Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-08-2022 16:25
Static task
static1
Behavioral task
behavioral1
Sample
ce6afbcf08be70895d0dc65e5d72bc0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce6afbcf08be70895d0dc65e5d72bc0c.exe
Resource
win10v2004-20220812-en
General
-
Target
ce6afbcf08be70895d0dc65e5d72bc0c.exe
-
Size
1.1MB
-
MD5
ce6afbcf08be70895d0dc65e5d72bc0c
-
SHA1
0891df1c147c5af34a2213fcda1a24c4cae9c634
-
SHA256
f0f8fb599991890cfa572fa802710ca60a61f8d2f64edc7a0e7b24b7811c20d1
-
SHA512
e1efe945788a30ec4567e06fc305201075866783ab8c20ec6ef995512d23b62f802b657c545ee020b2f8d9c11111898e6619be6f8f41d76d941573cb67feeff3
Malware Config
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
5
176.113.115.146:9582
-
auth_value
d38b30c1ccd6c1e5088d9e5bd9e51b0f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
Processes:
resource yara_rule \Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline \Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline behavioral1/memory/1120-82-0x0000000000F80000-0x0000000000FC4000-memory.dmp family_redline behavioral1/memory/1804-84-0x00000000010F0000-0x0000000001110000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
F0geI.exekukurzka9000.exenamdoitntn.exereal.exesafert44.exeEU1.exepid process 952 F0geI.exe 1096 kukurzka9000.exe 1804 namdoitntn.exe 1704 real.exe 1120 safert44.exe 1652 EU1.exe -
Loads dropped DLL 10 IoCs
Processes:
ce6afbcf08be70895d0dc65e5d72bc0c.exepid process 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 6 IoCs
Processes:
ce6afbcf08be70895d0dc65e5d72bc0c.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\EU1.exe ce6afbcf08be70895d0dc65e5d72bc0c.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe ce6afbcf08be70895d0dc65e5d72bc0c.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe ce6afbcf08be70895d0dc65e5d72bc0c.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe ce6afbcf08be70895d0dc65e5d72bc0c.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe ce6afbcf08be70895d0dc65e5d72bc0c.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe ce6afbcf08be70895d0dc65e5d72bc0c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99BB3571-1CC7-11ED-9843-7ADD0904B6AC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99BD6FC1-1CC7-11ED-9843-7ADD0904B6AC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606e9b77d4b0d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "367352896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000d2d9d9a7ced784703aa263dbc49ecbe7b2a6356acbf7a16b7b93278ee675f20a000000000e8000000002000020000000d60ff7b8df323a5fed62e58ba8b53ee2bca5fff20828c49c1023c31f50730aa320000000ab8c49754e7348ceefcd55141b3ca6242f356eeddcf68742f896558906f5213e40000000252a1bb7c6f802f9a280d835d685212a29edf38415c095fb9041cf2e3d19d79b14402fd0c6673ad6061cfd00a76566ed31564dc1666c596d61ca7844b1e0ea9a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
real.exesafert44.exenamdoitntn.exepid process 1704 real.exe 1120 safert44.exe 1804 namdoitntn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
safert44.exenamdoitntn.exedescription pid process Token: SeDebugPrivilege 1120 safert44.exe Token: SeDebugPrivilege 1804 namdoitntn.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exepid process 1940 iexplore.exe 940 iexplore.exe 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 1940 iexplore.exe 1940 iexplore.exe 904 iexplore.exe 904 iexplore.exe 940 iexplore.exe 940 iexplore.exe 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 288 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 288 IEXPLORE.EXE 288 IEXPLORE.EXE 288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
ce6afbcf08be70895d0dc65e5d72bc0c.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 1348 wrote to memory of 1940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 904 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 904 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 904 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 904 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 940 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1420 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1420 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1420 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 1420 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe iexplore.exe PID 1348 wrote to memory of 952 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe F0geI.exe PID 1348 wrote to memory of 952 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe F0geI.exe PID 1348 wrote to memory of 952 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe F0geI.exe PID 1348 wrote to memory of 952 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe F0geI.exe PID 1348 wrote to memory of 1096 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe kukurzka9000.exe PID 1348 wrote to memory of 1096 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe kukurzka9000.exe PID 1348 wrote to memory of 1096 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe kukurzka9000.exe PID 1348 wrote to memory of 1096 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe kukurzka9000.exe PID 1348 wrote to memory of 1804 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe namdoitntn.exe PID 1348 wrote to memory of 1804 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe namdoitntn.exe PID 1348 wrote to memory of 1804 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe namdoitntn.exe PID 1348 wrote to memory of 1804 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe namdoitntn.exe PID 1348 wrote to memory of 1704 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe real.exe PID 1348 wrote to memory of 1704 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe real.exe PID 1348 wrote to memory of 1704 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe real.exe PID 1348 wrote to memory of 1704 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe real.exe PID 1348 wrote to memory of 1120 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe safert44.exe PID 1348 wrote to memory of 1120 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe safert44.exe PID 1348 wrote to memory of 1120 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe safert44.exe PID 1348 wrote to memory of 1120 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe safert44.exe PID 1348 wrote to memory of 1652 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe EU1.exe PID 1348 wrote to memory of 1652 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe EU1.exe PID 1348 wrote to memory of 1652 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe EU1.exe PID 1348 wrote to memory of 1652 1348 ce6afbcf08be70895d0dc65e5d72bc0c.exe EU1.exe PID 1940 wrote to memory of 1440 1940 iexplore.exe IEXPLORE.EXE PID 1940 wrote to memory of 1440 1940 iexplore.exe IEXPLORE.EXE PID 1940 wrote to memory of 1440 1940 iexplore.exe IEXPLORE.EXE PID 1940 wrote to memory of 1440 1940 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 288 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 288 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 288 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 288 904 iexplore.exe IEXPLORE.EXE PID 940 wrote to memory of 1540 940 iexplore.exe IEXPLORE.EXE PID 940 wrote to memory of 1540 940 iexplore.exe IEXPLORE.EXE PID 940 wrote to memory of 1540 940 iexplore.exe IEXPLORE.EXE PID 940 wrote to memory of 1540 940 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce6afbcf08be70895d0dc65e5d72bc0c.exe"C:\Users\Admin\AppData\Local\Temp\ce6afbcf08be70895d0dc65e5d72bc0c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RyjC42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1A4aK42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RLtX42⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1RCgX42⤵
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\EU1.exe"C:\Program Files (x86)\Company\NewProduct\EU1.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD5ec59f38fa35c0cf3babd976f5f23c74e
SHA12f7600ac9df0869fae48d99afe9569d83efafc8b
SHA2566d0d294e321014a3129d3533ce143f08b0a3639cc50ddaf236396b82a595925e
SHA512d4d2c4078dd40bc57d421750ac26f5467f082f6b4fae422d574ca406b928b6bb1e4f7cbb80a80b11f3908134028c6b7bb3b67c17e02d1899a6cda6e0312c3574
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{99BB0E61-1CC7-11ED-9843-7ADD0904B6AC}.datFilesize
3KB
MD518416b8a6efc9e44511f82c62ddf0574
SHA128bf539d2b41e1675b6dbb4a7717c1394b585d13
SHA25682b71a26f28a6fd6151acf60712cce957a7db26cecc3318d6531c2e3fe5c13fd
SHA51231a5e57d406d08c6ed8bf5c6f7c218d242aef3034ae79712d916f4d737843524c49472f376094d7045d7b456d14ca0765a95ee8532645bad56e8d34e7ee25f1a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{99BB0E61-1CC7-11ED-9843-7ADD0904B6AC}.datFilesize
5KB
MD52037bbf2a27e0cffa280e704dfd46678
SHA176de0ea69d1b85d3346a2d38a8754626a556aa17
SHA256b71fea626bd399d0cfa3610901ca1078239b5af13786343b45312360afec50ee
SHA51272e84bc20b58c4af701f136c1cabcd58082f4d437bc62769c26903bb886e556d60ba51cdfeedf084f69d1b2f78f0025528a15bfccb210df52869db9651f7d006
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{99BD6FC1-1CC7-11ED-9843-7ADD0904B6AC}.datFilesize
3KB
MD55e7a5793b73e76c4cfb2f0bf2899ba48
SHA157f0c0fed3e513c4ccfcfddaac6f29bd5ee57914
SHA256d02b388db86e71c4e6eed703d313a8dd415f1f07d4a8164734d0c29854d1fb1e
SHA512f1887406d2a389cae2048c59963b5ad1ca113727eb4d97104f9935564044afcf0fd88c961fa23e29a417ac3bec210f78382fbfb9448e6fb3a18d33f628d3c04b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LU6HZXN6.txtFilesize
606B
MD52befebb23172572c61c40d8a28ef24f5
SHA111a9ca8f6371b71afa20d10016aed11e7fce3a9a
SHA256337991a1cb0dee6dd6706cb60f25f6604d5d2b93203255c0fb9a1359f54c7941
SHA5124e0e0f695dfe21ee7e9c606004e2e7b73933fc2cae8d7e74e43892ab3bd26af8663b95b8282b3038f799b516de18e9f9855fb126bfd015c4d71e12474a0fb26b
-
\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD5ec59f38fa35c0cf3babd976f5f23c74e
SHA12f7600ac9df0869fae48d99afe9569d83efafc8b
SHA2566d0d294e321014a3129d3533ce143f08b0a3639cc50ddaf236396b82a595925e
SHA512d4d2c4078dd40bc57d421750ac26f5467f082f6b4fae422d574ca406b928b6bb1e4f7cbb80a80b11f3908134028c6b7bb3b67c17e02d1899a6cda6e0312c3574
-
\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD5ec59f38fa35c0cf3babd976f5f23c74e
SHA12f7600ac9df0869fae48d99afe9569d83efafc8b
SHA2566d0d294e321014a3129d3533ce143f08b0a3639cc50ddaf236396b82a595925e
SHA512d4d2c4078dd40bc57d421750ac26f5467f082f6b4fae422d574ca406b928b6bb1e4f7cbb80a80b11f3908134028c6b7bb3b67c17e02d1899a6cda6e0312c3574
-
\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
memory/952-85-0x00000000005DB000-0x00000000005EC000-memory.dmpFilesize
68KB
-
memory/952-57-0x0000000000000000-mapping.dmp
-
memory/952-115-0x00000000005DB000-0x00000000005EC000-memory.dmpFilesize
68KB
-
memory/952-86-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/952-87-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/952-116-0x00000000005DB000-0x00000000005EC000-memory.dmpFilesize
68KB
-
memory/1096-89-0x0000000001F80000-0x0000000001F92000-memory.dmpFilesize
72KB
-
memory/1096-90-0x0000000000400000-0x000000000056A000-memory.dmpFilesize
1.4MB
-
memory/1096-61-0x0000000000000000-mapping.dmp
-
memory/1120-73-0x0000000000000000-mapping.dmp
-
memory/1120-82-0x0000000000F80000-0x0000000000FC4000-memory.dmpFilesize
272KB
-
memory/1120-88-0x0000000000280000-0x0000000000286000-memory.dmpFilesize
24KB
-
memory/1348-54-0x00000000750A1000-0x00000000750A3000-memory.dmpFilesize
8KB
-
memory/1652-78-0x0000000000000000-mapping.dmp
-
memory/1704-96-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/1704-69-0x0000000000000000-mapping.dmp
-
memory/1804-84-0x00000000010F0000-0x0000000001110000-memory.dmpFilesize
128KB
-
memory/1804-65-0x0000000000000000-mapping.dmp