Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2022 19:19
Static task
static1
Behavioral task
behavioral1
Sample
PrivateHack.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
PrivateHack.exe
Resource
win10v2004-20220721-en
General
-
Target
PrivateHack.exe
-
Size
1.1MB
-
MD5
d6a2df8caa573872bbe9c8e8c59d6028
-
SHA1
0b8eda3c0f420a608347f7b76df017e75c2a6e42
-
SHA256
b4804fd9d41771474066b3f4c0fd95b5e7a18ad5194b19f26197bfefda65c8ca
-
SHA512
7d728cf075ed54f17a16d393ce38a885e7386799b3cc9edc250f6a961ee64bc040e2886ec22bf3ea0e99fa6f88ddf0fbb021ed96fc20c4b90b1b667f7f3e71f4
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
2809e5944cfb3e2f786ac4a1217ad4a9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/166184-131-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2956-166-0x0000000000CB0000-0x0000000001A89000-memory.dmp family_ytstealer behavioral2/memory/2956-183-0x0000000000CB0000-0x0000000001A89000-memory.dmp family_ytstealer behavioral2/memory/2956-215-0x0000000000CB0000-0x0000000001A89000-memory.dmp family_ytstealer -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule C:\ProgramData\Dllhost\winlogson.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
MainModule.exestart.execrypted.exedllhost.exewinlogson.exepid process 3792 MainModule.exe 2956 start.exe 2148 crypted.exe 5252 dllhost.exe 6804 winlogson.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\start.exe upx C:\Users\Admin\AppData\Local\Temp\start.exe upx behavioral2/memory/2956-166-0x0000000000CB0000-0x0000000001A89000-memory.dmp upx behavioral2/memory/2956-183-0x0000000000CB0000-0x0000000001A89000-memory.dmp upx behavioral2/memory/2956-215-0x0000000000CB0000-0x0000000001A89000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
PrivateHack.exedescription pid process target process PID 4944 set thread context of 166184 4944 PrivateHack.exe AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5924 schtasks.exe 5992 schtasks.exe 6032 schtasks.exe 6020 schtasks.exe 5972 schtasks.exe 5840 schtasks.exe 5856 schtasks.exe 5876 schtasks.exe 5908 schtasks.exe 5936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeMainModule.exepowershell.exepowershell.exepowershell.exedllhost.exestart.exepid process 166184 AppLaunch.exe 3792 MainModule.exe 4244 powershell.exe 4244 powershell.exe 2140 powershell.exe 2140 powershell.exe 5124 powershell.exe 5124 powershell.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 2956 start.exe 2956 start.exe 2956 start.exe 2956 start.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe 5252 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
AppLaunch.exeMainModule.exepowershell.exepowershell.exepowershell.exedllhost.exewinlogson.exedescription pid process Token: SeDebugPrivilege 166184 AppLaunch.exe Token: SeDebugPrivilege 3792 MainModule.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 5124 powershell.exe Token: SeDebugPrivilege 5252 dllhost.exe Token: SeLockMemoryPrivilege 6804 winlogson.exe Token: SeLockMemoryPrivilege 6804 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winlogson.exepid process 6804 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PrivateHack.exeAppLaunch.exeMainModule.execmd.exedllhost.exedescription pid process target process PID 4944 wrote to memory of 166184 4944 PrivateHack.exe AppLaunch.exe PID 4944 wrote to memory of 166184 4944 PrivateHack.exe AppLaunch.exe PID 4944 wrote to memory of 166184 4944 PrivateHack.exe AppLaunch.exe PID 4944 wrote to memory of 166184 4944 PrivateHack.exe AppLaunch.exe PID 4944 wrote to memory of 166184 4944 PrivateHack.exe AppLaunch.exe PID 166184 wrote to memory of 3792 166184 AppLaunch.exe MainModule.exe PID 166184 wrote to memory of 3792 166184 AppLaunch.exe MainModule.exe PID 166184 wrote to memory of 3792 166184 AppLaunch.exe MainModule.exe PID 3792 wrote to memory of 1296 3792 MainModule.exe cmd.exe PID 3792 wrote to memory of 1296 3792 MainModule.exe cmd.exe PID 3792 wrote to memory of 1296 3792 MainModule.exe cmd.exe PID 1296 wrote to memory of 3228 1296 cmd.exe chcp.com PID 1296 wrote to memory of 3228 1296 cmd.exe chcp.com PID 1296 wrote to memory of 3228 1296 cmd.exe chcp.com PID 1296 wrote to memory of 4244 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 4244 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 4244 1296 cmd.exe powershell.exe PID 166184 wrote to memory of 2956 166184 AppLaunch.exe start.exe PID 166184 wrote to memory of 2956 166184 AppLaunch.exe start.exe PID 166184 wrote to memory of 2148 166184 AppLaunch.exe crypted.exe PID 166184 wrote to memory of 2148 166184 AppLaunch.exe crypted.exe PID 166184 wrote to memory of 2148 166184 AppLaunch.exe crypted.exe PID 1296 wrote to memory of 2140 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 2140 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 2140 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 5124 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 5124 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 5124 1296 cmd.exe powershell.exe PID 3792 wrote to memory of 5252 3792 MainModule.exe dllhost.exe PID 3792 wrote to memory of 5252 3792 MainModule.exe dllhost.exe PID 3792 wrote to memory of 5252 3792 MainModule.exe dllhost.exe PID 5252 wrote to memory of 5312 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5312 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5312 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5332 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5332 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5332 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5364 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5364 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5364 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5400 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5400 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5400 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5420 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5420 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5420 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5452 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5452 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5452 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5484 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5484 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5484 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5528 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5528 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5528 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5580 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5580 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5580 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5612 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5612 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5612 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5684 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5684 5252 dllhost.exe cmd.exe PID 5252 wrote to memory of 5684 5252 dllhost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PrivateHack.exe"C:\Users\Admin\AppData\Local\Temp\PrivateHack.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:166184 -
C:\Users\Admin\AppData\Local\Temp\MainModule.exe"C:\Users\Admin\AppData\Local\Temp\MainModule.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"4⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:3228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5124
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5252 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5312
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5332
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5840
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5364
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5400
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5936
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5420
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5876
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5484
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5908
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5452
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5528
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5924
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2852" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5612
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2852" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:5992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3910" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5580
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3910" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:6032
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4065" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5684
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1369" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:5724
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1369" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:6020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵PID:6176
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:6224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵PID:6732
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:6784
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\start.exe4⤵PID:6568
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵PID:6616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\crypted.exe"C:\Users\Admin\AppData\Local\Temp\crypted.exe"3⤵
- Executes dropped EXE
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
953KB
MD57dadec75c72d9ca68ad351b147ce82d7
SHA1258718e852b80a293ea8505b2946190dcb3cd806
SHA25612deb4d3b58a9102ba0a9493ce1e2ea38a57a50214e1da4261b1e2b3d7f5539a
SHA512655e72a33457425b08592b7db8ab62ed232114355079de20fca23535e69e59bef13e971f48af83a382070abbb7620499b32bd8da5ad6b79f0e5f8502266ccf0d
-
Filesize
953KB
MD57dadec75c72d9ca68ad351b147ce82d7
SHA1258718e852b80a293ea8505b2946190dcb3cd806
SHA25612deb4d3b58a9102ba0a9493ce1e2ea38a57a50214e1da4261b1e2b3d7f5539a
SHA512655e72a33457425b08592b7db8ab62ed232114355079de20fca23535e69e59bef13e971f48af83a382070abbb7620499b32bd8da5ad6b79f0e5f8502266ccf0d
-
Filesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
Filesize
312B
MD53fd684964005aab765878c363f801709
SHA1c9b70db2d5b0dae35122c167c5976c1e8460724a
SHA25679a2f32ae67fce5aecafa7413fb4ba1534e6ad6f98ec5e2bfced5af824846a54
SHA512f9e83aa7c34a7f40f300e8fbdbe7b01b0f230a2956f0697473aaa87ae574c9c17561855480e0edfe8a6c9cfa7681226c28db0314ade3e50902e759c784d4cf8f
-
Filesize
1KB
MD50135fad955fc63c0bda02c79738bde6d
SHA15d0e42e685510b0cdac4922444879761df721ed2
SHA2562b6400b92aa887cf003ed65eb7b9906051872e4056ba7ab31cb77812435f6792
SHA512cf4fd82a90095f9b8259380d8f80fbf5b116925068c898d016cda6a9c4a194a8733261a67e99f18d8f6262c62d36c2d1f98c9dccdf60140918e960d369e757fe
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5341bb527313d82237ee6c59bb7f96651
SHA1c1dbcdff3f7196cee0523b3c99ff2f5a2cea899e
SHA2568f0f3e58c0121b6508617b9c6baef4862a7c851177a37751b975b770dd17b627
SHA512d0fda2a48fe110bc62a21abca5c1d299e00ccffaefde80e9f2d86a789b2f727f46a6d9e617527d7e1636dbaccf1ff6d681380bd16d1471a6fa4974fa6d795cc1
-
Filesize
18KB
MD5aa46df1f5beea65fb8e5bda2b6981d1a
SHA1d9bcea03fc2473e8bd44533bdf8c0cba92c55beb
SHA2562463c5a9e93f6bae513544999cc8bd91048145b97e25d244212ee83116495f2f
SHA51250b6509d408d2edee36ba6233689cf770ba467adaf8894164163d3ca5f4e7363a6e854a1f39a780cbbb30e12d7a9a04f229c1336679bf0938b87ff7ce2fb8d86
-
Filesize
71KB
MD5f558323a0bd928b28d92886c451422af
SHA1f8fea1577dde45a7e64beb369c7dd5a82f4e63b0
SHA2561c1b228eb1b74e7e6145bda0fbbfc085bd8161246261b86c2accc74c3db5cdce
SHA51229081513b01c9e477c1c5c27b7e31900a78ad6644f88d5d8923b386574628ad5180cbfb0d57f8cc6d339adfa425fc0f1231f4285a33d033ea18373cdd1273465
-
Filesize
71KB
MD5f558323a0bd928b28d92886c451422af
SHA1f8fea1577dde45a7e64beb369c7dd5a82f4e63b0
SHA2561c1b228eb1b74e7e6145bda0fbbfc085bd8161246261b86c2accc74c3db5cdce
SHA51229081513b01c9e477c1c5c27b7e31900a78ad6644f88d5d8923b386574628ad5180cbfb0d57f8cc6d339adfa425fc0f1231f4285a33d033ea18373cdd1273465
-
Filesize
616KB
MD5d95f63fa0b502ae717230d7392179e4b
SHA1a8ea7f062f82967b349034d6e5879689dfe0785a
SHA2563d7b54951fa0e3d98601ddde73932d4f0d0f82da51501266d6b7f78af3e12f04
SHA512d8a82eb0468d9feec9d55bd9e0f71eec72f951144b0c4ca16b90d782029b94279d4647de8106f3740ec7cdc4a1bc92c66f73096c8a051aef2c2646914156defa
-
Filesize
4.0MB
MD506103d1e931ea83afb5cac974113c513
SHA1ef70b042a19addb747697ee3270e1723ff988f5c
SHA2565fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63
SHA512f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f
-
Filesize
4.0MB
MD506103d1e931ea83afb5cac974113c513
SHA1ef70b042a19addb747697ee3270e1723ff988f5c
SHA2565fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63
SHA512f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f