Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
14-12-2021 20:45
Static task
static1
Behavioral task
behavioral1
Sample
16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe
Resource
win10-en-20211208
General
-
Target
16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe
-
Size
321KB
-
MD5
2247bec4be00052ab8d4ad21848087a7
-
SHA1
985b0400c54130ce241cb729a6cd8aac0b3fc3ea
-
SHA256
16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b
-
SHA512
4073a0d802ea3d1bc40511e5b3b1786fe536babf7e52f884f08f14b5f74137d2e9832a8090964b79027bd010d4b896897726fb7a3556a4bf20191c3d45499ead
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
icedid
3372020928
jeliskvosh.com
Extracted
raccoon
871b18794e3cbbc6476a5b391363702168853a50
-
url4cnc
http://194.180.174.53/duglassa1
http://91.219.236.18/duglassa1
http://194.180.174.41/duglassa1
http://91.219.236.148/duglassa1
https://t.me/duglassa1
Extracted
warzonerat
91.229.76.26:5200
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\SInitia\\SInitia.exe," reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/4024-134-0x0000000000370000-0x00000000003D9000-memory.dmp family_redline behavioral1/memory/1876-162-0x0000000001010000-0x00000000010B6000-memory.dmp family_redline behavioral1/memory/636-243-0x0000000000A40000-0x0000000000AC6000-memory.dmp family_redline behavioral1/memory/404-257-0x000000000041BDCE-mapping.dmp family_redline behavioral1/memory/404-268-0x00000000053A0000-0x00000000059A6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3036 created 1456 3036 WerFault.exe 71 -
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral1/memory/872-182-0x00000000007B0000-0x00000000007BF000-memory.dmp family_vkeylogger behavioral1/memory/872-188-0x00000000007B3500-mapping.dmp family_vkeylogger behavioral1/memory/1328-202-0x0000000000A00000-0x0000000000A0F000-memory.dmp family_vkeylogger -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
Arkei Stealer Payload 3 IoCs
resource yara_rule behavioral1/memory/3672-203-0x0000000000530000-0x000000000054C000-memory.dmp family_arkei behavioral1/memory/3672-204-0x0000000000400000-0x00000000004D3000-memory.dmp family_arkei behavioral1/memory/3512-206-0x00000000005C0000-0x000000000070A000-memory.dmp family_arkei -
Warzone RAT Payload 3 IoCs
resource yara_rule behavioral1/memory/1416-287-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/4008-312-0x0000000000570000-0x000000000058E000-memory.dmp warzonerat behavioral1/memory/4008-313-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Downloads MZ/PE file
-
Executes dropped EXE 20 IoCs
pid Process 2272 7AC9.exe 1456 8932.exe 60 7AC9.exe 4024 9643.exe 3436 9EE0.exe 1876 A46F.exe 3672 B23B.exe 3512 B78B.exe 2772 485.exe 3232 2346.exe 636 2A4C.exe 1728 3634.exe 1416 3AE8.exe 4008 Reader.exe 436 61CA.exe 2364 Doni.exe.com 376 Doni.exe.com 4072 SInitia.exe 1240 8A43.exe 1528 InstallUtil.exe -
Deletes itself 1 IoCs
pid Process 3068 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dMOSAsvegV.url Doni.exe.com -
Loads dropped DLL 4 IoCs
pid Process 676 regsvr32.exe 3672 B23B.exe 3672 B23B.exe 3672 B23B.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2772-220-0x0000000005DF0000-0x0000000005E11000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61CA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeDriver = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox_update = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader = "C:\\ProgramData\\Reader.exe" 3AE8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 61CA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4024 9643.exe 1876 A46F.exe 636 2A4C.exe 1240 8A43.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 684 set thread context of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 2272 set thread context of 60 2272 7AC9.exe 72 PID 3436 set thread context of 872 3436 9EE0.exe 79 PID 872 set thread context of 1328 872 RegSvcs.exe 82 PID 3232 set thread context of 404 3232 2346.exe 96 PID 4072 set thread context of 1528 4072 SInitia.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3036 1456 WerFault.exe 71 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AC9.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AC9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B78B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B78B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AC9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B78B.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B23B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B23B.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1276 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1480 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 2684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Process not Found -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 2684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 60 7AC9.exe 872 RegSvcs.exe 1328 explorer.exe 3512 B78B.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeRestorePrivilege 3036 WerFault.exe Token: SeBackupPrivilege 3036 WerFault.exe Token: SeDebugPrivilege 3036 WerFault.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeDebugPrivilege 1876 A46F.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeDebugPrivilege 2772 485.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeDebugPrivilege 404 RegAsm.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeDebugPrivilege 460 powershell.exe Token: SeDebugPrivilege 636 2A4C.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1328 explorer.exe 2364 Doni.exe.com 3068 Process not Found 3068 Process not Found 2364 Doni.exe.com 2364 Doni.exe.com 3068 Process not Found 3068 Process not Found 376 Doni.exe.com 3068 Process not Found 3068 Process not Found 376 Doni.exe.com 376 Doni.exe.com 3068 Process not Found 3068 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2364 Doni.exe.com 2364 Doni.exe.com 2364 Doni.exe.com 376 Doni.exe.com 376 Doni.exe.com 376 Doni.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 684 wrote to memory of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 684 wrote to memory of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 684 wrote to memory of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 684 wrote to memory of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 684 wrote to memory of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 684 wrote to memory of 2684 684 16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe 69 PID 3068 wrote to memory of 2272 3068 Process not Found 70 PID 3068 wrote to memory of 2272 3068 Process not Found 70 PID 3068 wrote to memory of 2272 3068 Process not Found 70 PID 3068 wrote to memory of 1456 3068 Process not Found 71 PID 3068 wrote to memory of 1456 3068 Process not Found 71 PID 3068 wrote to memory of 1456 3068 Process not Found 71 PID 2272 wrote to memory of 60 2272 7AC9.exe 72 PID 2272 wrote to memory of 60 2272 7AC9.exe 72 PID 2272 wrote to memory of 60 2272 7AC9.exe 72 PID 2272 wrote to memory of 60 2272 7AC9.exe 72 PID 2272 wrote to memory of 60 2272 7AC9.exe 72 PID 2272 wrote to memory of 60 2272 7AC9.exe 72 PID 3068 wrote to memory of 4024 3068 Process not Found 73 PID 3068 wrote to memory of 4024 3068 Process not Found 73 PID 3068 wrote to memory of 4024 3068 Process not Found 73 PID 3068 wrote to memory of 676 3068 Process not Found 74 PID 3068 wrote to memory of 676 3068 Process not Found 74 PID 3068 wrote to memory of 3436 3068 Process not Found 76 PID 3068 wrote to memory of 3436 3068 Process not Found 76 PID 3068 wrote to memory of 3436 3068 Process not Found 76 PID 3068 wrote to memory of 1876 3068 Process not Found 78 PID 3068 wrote to memory of 1876 3068 Process not Found 78 PID 3068 wrote to memory of 1876 3068 Process not Found 78 PID 3436 wrote to memory of 872 3436 9EE0.exe 79 PID 3436 wrote to memory of 872 3436 9EE0.exe 79 PID 3436 wrote to memory of 872 3436 9EE0.exe 79 PID 3436 wrote to memory of 872 3436 9EE0.exe 79 PID 3436 wrote to memory of 872 3436 9EE0.exe 79 PID 3068 wrote to memory of 3672 3068 Process not Found 80 PID 3068 wrote to memory of 3672 3068 Process not Found 80 PID 3068 wrote to memory of 3672 3068 Process not Found 80 PID 3068 wrote to memory of 3512 3068 Process not Found 81 PID 3068 wrote to memory of 3512 3068 Process not Found 81 PID 3068 wrote to memory of 3512 3068 Process not Found 81 PID 872 wrote to memory of 1328 872 RegSvcs.exe 82 PID 872 wrote to memory of 1328 872 RegSvcs.exe 82 PID 872 wrote to memory of 1328 872 RegSvcs.exe 82 PID 1328 wrote to memory of 2772 1328 explorer.exe 86 PID 1328 wrote to memory of 2772 1328 explorer.exe 86 PID 1328 wrote to memory of 2772 1328 explorer.exe 86 PID 2772 wrote to memory of 1380 2772 485.exe 88 PID 2772 wrote to memory of 1380 2772 485.exe 88 PID 2772 wrote to memory of 1380 2772 485.exe 88 PID 1380 wrote to memory of 1264 1380 cmd.exe 90 PID 1380 wrote to memory of 1264 1380 cmd.exe 90 PID 1380 wrote to memory of 1264 1380 cmd.exe 90 PID 3068 wrote to memory of 3232 3068 Process not Found 91 PID 3068 wrote to memory of 3232 3068 Process not Found 91 PID 3672 wrote to memory of 892 3672 B23B.exe 92 PID 3672 wrote to memory of 892 3672 B23B.exe 92 PID 3672 wrote to memory of 892 3672 B23B.exe 92 PID 892 wrote to memory of 1276 892 cmd.exe 94 PID 892 wrote to memory of 1276 892 cmd.exe 94 PID 892 wrote to memory of 1276 892 cmd.exe 94 PID 3068 wrote to memory of 636 3068 Process not Found 95 PID 3068 wrote to memory of 636 3068 Process not Found 95 PID 3068 wrote to memory of 636 3068 Process not Found 95 PID 3232 wrote to memory of 404 3232 2346.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe"C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe"C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\7AC9.exeC:\Users\Admin\AppData\Local\Temp\7AC9.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\7AC9.exeC:\Users\Admin\AppData\Local\Temp\7AC9.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\8932.exeC:\Users\Admin\AppData\Local\Temp\8932.exe1⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 4762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\9643.exeC:\Users\Admin\AppData\Local\Temp\9643.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4024
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9B74.dll1⤵
- Loads dropped DLL
PID:676
-
C:\Users\Admin\AppData\Local\Temp\9EE0.exeC:\Users\Admin\AppData\Local\Temp\9EE0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\485.exe"C:\Users\Admin\AppData\Local\Temp\485.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe,"5⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe,"6⤵
- Modifies WinLogon for persistence
PID:1264
-
-
-
C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe"C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"6⤵
- Executes dropped EXE
PID:1528
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A46F.exeC:\Users\Admin\AppData\Local\Temp\A46F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
C:\Users\Admin\AppData\Local\Temp\B23B.exeC:\Users\Admin\AppData\Local\Temp\B23B.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B23B.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\B78B.exeC:\Users\Admin\AppData\Local\Temp\B78B.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3512
-
C:\Users\Admin\AppData\Local\Temp\2346.exeC:\Users\Admin\AppData\Local\Temp\2346.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\2A4C.exeC:\Users\Admin\AppData\Local\Temp\2A4C.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:636
-
C:\Users\Admin\AppData\Local\Temp\3634.exeC:\Users\Admin\AppData\Local\Temp\3634.exe1⤵
- Executes dropped EXE
PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3AE8.exeC:\Users\Admin\AppData\Local\Temp\3AE8.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1416 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\ProgramData\Reader.exe"C:\ProgramData\Reader.exe"2⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\61CA.exeC:\Users\Admin\AppData\Local\Temp\61CA.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:436 -
C:\Windows\SysWOW64\extrac32.exeextrac322⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Tra.xlsx & ping 127.0.0.1 -n 302⤵PID:948
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:3644
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^dMFemqVCSwldOigKUiVwItEauGtDewBPrbAynibrquaLXwOyLiwfdszkojVTWsAQmchdHojNJSqBMSxyRZ$" Tenere.xlsx4⤵PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Doni.exe.comDoni.exe.com i4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Doni.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Doni.exe.com i5⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:376 -
C:\Windows\SysWOW64\nslookup.exeC:\Windows\SysWOW64\nslookup.exe6⤵PID:896
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 303⤵
- Runs ping.exe
PID:1480
-
-
-
C:\Users\Admin\AppData\Local\Temp\8A43.exeC:\Users\Admin\AppData\Local\Temp\8A43.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1240
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:548
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2920