Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/10/2022, 04:32
221018-e51g6seeb8 1018/10/2022, 04:06
221018-epj59aedd6 718/10/2022, 03:34
221018-d417mseefj 10Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe
Resource
win10-20220901-en
General
-
Target
be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe
-
Size
521KB
-
MD5
c0318aa61a314fed79c87be28f0db3ba
-
SHA1
361e5206d2e0aeb88174c524e6c7cfb90c94670d
-
SHA256
be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b
-
SHA512
619ad72faaa694d7dd141288c8f99738d3110fb2e08ea9a5feda3777d4d32456feca66a2e0da96a0610f475e358cb9bb99fc54a179fb98674f91cb205ff7a586
-
SSDEEP
12288:bjNYGB77lC5eQoyLKWRIvwr222Zy+CQI1Cr2H:bjN99J2eOWF22ZaTe
Malware Config
Extracted
redline
BirjRo1
79.137.197.136:23532
-
auth_value
278e5c62cf6a9bb4e0ab732b17b0368e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x000c00000001429e-92.dat family_redline behavioral1/files/0x000c00000001429e-93.dat family_redline behavioral1/files/0x000c00000001429e-95.dat family_redline behavioral1/memory/740-96-0x0000000000080000-0x00000000000A8000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 876 svcmgr.exe 740 extra.exe 1532 svcmgr.exe 1780 svcmgr.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "C:\\Windows\\SvcManager\\svcnetwork.dll" be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe -
Deletes itself 1 IoCs
pid Process 584 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\WgaUtilAcc = "0" be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\SvcManager\svcmgr.exe be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe File created C:\Windows\SvcManager\svcnetwork.dll be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe File created C:\Windows\SvcManager\tempexport.inf SecEdit.exe File opened for modification C:\Windows\SvcManager\tempexport.inf SecEdit.exe File opened for modification C:\Windows\SvcManager\secedit.sdb powershell.exe File opened for modification C:\Windows\SvcManager\tempexport.inf powershell.exe File created C:\Windows\SvcManager\svcnetwork.dat be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe File created C:\Windows\SvcManager\las.ps1 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe File opened for modification C:\Windows\SvcManager\tempimport.inf powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svcmgr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svcmgr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svcmgr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svcmgr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1408 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 944 powershell.exe 1832 powershell.exe 1872 powershell.exe 740 extra.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 944 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 876 svcmgr.exe Token: SeDebugPrivilege 740 extra.exe Token: SeDebugPrivilege 1532 svcmgr.exe Token: SeDebugPrivilege 1780 svcmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1652 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 27 PID 1404 wrote to memory of 1652 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 27 PID 1404 wrote to memory of 1652 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 27 PID 1404 wrote to memory of 1652 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 27 PID 1652 wrote to memory of 1080 1652 cmd.exe 28 PID 1652 wrote to memory of 1080 1652 cmd.exe 28 PID 1652 wrote to memory of 1080 1652 cmd.exe 28 PID 1652 wrote to memory of 1080 1652 cmd.exe 28 PID 1080 wrote to memory of 2000 1080 net.exe 29 PID 1080 wrote to memory of 2000 1080 net.exe 29 PID 1080 wrote to memory of 2000 1080 net.exe 29 PID 1080 wrote to memory of 2000 1080 net.exe 29 PID 1404 wrote to memory of 1776 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 30 PID 1404 wrote to memory of 1776 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 30 PID 1404 wrote to memory of 1776 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 30 PID 1404 wrote to memory of 1776 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 30 PID 1776 wrote to memory of 944 1776 cmd.exe 31 PID 1776 wrote to memory of 944 1776 cmd.exe 31 PID 1776 wrote to memory of 944 1776 cmd.exe 31 PID 1776 wrote to memory of 944 1776 cmd.exe 31 PID 1404 wrote to memory of 892 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 32 PID 1404 wrote to memory of 892 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 32 PID 1404 wrote to memory of 892 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 32 PID 1404 wrote to memory of 892 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 32 PID 892 wrote to memory of 1832 892 cmd.exe 33 PID 892 wrote to memory of 1832 892 cmd.exe 33 PID 892 wrote to memory of 1832 892 cmd.exe 33 PID 892 wrote to memory of 1832 892 cmd.exe 33 PID 1404 wrote to memory of 1464 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 34 PID 1404 wrote to memory of 1464 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 34 PID 1404 wrote to memory of 1464 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 34 PID 1404 wrote to memory of 1464 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 34 PID 1464 wrote to memory of 1872 1464 cmd.exe 35 PID 1464 wrote to memory of 1872 1464 cmd.exe 35 PID 1464 wrote to memory of 1872 1464 cmd.exe 35 PID 1464 wrote to memory of 1872 1464 cmd.exe 35 PID 1872 wrote to memory of 1124 1872 powershell.exe 36 PID 1872 wrote to memory of 1124 1872 powershell.exe 36 PID 1872 wrote to memory of 1124 1872 powershell.exe 36 PID 1872 wrote to memory of 1124 1872 powershell.exe 36 PID 1872 wrote to memory of 1560 1872 powershell.exe 37 PID 1872 wrote to memory of 1560 1872 powershell.exe 37 PID 1872 wrote to memory of 1560 1872 powershell.exe 37 PID 1872 wrote to memory of 1560 1872 powershell.exe 37 PID 1872 wrote to memory of 1848 1872 powershell.exe 38 PID 1872 wrote to memory of 1848 1872 powershell.exe 38 PID 1872 wrote to memory of 1848 1872 powershell.exe 38 PID 1872 wrote to memory of 1848 1872 powershell.exe 38 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1872 wrote to memory of 1184 1872 powershell.exe 39 PID 1404 wrote to memory of 1820 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 40 PID 1404 wrote to memory of 1820 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 40 PID 1404 wrote to memory of 1820 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 40 PID 1404 wrote to memory of 1820 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 40 PID 1404 wrote to memory of 1460 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 41 PID 1404 wrote to memory of 1460 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 41 PID 1404 wrote to memory of 1460 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 41 PID 1404 wrote to memory of 1460 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 41 PID 1404 wrote to memory of 2032 1404 be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe"C:\Users\Admin\AppData\Local\Temp\be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe"1⤵
- Sets DLL path for service in the registry
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net user %username%2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net.exenet user Admin3⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin4⤵PID:2000
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe Set-ExecutionPolicy bypass -Force2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe Set-ExecutionPolicy bypass -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath C:\Windows\SvcManager2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath C:\Windows\SvcManager3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe C:\Windows\SvcManager\las.ps12⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe C:\Windows\SvcManager\las.ps13⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /export /cfg tempexport.inf4⤵
- Drops file in Windows directory
PID:1124
-
-
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /import /db secedit.sdb /cfg .\tempimport.inf4⤵PID:1560
-
-
C:\Windows\SysWOW64\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db secedit.sdb4⤵PID:1848
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force4⤵PID:1184
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /f C:\Windows\SvcManager\las.ps12⤵PID:1820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\extra.exe2⤵
- Loads dropped DLL
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\extra.exeC:\Users\Admin\AppData\Local\Temp\\extra.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\be9d0c8a2051d70d4434e034647c8b675a38c1f08252c94c1620fbe663bd853b.exe"2⤵
- Deletes itself
PID:584 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1408
-
-
-
C:\Windows\SvcManager\svcmgr.exeC:\Windows\SvcManager\svcmgr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:876
-
C:\Windows\SvcManager\svcmgr.exeC:\Windows\SvcManager\svcmgr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
C:\Windows\SvcManager\svcmgr.exeC:\Windows\SvcManager\svcmgr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD50072395e192397b4f98bbb6852d1d495
SHA18246494746644b90380a4458e9248e7f3341ad8f
SHA256f6eb83f11c4e97e037def9bcca9685beaf38e7a172f4b60e28ba9b479657db2c
SHA5121c5cba2c03ccb36faf837a69f89789f854e5625a428990427d2fca796864420b5648889157ef79efc10b6873a59e640aa6ac4a6ced1652927f3f9eab0b7d9e5d
-
Filesize
137KB
MD50072395e192397b4f98bbb6852d1d495
SHA18246494746644b90380a4458e9248e7f3341ad8f
SHA256f6eb83f11c4e97e037def9bcca9685beaf38e7a172f4b60e28ba9b479657db2c
SHA5121c5cba2c03ccb36faf837a69f89789f854e5625a428990427d2fca796864420b5648889157ef79efc10b6873a59e640aa6ac4a6ced1652927f3f9eab0b7d9e5d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD541db09b7ededffc3f18ebc3a66bf94a0
SHA174f3a9bd7e063d71511e4616e7a621fb7f249348
SHA256ebde9b677b929d76c91960c6f61540f9729d2289612b5923e7e647e5580c420a
SHA512652db88bcfbd42334c6a00ecf872be922a26c7808d27a6f8cb0aac86831951ef0a1394cf556ab5df58f83f1a9727cd2bf792ecac0f0907a39fa665c99d07eb7b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD541db09b7ededffc3f18ebc3a66bf94a0
SHA174f3a9bd7e063d71511e4616e7a621fb7f249348
SHA256ebde9b677b929d76c91960c6f61540f9729d2289612b5923e7e647e5580c420a
SHA512652db88bcfbd42334c6a00ecf872be922a26c7808d27a6f8cb0aac86831951ef0a1394cf556ab5df58f83f1a9727cd2bf792ecac0f0907a39fa665c99d07eb7b
-
Filesize
1KB
MD59a6fbc01aa4147aa5aa91fca92ef6dfd
SHA1f8b47020022626abef69f2032d22e89b95b994a8
SHA256f63923ddc20574ca230a3b51bf7a6bf158a53f84494e2081071c3469abb068ca
SHA512a80c89c1daa41d8c1f5c71ec06db7eaf6f686f4726ef5cce8d8854371fec4dfa88b4649ee7f78c59ff4f1f00a7296a917696a760228ce59206c09d3d7e954990
-
Filesize
788KB
MD5621074969d8ccca5585201b6268e2faf
SHA1252f556025ec03884edfd793da95179e31b055e5
SHA256e707fad41b65d06c3b6e7b2a61aa616c8256546cd9fae1acf5fa0e07d62034fe
SHA5120806a33113d2586014abbd9725443a95836ca3ae4a8e9e6d08537dd6059d4ac38112b53f7da5a548c89e6331f2bf6ffb386cb5714491f86975a9f852a7781a3a
-
Filesize
788KB
MD5621074969d8ccca5585201b6268e2faf
SHA1252f556025ec03884edfd793da95179e31b055e5
SHA256e707fad41b65d06c3b6e7b2a61aa616c8256546cd9fae1acf5fa0e07d62034fe
SHA5120806a33113d2586014abbd9725443a95836ca3ae4a8e9e6d08537dd6059d4ac38112b53f7da5a548c89e6331f2bf6ffb386cb5714491f86975a9f852a7781a3a
-
Filesize
788KB
MD5621074969d8ccca5585201b6268e2faf
SHA1252f556025ec03884edfd793da95179e31b055e5
SHA256e707fad41b65d06c3b6e7b2a61aa616c8256546cd9fae1acf5fa0e07d62034fe
SHA5120806a33113d2586014abbd9725443a95836ca3ae4a8e9e6d08537dd6059d4ac38112b53f7da5a548c89e6331f2bf6ffb386cb5714491f86975a9f852a7781a3a
-
Filesize
788KB
MD5621074969d8ccca5585201b6268e2faf
SHA1252f556025ec03884edfd793da95179e31b055e5
SHA256e707fad41b65d06c3b6e7b2a61aa616c8256546cd9fae1acf5fa0e07d62034fe
SHA5120806a33113d2586014abbd9725443a95836ca3ae4a8e9e6d08537dd6059d4ac38112b53f7da5a548c89e6331f2bf6ffb386cb5714491f86975a9f852a7781a3a
-
Filesize
16KB
MD54f9d9a31b38978d0a23c60f67fdbeedb
SHA17886fec6c38f0bff79930a97c4e75ceaba17ce32
SHA25685773e2c05d587ae800deae43ab836164aab7d35118cf4b2c0029a11fd17c8ee
SHA51212465d2898a70335cc411dc3862c43cda1b19b4f36bd6a64f188401426f2d1153801cb6c74ab64ee212a34000928a1d6794b3bbe4924986e80b24bc7338c66bb
-
Filesize
137KB
MD50072395e192397b4f98bbb6852d1d495
SHA18246494746644b90380a4458e9248e7f3341ad8f
SHA256f6eb83f11c4e97e037def9bcca9685beaf38e7a172f4b60e28ba9b479657db2c
SHA5121c5cba2c03ccb36faf837a69f89789f854e5625a428990427d2fca796864420b5648889157ef79efc10b6873a59e640aa6ac4a6ced1652927f3f9eab0b7d9e5d