c34b1b8f2c05e90b73bf006ded8a82364b4d6e
-
MD5
a5f465ca53a5f942de3ea850f4513cbe
SHA196cdb26ffabb01023ad6f0974b4e144be94d6153
SHA2568ee4b6dda5d2301ff5b82d96c6e1c5e0e51c2a0319729843c1ce539e1d3a658f
SHA5120f4f3b7442e45f062f82ce94fbc63d8e29067fdfa9e07eace8b7b7dcfe38900ca4a15b8b051e1d7d9587b49ee7c34b1b8f2c05e90b73bf006ded8a82364b4d6e
-
MD5
95c74f05449c333404f7950c69d3e33f
SHA1240e2f9e7618205c1f8ffbdd69fc52a5c91cbb91
SHA256b668e2177b7fa3d46043a44207727d3f34ade3ef705b79b9282baa9af95c2237
SHA512af09e16f506c3ef6abefcb8b498adc26b86d298b9f62326b267a79a8bcadcb50f262399218ab9f773c39e4b6e36806f6868929d75ae38ee44f97b4e2c579bfe8
-
MD5
95c74f05449c333404f7950c69d3e33f
SHA1240e2f9e7618205c1f8ffbdd69fc52a5c91cbb91
SHA256b668e2177b7fa3d46043a44207727d3f34ade3ef705b79b9282baa9af95c2237
SHA512af09e16f506c3ef6abefcb8b498adc26b86d298b9f62326b267a79a8bcadcb50f262399218ab9f773c39e4b6e36806f6868929d75ae38ee44f97b4e2c579bfe8
-
MD5
334523bbfc07a1b34a74818abca7c0f9
SHA14e907ef95f8688cc664f8a7c7bea8528326b5c13
SHA256e6eeee3a8b0e45f40a91009c7e9d88fead35488be479ea2e6c1551ea7e0b858d
SHA512f6201203ccff5e84a52bb2dd8b97424d8af2477b95eff050ccae9183c00d920b57a6f7f59676a9b4a3c5d41b4167af5881f187e858beaff2b277257e45cc0a44
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
2a32b7f3c1946406510c9e4ea9c7a596
SHA18f76d3378f55ed00db68d0d6436ce762bf2fbc3c
SHA25641713060860a2ee98e0179860cbec578256b1552199b7ad8b1bbfc1e464436f5
SHA51278982b49045b808375cadf600647b7610b41a120f17d45639471541805b011eaa61693cd20ba9841c494b6ee5e22ab05c94e4a63b3e8b77fa22b1a8603dbae43
-
MD5
9c02df139f1ef78f9525c29a1869bf34
SHA1eba16ea9831f31eb7649365ebbbf338416bd0483
SHA25673eac28ea79285407060122a67365b5ff7eafe0e385d9fe332ebe0f7dfc69d3c
SHA51225ac097724064a97e74e72ea104bfd5a1564746965b690f2118ca12e949594e285150e3c667da0df46885eb35360819befbefa1b60e5f31f4a5987cae7473616
-
MD5
9c02df139f1ef78f9525c29a1869bf34
SHA1eba16ea9831f31eb7649365ebbbf338416bd0483
SHA25673eac28ea79285407060122a67365b5ff7eafe0e385d9fe332ebe0f7dfc69d3c
SHA51225ac097724064a97e74e72ea104bfd5a1564746965b690f2118ca12e949594e285150e3c667da0df46885eb35360819befbefa1b60e5f31f4a5987cae7473616
-
MD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c