Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-02-2022 11:46
Static task
static1
Behavioral task
behavioral1
Sample
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe
Resource
win10-en-20211208
General
-
Target
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe
-
Size
4.5MB
-
MD5
22b96b68b4372ff2ce604723e9436963
-
SHA1
066ff406521cc2f0aed70414ee8d4d7751d0fe2a
-
SHA256
463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe
-
SHA512
0ecde5a89dd548cf16867c9a6c66c5b12f2b2e51920c1ab7cc1ff241f69a03116fe011aed2172c00cfe708c77856d5fe19d59b01a3880e3dfe38509a682d8a38
Malware Config
Extracted
redline
@Zexan
92.255.85.137:41320
-
auth_value
da8092c88adbe82a93341dec420f0fa7
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=Rachel
DCbpjBAroXBj3jrvq8HRPAKd8wYPnBwwi7
rKewCaU4Q6gqJnb5nJqkDY69QoxHKXAJZi
Xiem2Rw5LULbzv6rM49FqKAKD1nHSxpjxb
TZ3Pn82NBECik8ujtc3Wu5AVsQLCdt7cG1
t1Pxn7QZPAVhrsd2cdPHDEjDR1jtwpoUvbT
GDKPOPZWADWVDB2B743X7Q5QIMXIFJTIJ3K3JTR5P2EKO22GJQRAZRKC
497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6
qra53qtr5kvaye7gvf5algrre5h0w6harqxluum6kp
bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l
0X9BD5F03363CA0231A32B3B36AE2CF01623E2D1FE
LcPqsR8yyzukNBgoKrq3pKEXV4rpuMeF91
ronin:09864801afc2b70c960366f4c8ad806fe9d6965d
ltc1qsdn52gjku7sts4r64fyqelqkfm789gvagglnaj
bc1q79xgc502sqzt4qz0jhr7lr7qdxkf2z006gym0l
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/memory/3728-128-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 21 IoCs
pid Process 1588 soska.exe 3796 bayden.exe 4020 RegHost.exe 3940 subst.exe 3164 RegHost.exe 336 RegHost.exe 2968 RegHost.exe 3208 RegHost.exe 1464 RegHost.exe 1700 RegHost.exe 3988 RegHost.exe 2372 RegHost.exe 3220 RegHost.exe 456 RegHost.exe 3868 RegHost.exe 972 RegHost.exe 3044 RegHost.exe 924 RegHost.exe 828 RegHost.exe 2340 RegHost.exe 388 RegHost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" soska.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 3756 bfsvc.exe 3756 bfsvc.exe 3208 bfsvc.exe 3208 bfsvc.exe 1340 bfsvc.exe 1340 bfsvc.exe 3592 bfsvc.exe 3592 bfsvc.exe 2212 bfsvc.exe 2212 bfsvc.exe 1384 bfsvc.exe 1384 bfsvc.exe 3052 bfsvc.exe 3052 bfsvc.exe 1808 bfsvc.exe 1808 bfsvc.exe 2412 bfsvc.exe 2412 bfsvc.exe 1960 bfsvc.exe 1960 bfsvc.exe 2732 bfsvc.exe 2732 bfsvc.exe 1968 bfsvc.exe 1968 bfsvc.exe 2128 bfsvc.exe 2128 bfsvc.exe 528 bfsvc.exe 528 bfsvc.exe 3956 bfsvc.exe 3956 bfsvc.exe 3756 bfsvc.exe 3756 bfsvc.exe 1932 bfsvc.exe 1932 bfsvc.exe 560 bfsvc.exe 560 bfsvc.exe 2032 bfsvc.exe 2032 bfsvc.exe -
Suspicious use of SetThreadContext 39 IoCs
description pid Process procid_target PID 2412 set thread context of 3728 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 70 PID 1588 set thread context of 3756 1588 soska.exe 77 PID 1588 set thread context of 3056 1588 soska.exe 78 PID 4020 set thread context of 3208 4020 RegHost.exe 84 PID 4020 set thread context of 2568 4020 RegHost.exe 86 PID 3164 set thread context of 1340 3164 RegHost.exe 90 PID 3164 set thread context of 2368 3164 RegHost.exe 91 PID 336 set thread context of 3592 336 RegHost.exe 96 PID 336 set thread context of 1396 336 RegHost.exe 97 PID 2968 set thread context of 2212 2968 RegHost.exe 103 PID 2968 set thread context of 2576 2968 RegHost.exe 106 PID 3208 set thread context of 1384 3208 RegHost.exe 110 PID 3208 set thread context of 732 3208 RegHost.exe 112 PID 1464 set thread context of 3052 1464 RegHost.exe 116 PID 1464 set thread context of 2000 1464 RegHost.exe 117 PID 1700 set thread context of 1808 1700 RegHost.exe 122 PID 1700 set thread context of 3632 1700 RegHost.exe 124 PID 3988 set thread context of 2412 3988 RegHost.exe 128 PID 3988 set thread context of 1412 3988 RegHost.exe 130 PID 2372 set thread context of 1960 2372 RegHost.exe 134 PID 2372 set thread context of 3416 2372 RegHost.exe 136 PID 3220 set thread context of 2732 3220 RegHost.exe 140 PID 3220 set thread context of 3828 3220 RegHost.exe 141 PID 456 set thread context of 1968 456 RegHost.exe 146 PID 456 set thread context of 1784 456 RegHost.exe 147 PID 3868 set thread context of 2128 3868 RegHost.exe 152 PID 3868 set thread context of 2816 3868 RegHost.exe 153 PID 972 set thread context of 528 972 RegHost.exe 158 PID 972 set thread context of 3196 972 RegHost.exe 159 PID 3044 set thread context of 3956 3044 RegHost.exe 164 PID 3044 set thread context of 1464 3044 RegHost.exe 165 PID 924 set thread context of 3756 924 RegHost.exe 170 PID 924 set thread context of 2000 924 RegHost.exe 171 PID 828 set thread context of 1932 828 RegHost.exe 176 PID 828 set thread context of 3928 828 RegHost.exe 178 PID 2340 set thread context of 560 2340 RegHost.exe 182 PID 2340 set thread context of 676 2340 RegHost.exe 183 PID 388 set thread context of 2032 388 RegHost.exe 188 PID 388 set thread context of 2860 388 RegHost.exe 189 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 3728 AppLaunch.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3056 explorer.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe 3940 subst.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3728 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3728 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 70 PID 2412 wrote to memory of 3728 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 70 PID 2412 wrote to memory of 3728 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 70 PID 2412 wrote to memory of 3728 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 70 PID 2412 wrote to memory of 3728 2412 463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe 70 PID 3728 wrote to memory of 1588 3728 AppLaunch.exe 72 PID 3728 wrote to memory of 1588 3728 AppLaunch.exe 72 PID 3728 wrote to memory of 3796 3728 AppLaunch.exe 74 PID 3728 wrote to memory of 3796 3728 AppLaunch.exe 74 PID 3728 wrote to memory of 3796 3728 AppLaunch.exe 74 PID 3796 wrote to memory of 1220 3796 bayden.exe 75 PID 3796 wrote to memory of 1220 3796 bayden.exe 75 PID 3796 wrote to memory of 1220 3796 bayden.exe 75 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3756 1588 soska.exe 77 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 1588 wrote to memory of 3056 1588 soska.exe 78 PID 3056 wrote to memory of 4020 3056 explorer.exe 81 PID 3056 wrote to memory of 4020 3056 explorer.exe 81 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84 PID 4020 wrote to memory of 3208 4020 RegHost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe"C:\Users\Admin\AppData\Local\Temp\463f4d8ebcbe894ce30c7d08f6e469d934399b7be6d208ccdddf319dfc57e6fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\soska.exe"C:\Users\Admin\AppData\Local\Temp\soska.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3756
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3208
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"6⤵PID:2568
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3164 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina8⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1340
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"8⤵PID:2368
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:336 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3592
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"10⤵PID:1396
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2968 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2212
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"12⤵PID:2576
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3208 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina14⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1384
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"14⤵PID:732
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"15⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1464 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina16⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3052
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"16⤵PID:2000
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"17⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1700 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina18⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1808
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"18⤵PID:3632
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"19⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3988 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina20⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2412
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"20⤵PID:1412
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2372 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina22⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1960
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"22⤵PID:3416
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"23⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3220 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina24⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2732
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"24⤵PID:3828
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"25⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:456 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina26⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1968
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"26⤵PID:1784
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"27⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3868 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina28⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2128
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"28⤵PID:2816
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"29⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:972 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina30⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:528
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"30⤵PID:3196
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"31⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina32⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3956
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"32⤵PID:1464
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:924 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina34⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3756
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"34⤵PID:2000
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"35⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:828 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina36⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1932
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"36⤵PID:3928
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"37⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2340 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina38⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:560
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"38⤵PID:676
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:388 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool etc.2miners.com:1010 -wal 0x8C40cd0F96391e6afc8F91744843EFc210e6B95d -coin etc -worker platina40⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2032
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "None" "Microsoft%20Basic%20Display%20Adapter" "platina" "etc"40⤵PID:2860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bayden.exe"C:\Users\Admin\AppData\Local\Temp\bayden.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe4⤵
- Creates scheduled task(s)
PID:1220
-
-
-
-
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3940