Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-12-2021 21:24
Static task
static1
Behavioral task
behavioral1
Sample
209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe
Resource
win10-en-20211208
General
-
Target
209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe
-
Size
212KB
-
MD5
2c68058dbc749613a9cea8d8049f34f1
-
SHA1
dcc676b20cb901d6347324356b4cc6ba3f9ee4c3
-
SHA256
209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a
-
SHA512
ae2225929c37c9fb6f6b15314a2c8059e399b0b156f4ecd1933de63b8daa2bb1c8c5519c1738256130abd31ced2bc5f0734e9b1267e44358fda8a3d1311719d3
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
redline
1
86.107.197.138:38133
Extracted
amadey
2.86
2.56.56.210/notAnoob/index.php
Extracted
redline
runpe
142.202.242.172:7667
Extracted
raccoon
10da56e7e71e97bdc1f36eb76813bbc3231de7e4
-
url4cnc
http://194.180.174.53/capibar
http://91.219.236.18/capibar
http://194.180.174.41/capibar
http://91.219.236.148/capibar
https://t.me/capibar
Extracted
redline
444
31.131.254.105:1498
Signatures
-
Detect Neshta Payload 24 IoCs
resource yara_rule behavioral1/files/0x000900000001ab5b-201.dat family_neshta behavioral1/files/0x000900000001ab5b-202.dat family_neshta behavioral1/files/0x000600000001ab68-211.dat family_neshta behavioral1/files/0x000600000001ab68-210.dat family_neshta behavioral1/files/0x0004000000007698-222.dat family_neshta behavioral1/files/0x000600000001ab68-217.dat family_neshta behavioral1/files/0x000a000000015f0b-232.dat family_neshta behavioral1/files/0x000a000000015f25-234.dat family_neshta behavioral1/files/0x0007000000016248-233.dat family_neshta behavioral1/files/0x000c000000015f2f-235.dat family_neshta behavioral1/files/0x0008000000007611-236.dat family_neshta behavioral1/files/0x000100000001915c-237.dat family_neshta behavioral1/files/0x0002000000019595-238.dat family_neshta behavioral1/files/0x000100000001a978-242.dat family_neshta behavioral1/files/0x000100000001a9b6-241.dat family_neshta behavioral1/files/0x000100000001a973-240.dat family_neshta behavioral1/files/0x000100000001a977-239.dat family_neshta behavioral1/files/0x000100000001a8ff-243.dat family_neshta behavioral1/files/0x0002000000015a63-244.dat family_neshta behavioral1/files/0x0002000000019201-247.dat family_neshta behavioral1/files/0x000600000001ab69-245.dat family_neshta behavioral1/files/0x00020000000006b1-246.dat family_neshta behavioral1/files/0x000a0000000148c6-249.dat family_neshta behavioral1/files/0x00060000000148d6-248.dat family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" CE6D.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral1/memory/3912-172-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/3912-173-0x0000000000419326-mapping.dmp family_redline behavioral1/memory/1936-223-0x000002068CF70000-0x000002068CF8B000-memory.dmp family_redline behavioral1/memory/3940-286-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/3940-291-0x0000000000419322-mapping.dmp family_redline behavioral1/memory/3940-299-0x0000000005320000-0x0000000005926000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 3 IoCs
resource yara_rule behavioral1/memory/3636-281-0x0000000000600000-0x000000000060E000-memory.dmp family_vkeylogger behavioral1/memory/3636-282-0x0000000000400000-0x00000000004D5000-memory.dmp family_vkeylogger behavioral1/memory/3092-284-0x00000000030A0000-0x00000000030AF000-memory.dmp family_vkeylogger -
Arkei Stealer Payload 3 IoCs
resource yara_rule behavioral1/memory/624-140-0x0000000000930000-0x000000000094C000-memory.dmp family_arkei behavioral1/memory/624-141-0x0000000000400000-0x000000000082F000-memory.dmp family_arkei behavioral1/memory/216-151-0x0000000000830000-0x000000000097A000-memory.dmp family_arkei -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 20 IoCs
pid Process 1572 FE08.exe 1732 FE08.exe 4028 963.exe 624 6CF1.exe 216 7147.exe 740 762A.exe 2044 wkiikjfo.exe 952 762A.exe 3576 762A.exe 3912 762A.exe 1668 CE6D.exe 1936 CE6D.exe 2736 svchost.com 1776 9543_1~1.EXE 2352 svchost.com 3416 tkools.exe 1744 D6BB.exe 2152 E850.exe 3872 EB6E.exe 3636 F561.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000600000001ab76-251.dat vmprotect behavioral1/files/0x000600000001ab76-252.dat vmprotect behavioral1/memory/2152-266-0x0000000000D90000-0x0000000001841000-memory.dmp vmprotect -
Deletes itself 1 IoCs
pid Process 3036 Process not Found -
Loads dropped DLL 3 IoCs
pid Process 624 6CF1.exe 624 6CF1.exe 624 6CF1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\fefgre = "C:\\Users\\Admin\\AppData\\Local\\Temp\\F561.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytyr = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2152 E850.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3552 set thread context of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 1572 set thread context of 1732 1572 FE08.exe 70 PID 2044 set thread context of 3288 2044 wkiikjfo.exe 91 PID 740 set thread context of 3912 740 762A.exe 92 PID 3636 set thread context of 3092 3636 F561.exe 113 PID 2152 set thread context of 3940 2152 E850.exe 114 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE svchost.com File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE CE6D.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe CE6D.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe CE6D.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe CE6D.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe CE6D.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe CE6D.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE CE6D.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe CE6D.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe CE6D.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe CE6D.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe CE6D.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe CE6D.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe CE6D.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe CE6D.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe CE6D.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe CE6D.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE CE6D.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe CE6D.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe svchost.com File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe svchost.com File opened for modification C:\PROGRA~3\9543_1~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe svchost.com -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CE6D.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1104 1744 WerFault.exe 107 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FE08.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FE08.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 963.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FE08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 963.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 963.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6CF1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6CF1.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3536 timeout.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 008ddf3d15eaa80724edb47d450dd49d084297dce82e72baa46d34fdc48d541d482c32faa6cd945d24edb47d470dd49d024195daf71261adc06d04fda6e22673bbc9154961cda56815de8c447538e5aa644490bdb57a25ec9d5f02c5fdb454758df21d5904e0a26513dc8549723dd4f10b4c90d8f6127db9a4553494b48d792fd499410e36fca56f11edc70f3252a0f40948f488b77e26e99c5804c8c4e13b7e85c12b496da0f15d15d8854e7c34e5ab541cf4cff62867b2c81b3490b7e6322fd680450e30e0e2734f82d9092179faef112d svchost.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 008ddf3dc4eba80724edb47d450dd49d084297dce82e72baa46d34fdc48d541d0a9d440b80cd945d24edb47d470dd49d024195daf71261adc06d04fda6e22673bbc9154961cda56815de8c447538e5aa644490bdb57a25ec9d5f02c5fdb454758df21d5904e0a26513dc8549723dd4f10b4c90d8f6127db9a4553494b48d792fd499410e36fca56f11edc70f3252a0f40948f48cb27427e9965502c4f58d387287cc186270a4f93824dc814c7735edac511fc4bd svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 008ddf3dedeba80724edb47d450dd49d084297dce82e72baa46d34fdc48d541ddf738879a0cd945d24edb47d470dd49d024195daf71261adc06d04fda6e22673bbc9154961cda56815de8c447538e5aa644490bdb57a25ec9d5f02c5fdb454758df21d5904e0a26513dc8549723dd4f10b4c90d8f6127db9a4553494b48d792fd499410e36fca56f11edc70f3252a0f40948f490b67d27e49c5f02caf7b554718bce15515bb9fd3041ed8548753eeca45518c28c843f66b8d702588bc4e02776829f461035fea07052c3df122979b1e94a5f81bd svchost.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings CE6D.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings 9543_1~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" CE6D.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 440 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 440 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 Process not Found -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 440 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 1732 FE08.exe 4028 963.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3636 F561.exe 3092 explorer.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 740 762A.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 3912 762A.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 1936 CE6D.exe Token: SeRestorePrivilege 1104 WerFault.exe Token: SeBackupPrivilege 1104 WerFault.exe Token: SeDebugPrivilege 1104 WerFault.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 3940 RegSvcs.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3092 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3092 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 3552 wrote to memory of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 3552 wrote to memory of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 3552 wrote to memory of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 3552 wrote to memory of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 3552 wrote to memory of 440 3552 209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe 68 PID 3036 wrote to memory of 1572 3036 Process not Found 69 PID 3036 wrote to memory of 1572 3036 Process not Found 69 PID 3036 wrote to memory of 1572 3036 Process not Found 69 PID 1572 wrote to memory of 1732 1572 FE08.exe 70 PID 1572 wrote to memory of 1732 1572 FE08.exe 70 PID 1572 wrote to memory of 1732 1572 FE08.exe 70 PID 1572 wrote to memory of 1732 1572 FE08.exe 70 PID 1572 wrote to memory of 1732 1572 FE08.exe 70 PID 1572 wrote to memory of 1732 1572 FE08.exe 70 PID 3036 wrote to memory of 4028 3036 Process not Found 71 PID 3036 wrote to memory of 4028 3036 Process not Found 71 PID 3036 wrote to memory of 4028 3036 Process not Found 71 PID 3036 wrote to memory of 624 3036 Process not Found 73 PID 3036 wrote to memory of 624 3036 Process not Found 73 PID 3036 wrote to memory of 624 3036 Process not Found 73 PID 3036 wrote to memory of 216 3036 Process not Found 74 PID 3036 wrote to memory of 216 3036 Process not Found 74 PID 3036 wrote to memory of 216 3036 Process not Found 74 PID 3036 wrote to memory of 740 3036 Process not Found 75 PID 3036 wrote to memory of 740 3036 Process not Found 75 PID 3036 wrote to memory of 740 3036 Process not Found 75 PID 216 wrote to memory of 896 216 7147.exe 76 PID 216 wrote to memory of 896 216 7147.exe 76 PID 216 wrote to memory of 896 216 7147.exe 76 PID 740 wrote to memory of 952 740 762A.exe 78 PID 740 wrote to memory of 952 740 762A.exe 78 PID 740 wrote to memory of 952 740 762A.exe 78 PID 216 wrote to memory of 1076 216 7147.exe 79 PID 216 wrote to memory of 1076 216 7147.exe 79 PID 216 wrote to memory of 1076 216 7147.exe 79 PID 216 wrote to memory of 1380 216 7147.exe 81 PID 216 wrote to memory of 1380 216 7147.exe 81 PID 216 wrote to memory of 1380 216 7147.exe 81 PID 216 wrote to memory of 1596 216 7147.exe 83 PID 216 wrote to memory of 1596 216 7147.exe 83 PID 216 wrote to memory of 1596 216 7147.exe 83 PID 216 wrote to memory of 1912 216 7147.exe 85 PID 216 wrote to memory of 1912 216 7147.exe 85 PID 216 wrote to memory of 1912 216 7147.exe 85 PID 216 wrote to memory of 2232 216 7147.exe 88 PID 216 wrote to memory of 2232 216 7147.exe 88 PID 216 wrote to memory of 2232 216 7147.exe 88 PID 740 wrote to memory of 3576 740 762A.exe 90 PID 740 wrote to memory of 3576 740 762A.exe 90 PID 740 wrote to memory of 3576 740 762A.exe 90 PID 2044 wrote to memory of 3288 2044 wkiikjfo.exe 91 PID 2044 wrote to memory of 3288 2044 wkiikjfo.exe 91 PID 2044 wrote to memory of 3288 2044 wkiikjfo.exe 91 PID 2044 wrote to memory of 3288 2044 wkiikjfo.exe 91 PID 2044 wrote to memory of 3288 2044 wkiikjfo.exe 91 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 PID 740 wrote to memory of 3912 740 762A.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe"C:\Users\Admin\AppData\Local\Temp\209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe"C:\Users\Admin\AppData\Local\Temp\209b4be0aa4801cb928ced5e6deb65f9ea3dba6a2ee3838c2511bc982ee1f78a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\FE08.exeC:\Users\Admin\AppData\Local\Temp\FE08.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\FE08.exeC:\Users\Admin\AppData\Local\Temp\FE08.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\963.exeC:\Users\Admin\AppData\Local\Temp\963.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4028
-
C:\Users\Admin\AppData\Local\Temp\6CF1.exeC:\Users\Admin\AppData\Local\Temp\6CF1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6CF1.exe" & exit2⤵PID:1720
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\7147.exeC:\Users\Admin\AppData\Local\Temp\7147.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qdywswoh\2⤵PID:896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wkiikjfo.exe" C:\Windows\SysWOW64\qdywswoh\2⤵PID:1076
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qdywswoh binPath= "C:\Windows\SysWOW64\qdywswoh\wkiikjfo.exe /d\"C:\Users\Admin\AppData\Local\Temp\7147.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1380
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qdywswoh "wifi internet conection"2⤵PID:1596
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qdywswoh2⤵PID:1912
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\762A.exeC:\Users\Admin\AppData\Local\Temp\762A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\762A.exeC:\Users\Admin\AppData\Local\Temp\762A.exe2⤵
- Executes dropped EXE
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\762A.exeC:\Users\Admin\AppData\Local\Temp\762A.exe2⤵
- Executes dropped EXE
PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\762A.exeC:\Users\Admin\AppData\Local\Temp\762A.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\qdywswoh\wkiikjfo.exeC:\Windows\SysWOW64\qdywswoh\wkiikjfo.exe /d"C:\Users\Admin\AppData\Local\Temp\7147.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3288
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3608
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\CE6D.exeC:\Users\Admin\AppData\Local\Temp\CE6D.exe1⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6D.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\CE6D.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\PROGRA~3\9543_1~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2736 -
C:\PROGRA~3\9543_1~1.EXEC:\PROGRA~3\9543_1~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
PID:1776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\A0383E~1\tkools.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\A0383E~1\tkools.exeC:\Users\Admin\AppData\Local\Temp\A0383E~1\tkools.exe6⤵
- Executes dropped EXE
PID:3416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D6BB.exeC:\Users\Admin\AppData\Local\Temp\D6BB.exe1⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 4002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\E850.exeC:\Users\Admin\AppData\Local\Temp\E850.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\EB6E.exeC:\Users\Admin\AppData\Local\Temp\EB6E.exe1⤵
- Executes dropped EXE
PID:3872
-
C:\Users\Admin\AppData\Local\Temp\F561.exeC:\Users\Admin\AppData\Local\Temp\F561.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3636 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3092
-