Analysis
-
max time kernel
102s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
27-03-2022 22:50
Static task
static1
Behavioral task
behavioral1
Sample
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe
Resource
win7-20220331-en
General
-
Target
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe
-
Size
16.2MB
-
MD5
7bfb2c60019c6b03c7853718d3c24f67
-
SHA1
390dad7ffe4dbd389f52e6589c98ab77998b7014
-
SHA256
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894
-
SHA512
3ea3fbc7184ba03d6bce3eaa9620c2f8962d8a5494c87bde3d3291b9e4d73fab9861a0ef165e40e17b366a6425ce107dbe9e679b63182b633c8b69c1d69bc8cb
Malware Config
Signatures
-
Echelon log file 1 IoCs
Detects a log file produced by Echelon.
Processes:
yara_rule echelon_log_file -
Executes dropped EXE 11 IoCs
Processes:
CL_Debug_Log.txtsvchost.exeFile.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exepid Process 1992 CL_Debug_Log.txt 840 svchost.exe 1820 File.exe 568 Helper.exe 912 Helper.exe 1504 Helper.exe 1464 Helper.exe 780 Helper.exe 468 Helper.exe 384 Helper.exe 1780 Helper.exe -
Processes:
resource yara_rule behavioral1/memory/1464-59-0x0000000000370000-0x0000000002404000-memory.dmp vmprotect behavioral1/files/0x00070000000126e3-70.dat vmprotect behavioral1/files/0x00070000000126e3-71.dat vmprotect behavioral1/files/0x00070000000126e3-73.dat vmprotect behavioral1/files/0x00070000000126e3-74.dat vmprotect -
Loads dropped DLL 14 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exesvchost.exetaskeng.exeWerFault.exepid Process 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 840 svchost.exe 1604 taskeng.exe 1604 taskeng.exe 1760 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
File.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 File.exe Key opened \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 File.exe Key opened \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 File.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org 8 api.ipify.org 9 ip-api.com 11 api.ipify.org -
AutoIT Executable 22 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1464-59-0x0000000000370000-0x0000000002404000-memory.dmp autoit_exe behavioral1/files/0x0007000000012719-65.dat autoit_exe behavioral1/files/0x000b000000012329-69.dat autoit_exe behavioral1/files/0x0007000000012754-92.dat autoit_exe behavioral1/files/0x0007000000012754-91.dat autoit_exe behavioral1/files/0x0007000000012754-95.dat autoit_exe behavioral1/files/0x0007000000012754-96.dat autoit_exe behavioral1/files/0x0007000000012754-99.dat autoit_exe behavioral1/files/0x0007000000012754-101.dat autoit_exe behavioral1/files/0x0007000000012754-104.dat autoit_exe behavioral1/files/0x0007000000012754-111.dat autoit_exe behavioral1/files/0x0007000000012754-110.dat autoit_exe behavioral1/files/0x0007000000012754-116.dat autoit_exe behavioral1/files/0x0007000000012754-115.dat autoit_exe behavioral1/files/0x0007000000012754-120.dat autoit_exe behavioral1/files/0x0007000000012754-119.dat autoit_exe behavioral1/files/0x0007000000012754-118.dat autoit_exe behavioral1/files/0x0007000000012754-117.dat autoit_exe behavioral1/files/0x0007000000012754-121.dat autoit_exe behavioral1/files/0x0007000000012754-124.dat autoit_exe behavioral1/files/0x0007000000012754-126.dat autoit_exe behavioral1/files/0x0007000000012754-129.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exesvchost.exepid Process 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 840 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Helper.exedescription pid Process procid_target PID 1464 set thread context of 780 1464 Helper.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1608 1820 WerFault.exe 35 840 780 WerFault.exe 43 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
NTFS ADS 1 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\VFSHTLAO\root\CIMV2 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exepid Process 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
CL_Debug_Log.txtFile.exedescription pid Process Token: SeRestorePrivilege 1992 CL_Debug_Log.txt Token: 35 1992 CL_Debug_Log.txt Token: SeSecurityPrivilege 1992 CL_Debug_Log.txt Token: SeSecurityPrivilege 1992 CL_Debug_Log.txt Token: SeDebugPrivilege 1820 File.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exepid Process 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 568 Helper.exe 568 Helper.exe 568 Helper.exe 912 Helper.exe 912 Helper.exe 912 Helper.exe 1464 Helper.exe 1464 Helper.exe 1464 Helper.exe 1504 Helper.exe 1504 Helper.exe 1504 Helper.exe 468 Helper.exe 468 Helper.exe 468 Helper.exe 384 Helper.exe 384 Helper.exe 384 Helper.exe 384 Helper.exe 1780 Helper.exe 1780 Helper.exe 1780 Helper.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exepid Process 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 568 Helper.exe 568 Helper.exe 568 Helper.exe 912 Helper.exe 912 Helper.exe 912 Helper.exe 1464 Helper.exe 1464 Helper.exe 1464 Helper.exe 1504 Helper.exe 1504 Helper.exe 1504 Helper.exe 468 Helper.exe 468 Helper.exe 468 Helper.exe 384 Helper.exe 384 Helper.exe 384 Helper.exe 384 Helper.exe 1780 Helper.exe 1780 Helper.exe 1780 Helper.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.execmd.exesvchost.exeFile.exetaskeng.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exedescription pid Process procid_target PID 1464 wrote to memory of 1992 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 29 PID 1464 wrote to memory of 1992 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 29 PID 1464 wrote to memory of 1992 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 29 PID 1464 wrote to memory of 1992 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 29 PID 1464 wrote to memory of 1448 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 31 PID 1464 wrote to memory of 1448 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 31 PID 1464 wrote to memory of 1448 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 31 PID 1464 wrote to memory of 1448 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 31 PID 1448 wrote to memory of 1016 1448 cmd.exe 33 PID 1448 wrote to memory of 1016 1448 cmd.exe 33 PID 1448 wrote to memory of 1016 1448 cmd.exe 33 PID 1448 wrote to memory of 1016 1448 cmd.exe 33 PID 1464 wrote to memory of 840 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 34 PID 1464 wrote to memory of 840 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 34 PID 1464 wrote to memory of 840 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 34 PID 1464 wrote to memory of 840 1464 3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe 34 PID 840 wrote to memory of 1820 840 svchost.exe 35 PID 840 wrote to memory of 1820 840 svchost.exe 35 PID 840 wrote to memory of 1820 840 svchost.exe 35 PID 840 wrote to memory of 1820 840 svchost.exe 35 PID 1820 wrote to memory of 1608 1820 File.exe 37 PID 1820 wrote to memory of 1608 1820 File.exe 37 PID 1820 wrote to memory of 1608 1820 File.exe 37 PID 1604 wrote to memory of 912 1604 taskeng.exe 39 PID 1604 wrote to memory of 912 1604 taskeng.exe 39 PID 1604 wrote to memory of 912 1604 taskeng.exe 39 PID 1604 wrote to memory of 568 1604 taskeng.exe 40 PID 1604 wrote to memory of 568 1604 taskeng.exe 40 PID 1604 wrote to memory of 568 1604 taskeng.exe 40 PID 568 wrote to memory of 1504 568 Helper.exe 41 PID 568 wrote to memory of 1504 568 Helper.exe 41 PID 568 wrote to memory of 1504 568 Helper.exe 41 PID 912 wrote to memory of 1464 912 Helper.exe 42 PID 912 wrote to memory of 1464 912 Helper.exe 42 PID 912 wrote to memory of 1464 912 Helper.exe 42 PID 1464 wrote to memory of 780 1464 Helper.exe 43 PID 1464 wrote to memory of 780 1464 Helper.exe 43 PID 1464 wrote to memory of 780 1464 Helper.exe 43 PID 1464 wrote to memory of 780 1464 Helper.exe 43 PID 1464 wrote to memory of 780 1464 Helper.exe 43 PID 780 wrote to memory of 840 780 Helper.exe 45 PID 780 wrote to memory of 840 780 Helper.exe 45 PID 780 wrote to memory of 840 780 Helper.exe 45 PID 1604 wrote to memory of 468 1604 taskeng.exe 47 PID 1604 wrote to memory of 468 1604 taskeng.exe 47 PID 1604 wrote to memory of 468 1604 taskeng.exe 47 PID 1604 wrote to memory of 384 1604 taskeng.exe 46 PID 1604 wrote to memory of 384 1604 taskeng.exe 46 PID 1604 wrote to memory of 384 1604 taskeng.exe 46 PID 468 wrote to memory of 1780 468 Helper.exe 48 PID 468 wrote to memory of 1780 468 Helper.exe 48 PID 468 wrote to memory of 1780 468 Helper.exe 48 -
outlook_office_path 1 IoCs
Processes:
File.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 File.exe -
outlook_win_path 1 IoCs
Processes:
File.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 File.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe"C:\Users\Admin\AppData\Local\Temp\3316277e7a7f52c5947328ac52fad225295b8c17ddc71bcd0d03cdac6d292894.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"3⤵
- Creates scheduled task(s)
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1820 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1820 -s 17364⤵
- Program crash
PID:1608
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7BBC5388-091D-4387-BF04-27991F89A3B7} S-1-5-21-3422572840-2899912402-917774768-1000:VFSHTLAO\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck164133⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 780 -s 1045⤵
- Loads dropped DLL
- Program crash
PID:840
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck164133⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1504
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:384
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck164133⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5c22705f33a214db9ccdee9fbb696bf2a
SHA1b11f5c2fa72a798e36075e39e1b98fb943c981c8
SHA256cc6302736ef57f3272d0e3985237e3f036e4a1e13d4c544b3a4b9db936b4b921
SHA512a859661e8cbc3cd6c1d795f3ff17f0d395ccfd4fc742742e4d2543b29d5ddaded8821939b03cad2e1bc561f97648ce3fa2dfd72800b7f0026b994558b22d571d
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
Filesize
12.8MB
MD5c938bda404fbd5d92ac21dcaf8fe7eda
SHA16325026f78525c30e7b31615165c85959ae9ac77
SHA256031aa7d442360d4a9a58388aa79fcc6bd7c95b595bdb3abc8d3f36b2f014d071
SHA512dbbdd810780107645dc033d0cc9e89a607cdf074d23a64898e483a1125157221e760d9fa65e973e1c5909d0aff21ebc0fde6b6c582ccec86aebe18315abafb41
-
Filesize
1.1MB
MD5faed883653d647ae728833df23e87ebe
SHA118864e7e0076e3707a387fad1093c1415791459a
SHA256166c38e743aafe35c3f812bfa4dfe38e34ee45aaa5fae7eb0db7451dbe2d0bb9
SHA512633a7683004bea836f2eaa922f270df42a69f7676afe46cf9ea178df894fe134feba6f1704f4fd72ca9b9278f6df6c22c1a4ce939252f10eac9ed731f66008dd
-
Filesize
1.1MB
MD5faed883653d647ae728833df23e87ebe
SHA118864e7e0076e3707a387fad1093c1415791459a
SHA256166c38e743aafe35c3f812bfa4dfe38e34ee45aaa5fae7eb0db7451dbe2d0bb9
SHA512633a7683004bea836f2eaa922f270df42a69f7676afe46cf9ea178df894fe134feba6f1704f4fd72ca9b9278f6df6c22c1a4ce939252f10eac9ed731f66008dd
-
Filesize
2KB
MD59160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
Filesize
1.2MB
MD516ed93946b0c3f987e52f302f26a0384
SHA109c563656f9049767d792c4559bdfa836f605486
SHA25656fd8e067619495fed16251aae6b9e30ae8242fbc88570e385e4a42a5409cd28
SHA512288901556858eb9a2f30605c14715323020e0c418de799ee80f30b4dd2979c10baa32612b4e9fde2e23eda055852da12a43addad1a4bdeeeb83d63d292d414f1
-
Filesize
1.2MB
MD516ed93946b0c3f987e52f302f26a0384
SHA109c563656f9049767d792c4559bdfa836f605486
SHA25656fd8e067619495fed16251aae6b9e30ae8242fbc88570e385e4a42a5409cd28
SHA512288901556858eb9a2f30605c14715323020e0c418de799ee80f30b4dd2979c10baa32612b4e9fde2e23eda055852da12a43addad1a4bdeeeb83d63d292d414f1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
Filesize
1.1MB
MD5faed883653d647ae728833df23e87ebe
SHA118864e7e0076e3707a387fad1093c1415791459a
SHA256166c38e743aafe35c3f812bfa4dfe38e34ee45aaa5fae7eb0db7451dbe2d0bb9
SHA512633a7683004bea836f2eaa922f270df42a69f7676afe46cf9ea178df894fe134feba6f1704f4fd72ca9b9278f6df6c22c1a4ce939252f10eac9ed731f66008dd
-
Filesize
1.2MB
MD516ed93946b0c3f987e52f302f26a0384
SHA109c563656f9049767d792c4559bdfa836f605486
SHA25656fd8e067619495fed16251aae6b9e30ae8242fbc88570e385e4a42a5409cd28
SHA512288901556858eb9a2f30605c14715323020e0c418de799ee80f30b4dd2979c10baa32612b4e9fde2e23eda055852da12a43addad1a4bdeeeb83d63d292d414f1
-
Filesize
1.2MB
MD516ed93946b0c3f987e52f302f26a0384
SHA109c563656f9049767d792c4559bdfa836f605486
SHA25656fd8e067619495fed16251aae6b9e30ae8242fbc88570e385e4a42a5409cd28
SHA512288901556858eb9a2f30605c14715323020e0c418de799ee80f30b4dd2979c10baa32612b4e9fde2e23eda055852da12a43addad1a4bdeeeb83d63d292d414f1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1
-
Filesize
7.2MB
MD5063693f6b89c378f3c192f3b965b3432
SHA1cda5f1fa53bca1b670c6c2f1a1144973c77d920b
SHA256e8e5bf6a02da05cf64393b5116a5cc4663c29ea559b220ef080137b7681defe7
SHA512e6abba62ada19f70b9f8530bbc34f98ea913d4c0218de731eafcadf2f684b5c48869431f66b76eecb96570381afe36b97024ddcd894c2c2312cae267a941ccb1