Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2023 06:42
Static task
static1
Behavioral task
behavioral1
Sample
42a7f93250c5512797946e177cbaf44dfbed5d58.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42a7f93250c5512797946e177cbaf44dfbed5d58.exe
Resource
win10v2004-20220812-en
General
-
Target
42a7f93250c5512797946e177cbaf44dfbed5d58.exe
-
Size
856KB
-
MD5
beeb5de149b4c472848421bee7416093
-
SHA1
42a7f93250c5512797946e177cbaf44dfbed5d58
-
SHA256
084d376d323c8eb5d77a446295a94f236bb93945a4df6cdd5b96ba517584963e
-
SHA512
22d165f268fca102ce2197e73d657f30d3e96eb5eaa3e7daf3cf6aeec4dbfeab9ed1be4a4a791fc386dcd8198dfb60c81aa6eb1a4679978ed1c738dc1b037153
-
SSDEEP
3072:ivS07xLCZ3IhEq6OdmpBf65NvDaNN5CEddUHzNJNMsnSJ9NJCHwFwkNEqWX/ODsv:ivS09LCZ3IhE5egMrXd
Malware Config
Extracted
redline
168.119.228.126:11552
-
auth_value
ee2d0ef2a4d0cbee5b6303070e44cb8a
Extracted
laplas
clipper.guru
-
api_key
6421b2bdb6b1eebc6487e916bb1c79875fbc8da77152f9914b4aefb39a69f6d5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4080-136-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023257-218.dat xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 3996 update.exe 2148 System.exe 2716 dllhost.exe 1028 OEFGCBRcPg.exe 4756 winlogson.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 776 set thread context of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2104 schtasks.exe 4936 schtasks.exe 3644 schtasks.exe 4428 schtasks.exe 2592 schtasks.exe 3472 schtasks.exe 4552 schtasks.exe 4988 schtasks.exe 1780 schtasks.exe 1128 schtasks.exe 4836 schtasks.exe 2844 schtasks.exe 1868 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 88 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4080 csc.exe 4080 csc.exe 3996 update.exe 3492 powershell.exe 3492 powershell.exe 1124 powershell.exe 1124 powershell.exe 5008 powershell.exe 5008 powershell.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4080 csc.exe Token: SeDebugPrivilege 3996 update.exe Token: SeDebugPrivilege 3492 powershell.exe Token: SeDebugPrivilege 1124 powershell.exe Token: SeDebugPrivilege 5008 powershell.exe Token: SeDebugPrivilege 2716 dllhost.exe Token: SeLockMemoryPrivilege 4756 winlogson.exe Token: SeLockMemoryPrivilege 4756 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4756 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 204 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 80 PID 776 wrote to memory of 204 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 80 PID 776 wrote to memory of 204 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 80 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 776 wrote to memory of 4080 776 42a7f93250c5512797946e177cbaf44dfbed5d58.exe 81 PID 4080 wrote to memory of 3996 4080 csc.exe 83 PID 4080 wrote to memory of 3996 4080 csc.exe 83 PID 4080 wrote to memory of 3996 4080 csc.exe 83 PID 4080 wrote to memory of 2148 4080 csc.exe 86 PID 4080 wrote to memory of 2148 4080 csc.exe 86 PID 4080 wrote to memory of 2148 4080 csc.exe 86 PID 3996 wrote to memory of 3756 3996 update.exe 87 PID 3996 wrote to memory of 3756 3996 update.exe 87 PID 3996 wrote to memory of 3756 3996 update.exe 87 PID 3756 wrote to memory of 3608 3756 cmd.exe 89 PID 3756 wrote to memory of 3608 3756 cmd.exe 89 PID 3756 wrote to memory of 3608 3756 cmd.exe 89 PID 3756 wrote to memory of 3492 3756 cmd.exe 90 PID 3756 wrote to memory of 3492 3756 cmd.exe 90 PID 3756 wrote to memory of 3492 3756 cmd.exe 90 PID 3756 wrote to memory of 1124 3756 cmd.exe 91 PID 3756 wrote to memory of 1124 3756 cmd.exe 91 PID 3756 wrote to memory of 1124 3756 cmd.exe 91 PID 3756 wrote to memory of 5008 3756 cmd.exe 92 PID 3756 wrote to memory of 5008 3756 cmd.exe 92 PID 3756 wrote to memory of 5008 3756 cmd.exe 92 PID 3996 wrote to memory of 2716 3996 update.exe 93 PID 3996 wrote to memory of 2716 3996 update.exe 93 PID 3996 wrote to memory of 2716 3996 update.exe 93 PID 2148 wrote to memory of 3296 2148 System.exe 94 PID 2148 wrote to memory of 3296 2148 System.exe 94 PID 2148 wrote to memory of 3296 2148 System.exe 94 PID 3296 wrote to memory of 1128 3296 cmd.exe 96 PID 3296 wrote to memory of 1128 3296 cmd.exe 96 PID 3296 wrote to memory of 1128 3296 cmd.exe 96 PID 2716 wrote to memory of 528 2716 dllhost.exe 97 PID 2716 wrote to memory of 528 2716 dllhost.exe 97 PID 2716 wrote to memory of 528 2716 dllhost.exe 97 PID 2716 wrote to memory of 4060 2716 dllhost.exe 99 PID 2716 wrote to memory of 4060 2716 dllhost.exe 99 PID 2716 wrote to memory of 4060 2716 dllhost.exe 99 PID 2716 wrote to memory of 1192 2716 dllhost.exe 101 PID 2716 wrote to memory of 1192 2716 dllhost.exe 101 PID 2716 wrote to memory of 1192 2716 dllhost.exe 101 PID 2716 wrote to memory of 4916 2716 dllhost.exe 102 PID 2716 wrote to memory of 4916 2716 dllhost.exe 102 PID 2716 wrote to memory of 4916 2716 dllhost.exe 102 PID 2716 wrote to memory of 4996 2716 dllhost.exe 104 PID 2716 wrote to memory of 4996 2716 dllhost.exe 104 PID 2716 wrote to memory of 4996 2716 dllhost.exe 104 PID 2716 wrote to memory of 2316 2716 dllhost.exe 106 PID 2716 wrote to memory of 2316 2716 dllhost.exe 106 PID 2716 wrote to memory of 2316 2716 dllhost.exe 106 PID 2716 wrote to memory of 4832 2716 dllhost.exe 109 PID 2716 wrote to memory of 4832 2716 dllhost.exe 109 PID 2716 wrote to memory of 4832 2716 dllhost.exe 109 PID 2716 wrote to memory of 3068 2716 dllhost.exe 110 PID 2716 wrote to memory of 3068 2716 dllhost.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a7f93250c5512797946e177cbaf44dfbed5d58.exe"C:\Users\Admin\AppData\Local\Temp\42a7f93250c5512797946e177cbaf44dfbed5d58.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵PID:204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\update.exe"C:\Users\Admin\AppData\Local\Temp\update.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"4⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:3608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:528
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:4060
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:1192
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:4916
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:4996
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:2316
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:3472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:4832
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:3068
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1305" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:2512
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1305" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:4936
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3637" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:4068
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3637" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3434" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:2088
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3434" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:4552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5386" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵PID:228
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5386" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵PID:2084
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵PID:2592
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:4992
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn JbBFjWcHIk /tr C:\Users\Admin\AppData\Roaming\JbBFjWcHIk\OEFGCBRcPg.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn JbBFjWcHIk /tr C:\Users\Admin\AppData\Roaming\JbBFjWcHIk\OEFGCBRcPg.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f5⤵
- Creates scheduled task(s)
PID:1128
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\JbBFjWcHIk\OEFGCBRcPg.exeC:\Users\Admin\AppData\Roaming\JbBFjWcHIk\OEFGCBRcPg.exe1⤵
- Executes dropped EXE
PID:1028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD58eac424b39ecd7724237708242536dce
SHA1dbd058d840422fcaaf1d6897564e73be3641f7d3
SHA256a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229
SHA5121ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa
-
Filesize
60KB
MD58eac424b39ecd7724237708242536dce
SHA1dbd058d840422fcaaf1d6897564e73be3641f7d3
SHA256a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229
SHA5121ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa
-
Filesize
7.8MB
MD56f4532e49d65c2be0355b222f96e06e8
SHA1268e90ce25e01bbb205f6ae3f493f8da36a61480
SHA256acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab
SHA51285f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207
-
Filesize
311B
MD5a86dab3a83115be5f4ab7305f98d20d1
SHA1205065359958ec8bf0bf9aef699d680fa477aac0
SHA2569c05df57e16b54dda6dbd2bbc5362905d7d24bade2f447f23ec244adacfc8cfc
SHA51278eb7f1db743472532b726e3bef831dd532c9f347ebb2b1f3a8333cd17972e75547e98b149ecee760c0bf384b941276a2151c0551a4351bebe26fcfa87dadb7d
-
Filesize
1KB
MD513096d8d61cc161abad17c0d01e85ba3
SHA1f68befac7ee6d02916676726d6d9f63299fc29fa
SHA2562cfafde33d1bc95655a9ab469f9313f437f6dc9a168a095cfe125770df79be49
SHA5129649543ac40020a66f7a252fd66ae054a6c4e845c802c583ab0ff6dc2eb15280d719f5bda38442e6943f800365aab2fdb7d544113346346b9e3a6998e3ff5ab8
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5714a103f992132aae270574ec7505c90
SHA1856aa1c9900a73710eac61c750f9cd7b2a6d4f01
SHA256fe6909486c451a0c444648ee8047278baa6e023416585be7f89d874076911a2f
SHA5128de07c84e080457b1defacd86dc484d650a4eadf7b71af9c0f993a761dcadb44e817790226db3912a4d9426bbed415ad8ca1211b3ebedccc37aaa953583ed47c
-
Filesize
18KB
MD5d87cea3ecbb4dd5b5fc256518a0efb1c
SHA15e1c566af71813e4091af8912311046a4d27a81c
SHA2562d6c3a334014f3f06b00f874e1730b270a165538d039281856168cfd79b36919
SHA512a198348b0a7eb8a796e0df71587bff17eba870a15197a5409183d8b946f274efc1297e25c08a2837eb27a2dd3730223cc0410e3ef68ff9518f6411b988813d6b
-
Filesize
4.6MB
MD5b104c66ebdb30b1d1e0ad45a7960807f
SHA1eab91aadf465ff2ebbeb21f28d7eaec2ad21954b
SHA256fb00f8583be5fdb2c0711ab318d319f58e37f6c177621f9c3132f209a6ae09d1
SHA512d56148b368f30c51f803dcadfbc70166aef1eaa11bae69c42fcb7a138970320769b6e2410159cbd39371fdd620ce3e66a30aca08351b8f27058c44388521bc08
-
Filesize
4.6MB
MD5b104c66ebdb30b1d1e0ad45a7960807f
SHA1eab91aadf465ff2ebbeb21f28d7eaec2ad21954b
SHA256fb00f8583be5fdb2c0711ab318d319f58e37f6c177621f9c3132f209a6ae09d1
SHA512d56148b368f30c51f803dcadfbc70166aef1eaa11bae69c42fcb7a138970320769b6e2410159cbd39371fdd620ce3e66a30aca08351b8f27058c44388521bc08
-
Filesize
56KB
MD52e16b9fc1ce92309c4658bc5e78a5c63
SHA1ffee7171cefd8bcf8e27671078bf40ad41e41cbc
SHA256a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3
SHA512015a900c7f47d5c0e92bd3bc15b2aa5dcf7a8ec12900881582319c497a45d3ad1b3d33be2f221da2d501a86661f45e659c1ec5870db489e4e1d031ce5759c6de
-
Filesize
56KB
MD52e16b9fc1ce92309c4658bc5e78a5c63
SHA1ffee7171cefd8bcf8e27671078bf40ad41e41cbc
SHA256a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3
SHA512015a900c7f47d5c0e92bd3bc15b2aa5dcf7a8ec12900881582319c497a45d3ad1b3d33be2f221da2d501a86661f45e659c1ec5870db489e4e1d031ce5759c6de
-
Filesize
411.8MB
MD5d35fb8289f8c16f837a758b682e51cce
SHA17211d421024f6a6e8e892289dcbe28d34236aab5
SHA256705071920237d4501a982c5cd1340456bea4607ba97331ee314a191da305bcf2
SHA512ea45d5b4771fe0355f092e404749ac7d22348a1cc48a7ce88f5e72e570148a0bc571cc22d7f7ea6ed10c0316562922039967705513a533f0e7197f4a08a39b40
-
Filesize
415.1MB
MD5c152d9dc9039dd5f9623078087ab9106
SHA1b9225ffbbba1fd04d2c06051a74857e96cc972d5
SHA2560a24234d8f824797eb04fba35c8610a13492f613f6a01ab50901427babcd33cb
SHA5125f0fa23f054abb0528f355058e83e45a5bcc4076a1e2dd5f103ccc1200e10160bf50cc85f7e18566943cc5f398b931b4217e795a3e146f729bd3794819745f2e