Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-12-2021 03:47
Static task
static1
Behavioral task
behavioral1
Sample
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe
Resource
win10-en-20211208
General
-
Target
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe
-
Size
182KB
-
MD5
df9548cbcf563c0ac307f3a8b33495db
-
SHA1
24f1b92b8587032fdba085e06326bdb89c9e0f15
-
SHA256
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
-
SHA512
04e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
raccoon
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/404-133-0x0000000000CD0000-0x0000000000D39000-memory.dmp family_redline behavioral1/memory/3188-145-0x00000000012F0000-0x0000000001404000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 3588 created 1292 3588 WerFault.exe 3B14.exe PID 2400 created 2248 2400 WerFault.exe wfhjgcg -
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1560-179-0x00000000001E0000-0x00000000001FC000-memory.dmp family_arkei behavioral1/memory/1560-180-0x0000000000400000-0x0000000000827000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
7BB4.exeDA30.exeDE96.exeE444.exeDA30.exeF8D7.exeD1C.exe11EF.exe2C9C.exeeoctwjgv.exe3B14.exetkools.exeBDB3.exetkools.exebjhjgcgwfhjgcgbjhjgcgpid process 3636 7BB4.exe 2656 DA30.exe 404 DE96.exe 3188 E444.exe 2556 DA30.exe 1560 F8D7.exe 2340 D1C.exe 1788 11EF.exe 2860 2C9C.exe 592 eoctwjgv.exe 1292 3B14.exe 3152 tkools.exe 1528 BDB3.exe 3528 tkools.exe 1720 bjhjgcg 2248 wfhjgcg 1188 bjhjgcg -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3B14.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3B14.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3B14.exe -
Deletes itself 1 IoCs
Processes:
pid process 3032 -
Loads dropped DLL 3 IoCs
Processes:
F8D7.exepid process 1560 F8D7.exe 1560 F8D7.exe 1560 F8D7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
3B14.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3B14.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
DE96.exeE444.exe3B14.exeBDB3.exepid process 404 DE96.exe 3188 E444.exe 1292 3B14.exe 1292 3B14.exe 1528 BDB3.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exeDA30.exeeoctwjgv.exebjhjgcgdescription pid process target process PID 2584 set thread context of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 2656 set thread context of 2556 2656 DA30.exe DA30.exe PID 592 set thread context of 3956 592 eoctwjgv.exe svchost.exe PID 1720 set thread context of 1188 1720 bjhjgcg bjhjgcg -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3588 1292 WerFault.exe 3B14.exe 2400 2248 WerFault.exe wfhjgcg -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe7BB4.exeDA30.exebjhjgcgD1C.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7BB4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bjhjgcg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7BB4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D1C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D1C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bjhjgcg Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bjhjgcg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7BB4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D1C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA30.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA30.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
F8D7.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 F8D7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString F8D7.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3324 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exepid process 1236 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 1236 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe7BB4.exeDA30.exeD1C.exepid process 1236 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 3636 7BB4.exe 2556 DA30.exe 2340 D1C.exe 3032 3032 3032 3032 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
E444.exeDE96.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 3188 E444.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 404 DE96.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeRestorePrivilege 3588 WerFault.exe Token: SeBackupPrivilege 3588 WerFault.exe Token: SeDebugPrivilege 3588 WerFault.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exeDA30.exe11EF.exe2C9C.exedescription pid process target process PID 2584 wrote to memory of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 2584 wrote to memory of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 2584 wrote to memory of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 2584 wrote to memory of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 2584 wrote to memory of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 2584 wrote to memory of 1236 2584 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe 616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe PID 3032 wrote to memory of 3636 3032 7BB4.exe PID 3032 wrote to memory of 3636 3032 7BB4.exe PID 3032 wrote to memory of 3636 3032 7BB4.exe PID 3032 wrote to memory of 2656 3032 DA30.exe PID 3032 wrote to memory of 2656 3032 DA30.exe PID 3032 wrote to memory of 2656 3032 DA30.exe PID 3032 wrote to memory of 404 3032 DE96.exe PID 3032 wrote to memory of 404 3032 DE96.exe PID 3032 wrote to memory of 404 3032 DE96.exe PID 3032 wrote to memory of 3188 3032 E444.exe PID 3032 wrote to memory of 3188 3032 E444.exe PID 3032 wrote to memory of 3188 3032 E444.exe PID 2656 wrote to memory of 2556 2656 DA30.exe DA30.exe PID 2656 wrote to memory of 2556 2656 DA30.exe DA30.exe PID 2656 wrote to memory of 2556 2656 DA30.exe DA30.exe PID 2656 wrote to memory of 2556 2656 DA30.exe DA30.exe PID 2656 wrote to memory of 2556 2656 DA30.exe DA30.exe PID 2656 wrote to memory of 2556 2656 DA30.exe DA30.exe PID 3032 wrote to memory of 1560 3032 F8D7.exe PID 3032 wrote to memory of 1560 3032 F8D7.exe PID 3032 wrote to memory of 1560 3032 F8D7.exe PID 3032 wrote to memory of 2340 3032 D1C.exe PID 3032 wrote to memory of 2340 3032 D1C.exe PID 3032 wrote to memory of 2340 3032 D1C.exe PID 3032 wrote to memory of 1788 3032 11EF.exe PID 3032 wrote to memory of 1788 3032 11EF.exe PID 3032 wrote to memory of 1788 3032 11EF.exe PID 1788 wrote to memory of 1476 1788 11EF.exe cmd.exe PID 1788 wrote to memory of 1476 1788 11EF.exe cmd.exe PID 1788 wrote to memory of 1476 1788 11EF.exe cmd.exe PID 1788 wrote to memory of 2252 1788 11EF.exe cmd.exe PID 1788 wrote to memory of 2252 1788 11EF.exe cmd.exe PID 1788 wrote to memory of 2252 1788 11EF.exe cmd.exe PID 3032 wrote to memory of 2860 3032 2C9C.exe PID 3032 wrote to memory of 2860 3032 2C9C.exe PID 3032 wrote to memory of 2860 3032 2C9C.exe PID 1788 wrote to memory of 1156 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1156 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1156 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1124 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1124 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1124 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1412 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1412 1788 11EF.exe sc.exe PID 1788 wrote to memory of 1412 1788 11EF.exe sc.exe PID 1788 wrote to memory of 3464 1788 11EF.exe netsh.exe PID 1788 wrote to memory of 3464 1788 11EF.exe netsh.exe PID 1788 wrote to memory of 3464 1788 11EF.exe netsh.exe PID 3032 wrote to memory of 1292 3032 3B14.exe PID 3032 wrote to memory of 1292 3032 3B14.exe PID 3032 wrote to memory of 1292 3032 3B14.exe PID 2860 wrote to memory of 3152 2860 2C9C.exe tkools.exe PID 2860 wrote to memory of 3152 2860 2C9C.exe tkools.exe PID 2860 wrote to memory of 3152 2860 2C9C.exe tkools.exe PID 3032 wrote to memory of 2076 3032 explorer.exe PID 3032 wrote to memory of 2076 3032 explorer.exe PID 3032 wrote to memory of 2076 3032 explorer.exe PID 3032 wrote to memory of 2076 3032 explorer.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe"C:\Users\Admin\AppData\Local\Temp\616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe"C:\Users\Admin\AppData\Local\Temp\616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\7BB4.exeC:\Users\Admin\AppData\Local\Temp\7BB4.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3636
-
C:\Users\Admin\AppData\Local\Temp\DA30.exeC:\Users\Admin\AppData\Local\Temp\DA30.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\DA30.exeC:\Users\Admin\AppData\Local\Temp\DA30.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\DE96.exeC:\Users\Admin\AppData\Local\Temp\DE96.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:404
-
C:\Users\Admin\AppData\Local\Temp\E444.exeC:\Users\Admin\AppData\Local\Temp\E444.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
C:\Users\Admin\AppData\Local\Temp\F8D7.exeC:\Users\Admin\AppData\Local\Temp\F8D7.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\F8D7.exe" & exit2⤵PID:2824
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\D1C.exeC:\Users\Admin\AppData\Local\Temp\D1C.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2340
-
C:\Users\Admin\AppData\Local\Temp\11EF.exeC:\Users\Admin\AppData\Local\Temp\11EF.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dmuujiec\2⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\eoctwjgv.exe" C:\Windows\SysWOW64\dmuujiec\2⤵PID:2252
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dmuujiec binPath= "C:\Windows\SysWOW64\dmuujiec\eoctwjgv.exe /d\"C:\Users\Admin\AppData\Local\Temp\11EF.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1156
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dmuujiec "wifi internet conection"2⤵PID:1124
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dmuujiec2⤵PID:1412
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\2C9C.exeC:\Users\Admin\AppData\Local\Temp\2C9C.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵PID:400
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵PID:2268
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
PID:3548
-
-
-
C:\Windows\SysWOW64\dmuujiec\eoctwjgv.exeC:\Windows\SysWOW64\dmuujiec\eoctwjgv.exe /d"C:\Users\Admin\AppData\Local\Temp\11EF.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:592 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\3B14.exeC:\Users\Admin\AppData\Local\Temp\3B14.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 9682⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\BDB3.exeC:\Users\Admin\AppData\Local\Temp\BDB3.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1528
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeC:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe1⤵
- Executes dropped EXE
PID:3528
-
C:\Users\Admin\AppData\Roaming\bjhjgcgC:\Users\Admin\AppData\Roaming\bjhjgcg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1720 -
C:\Users\Admin\AppData\Roaming\bjhjgcgC:\Users\Admin\AppData\Roaming\bjhjgcg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1188
-
-
C:\Users\Admin\AppData\Roaming\wfhjgcgC:\Users\Admin\AppData\Roaming\wfhjgcg1⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 2682⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:2400
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a84635b5c36d1edec196e145b4ce1112
SHA1f8e564d6c4f113dc2f2c8b837b4e8a521192269c
SHA256e5735565f66cd6ea7dd8450f4d5c1f50148def2c35ba1bf01bf2d7aacfaf0caa
SHA51228288f595d8cf9987970069218c9cb4bf38bf226820ad522fb14733d74e9cc24ec2470279eb16d3622072db23362ec67368bd4125d24bf27a063a6c8146ea277
-
MD5
a84635b5c36d1edec196e145b4ce1112
SHA1f8e564d6c4f113dc2f2c8b837b4e8a521192269c
SHA256e5735565f66cd6ea7dd8450f4d5c1f50148def2c35ba1bf01bf2d7aacfaf0caa
SHA51228288f595d8cf9987970069218c9cb4bf38bf226820ad522fb14733d74e9cc24ec2470279eb16d3622072db23362ec67368bd4125d24bf27a063a6c8146ea277
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
MD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
MD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
MD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
MD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
MD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
MD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
MD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
df9548cbcf563c0ac307f3a8b33495db
SHA124f1b92b8587032fdba085e06326bdb89c9e0f15
SHA256616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
SHA51204e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
-
MD5
df9548cbcf563c0ac307f3a8b33495db
SHA124f1b92b8587032fdba085e06326bdb89c9e0f15
SHA256616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
SHA51204e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
-
MD5
df9548cbcf563c0ac307f3a8b33495db
SHA124f1b92b8587032fdba085e06326bdb89c9e0f15
SHA256616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
SHA51204e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
-
MD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
MD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
MD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
MD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
MD5
c74f7c41942a30e25ce0f05b77581088
SHA1027eab3e274c1caad5afebf38779608f4c6805f1
SHA256990038c28dcd546872bf8b246893ab342b97996c75fa561cd52e1ce37bab47ae
SHA512002b89efef9898a73ee0616853e3b33f2ddd38ae1faf40ed1cec1af3e197bc235d27621e057697302a8f3a7079666dcb4d9038169ec75131e93b5643141de8ce
-
MD5
c74f7c41942a30e25ce0f05b77581088
SHA1027eab3e274c1caad5afebf38779608f4c6805f1
SHA256990038c28dcd546872bf8b246893ab342b97996c75fa561cd52e1ce37bab47ae
SHA512002b89efef9898a73ee0616853e3b33f2ddd38ae1faf40ed1cec1af3e197bc235d27621e057697302a8f3a7079666dcb4d9038169ec75131e93b5643141de8ce
-
MD5
7c23a3a0b37a554146131f7baa09e7b8
SHA1471b472b90d889eb0df1bfcc118eed0d858a0288
SHA256a43f21fb5e9dcfd40c9fa572b9e5a6605ab8e93950a7fa26435d72d9910dc152
SHA5123fde8d4cb1038410533434e1ba2cb017a389c81fc8587cdbf8d4f87c3b6173798eae9ed7b79f51840185a9dae768ff8a6ab8619f920357b242321b2bca67600e
-
MD5
df9548cbcf563c0ac307f3a8b33495db
SHA124f1b92b8587032fdba085e06326bdb89c9e0f15
SHA256616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
SHA51204e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
-
MD5
df9548cbcf563c0ac307f3a8b33495db
SHA124f1b92b8587032fdba085e06326bdb89c9e0f15
SHA256616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
SHA51204e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
-
MD5
df9548cbcf563c0ac307f3a8b33495db
SHA124f1b92b8587032fdba085e06326bdb89c9e0f15
SHA256616accef50cfe9a8ef3eb30b067b24fd5fdd88f097bb83b32ba866b94d2d8ff2
SHA51204e9c916ed3aafb6509b39fef1f158edbb1d9dedc3517d29088f20ccccb2ee85ddc39d7a87b33a99ca6d71ab48bfe01feea2873b7e1cc908f5581942fcf9a293
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
MD5
7c23a3a0b37a554146131f7baa09e7b8
SHA1471b472b90d889eb0df1bfcc118eed0d858a0288
SHA256a43f21fb5e9dcfd40c9fa572b9e5a6605ab8e93950a7fa26435d72d9910dc152
SHA5123fde8d4cb1038410533434e1ba2cb017a389c81fc8587cdbf8d4f87c3b6173798eae9ed7b79f51840185a9dae768ff8a6ab8619f920357b242321b2bca67600e
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
MD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c