Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2023, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe
Resource
win10v2004-20230220-en
General
-
Target
d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe
-
Size
180KB
-
MD5
15b60623c9bca83824f1167b90e85e19
-
SHA1
2843541afb8ec9fc10083a4cf89e3eea9fa8085f
-
SHA256
d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b
-
SHA512
2de2f0baffef67c1cd5653e30fd7a640881373484db86e465b157d9d6e2bfb329295b911d6eaaa8b880160277afc4dda21ff6c70a8f114da32315c6bc10f4634
-
SSDEEP
3072:3+utkx7rgxYELEcyZ5lJuulGSrCGpZ7jAXPSQ:ZaxngxYrZbI6hTj
Malware Config
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2208-134-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beLr15dq86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beLr15dq86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beLr15dq86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ctqK45Jk49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ctqK45Jk49.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection beLr15dq86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beLr15dq86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ctqK45Jk49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ctqK45Jk49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ctqK45Jk49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ctqK45Jk49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beLr15dq86.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 12 IoCs
resource yara_rule behavioral1/memory/984-264-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-266-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-263-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-268-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-270-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-272-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-274-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-276-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-278-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-280-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-282-0x00000000027E0000-0x000000000281E000-memory.dmp family_redline behavioral1/memory/984-1183-0x0000000004C20000-0x0000000004C30000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation hk13ZW76Ie05.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation ghaaer.exe -
Executes dropped EXE 11 IoCs
pid Process 4364 CE13.exe 3188 ptEs6151kh.exe 4512 ptRO8927Sb.exe 2916 ptbZ4254WA.exe 4876 beLr15dq86.exe 3584 ctqK45Jk49.exe 984 drSX35Pf60.exe 4664 hk13ZW76Ie05.exe 2556 ghaaer.exe 3500 jxUx11kr67.exe 3224 ghaaer.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features beLr15dq86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" beLr15dq86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ctqK45Jk49.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptEs6151kh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptEs6151kh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptRO8927Sb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptRO8927Sb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptbZ4254WA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptbZ4254WA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce CE13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" CE13.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4460 4876 WerFault.exe 97 2984 984 WerFault.exe 119 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe 2208 d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3080 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2208 d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found 3080 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4876 beLr15dq86.exe Token: SeShutdownPrivilege 3080 Process not Found Token: SeCreatePagefilePrivilege 3080 Process not Found Token: SeDebugPrivilege 3584 ctqK45Jk49.exe Token: SeDebugPrivilege 984 drSX35Pf60.exe Token: SeShutdownPrivilege 3080 Process not Found Token: SeCreatePagefilePrivilege 3080 Process not Found Token: SeShutdownPrivilege 3080 Process not Found Token: SeCreatePagefilePrivilege 3080 Process not Found Token: SeShutdownPrivilege 3080 Process not Found Token: SeCreatePagefilePrivilege 3080 Process not Found Token: SeDebugPrivilege 3500 jxUx11kr67.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4364 3080 Process not Found 93 PID 3080 wrote to memory of 4364 3080 Process not Found 93 PID 3080 wrote to memory of 4364 3080 Process not Found 93 PID 4364 wrote to memory of 3188 4364 CE13.exe 94 PID 4364 wrote to memory of 3188 4364 CE13.exe 94 PID 4364 wrote to memory of 3188 4364 CE13.exe 94 PID 3188 wrote to memory of 4512 3188 ptEs6151kh.exe 95 PID 3188 wrote to memory of 4512 3188 ptEs6151kh.exe 95 PID 3188 wrote to memory of 4512 3188 ptEs6151kh.exe 95 PID 4512 wrote to memory of 2916 4512 ptRO8927Sb.exe 96 PID 4512 wrote to memory of 2916 4512 ptRO8927Sb.exe 96 PID 4512 wrote to memory of 2916 4512 ptRO8927Sb.exe 96 PID 2916 wrote to memory of 4876 2916 ptbZ4254WA.exe 97 PID 2916 wrote to memory of 4876 2916 ptbZ4254WA.exe 97 PID 2916 wrote to memory of 4876 2916 ptbZ4254WA.exe 97 PID 3080 wrote to memory of 1972 3080 Process not Found 101 PID 3080 wrote to memory of 1972 3080 Process not Found 101 PID 3080 wrote to memory of 1972 3080 Process not Found 101 PID 3080 wrote to memory of 1972 3080 Process not Found 101 PID 3080 wrote to memory of 2308 3080 Process not Found 103 PID 3080 wrote to memory of 2308 3080 Process not Found 103 PID 3080 wrote to memory of 2308 3080 Process not Found 103 PID 3080 wrote to memory of 5096 3080 Process not Found 105 PID 3080 wrote to memory of 5096 3080 Process not Found 105 PID 3080 wrote to memory of 5096 3080 Process not Found 105 PID 3080 wrote to memory of 5096 3080 Process not Found 105 PID 3080 wrote to memory of 4784 3080 Process not Found 109 PID 3080 wrote to memory of 4784 3080 Process not Found 109 PID 3080 wrote to memory of 4784 3080 Process not Found 109 PID 3080 wrote to memory of 2324 3080 Process not Found 111 PID 3080 wrote to memory of 2324 3080 Process not Found 111 PID 3080 wrote to memory of 2324 3080 Process not Found 111 PID 3080 wrote to memory of 2324 3080 Process not Found 111 PID 3080 wrote to memory of 4012 3080 Process not Found 112 PID 3080 wrote to memory of 4012 3080 Process not Found 112 PID 3080 wrote to memory of 4012 3080 Process not Found 112 PID 3080 wrote to memory of 4012 3080 Process not Found 112 PID 3080 wrote to memory of 2164 3080 Process not Found 113 PID 3080 wrote to memory of 2164 3080 Process not Found 113 PID 3080 wrote to memory of 2164 3080 Process not Found 113 PID 3080 wrote to memory of 2164 3080 Process not Found 113 PID 3080 wrote to memory of 228 3080 Process not Found 114 PID 3080 wrote to memory of 228 3080 Process not Found 114 PID 3080 wrote to memory of 228 3080 Process not Found 114 PID 3080 wrote to memory of 1248 3080 Process not Found 115 PID 3080 wrote to memory of 1248 3080 Process not Found 115 PID 3080 wrote to memory of 1248 3080 Process not Found 115 PID 3080 wrote to memory of 1248 3080 Process not Found 115 PID 2916 wrote to memory of 3584 2916 ptbZ4254WA.exe 118 PID 2916 wrote to memory of 3584 2916 ptbZ4254WA.exe 118 PID 4512 wrote to memory of 984 4512 ptRO8927Sb.exe 119 PID 4512 wrote to memory of 984 4512 ptRO8927Sb.exe 119 PID 4512 wrote to memory of 984 4512 ptRO8927Sb.exe 119 PID 3188 wrote to memory of 4664 3188 ptEs6151kh.exe 122 PID 3188 wrote to memory of 4664 3188 ptEs6151kh.exe 122 PID 3188 wrote to memory of 4664 3188 ptEs6151kh.exe 122 PID 4664 wrote to memory of 2556 4664 hk13ZW76Ie05.exe 123 PID 4664 wrote to memory of 2556 4664 hk13ZW76Ie05.exe 123 PID 4664 wrote to memory of 2556 4664 hk13ZW76Ie05.exe 123 PID 4364 wrote to memory of 3500 4364 CE13.exe 124 PID 4364 wrote to memory of 3500 4364 CE13.exe 124 PID 4364 wrote to memory of 3500 4364 CE13.exe 124 PID 2556 wrote to memory of 1308 2556 ghaaer.exe 125 PID 2556 wrote to memory of 1308 2556 ghaaer.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe"C:\Users\Admin\AppData\Local\Temp\d2c003daab8f6f32f6feeeff393cff2be86149c98ab4f484e266ca304bab5e8b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2208
-
C:\Users\Admin\AppData\Local\Temp\CE13.exeC:\Users\Admin\AppData\Local\Temp\CE13.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptEs6151kh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptEs6151kh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptRO8927Sb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptRO8927Sb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptbZ4254WA.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptbZ4254WA.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beLr15dq86.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beLr15dq86.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 10886⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ctqK45Jk49.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ctqK45Jk49.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\drSX35Pf60.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\drSX35Pf60.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 16445⤵
- Program crash
PID:2984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk13ZW76Ie05.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk13ZW76Ie05.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe" /F5⤵
- Creates scheduled task(s)
PID:1308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit5⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:N"6⤵PID:1300
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "ghaaer.exe" /P "Admin:R" /E6⤵PID:4008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:N"6⤵PID:4080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3120
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:R" /E6⤵PID:3436
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxUx11kr67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxUx11kr67.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1972
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2308
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5096
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4784
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2324
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4012
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2164
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:228
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4876 -ip 48761⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 984 -ip 9841⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\ghaaer.exe1⤵
- Executes dropped EXE
PID:3224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD55be5a732113282a7824ceb2a359b6468
SHA10d7b6225bfd5a5fea2d9895e1470e86a0dc2ddd7
SHA25600b159ce6ab2aa22a678a455d978814597d59942345ad9491ab5dd6ff3066bee
SHA512a36556727e948b7e0e8e6ab5d8bb80fbeffeff020bf38a6f61cd7b498052cbc4972282e5a66a0998e42363468cf89a3a9b9bd17bc56e4160e7462f9086fa656c
-
Filesize
235KB
MD55be5a732113282a7824ceb2a359b6468
SHA10d7b6225bfd5a5fea2d9895e1470e86a0dc2ddd7
SHA25600b159ce6ab2aa22a678a455d978814597d59942345ad9491ab5dd6ff3066bee
SHA512a36556727e948b7e0e8e6ab5d8bb80fbeffeff020bf38a6f61cd7b498052cbc4972282e5a66a0998e42363468cf89a3a9b9bd17bc56e4160e7462f9086fa656c
-
Filesize
235KB
MD55be5a732113282a7824ceb2a359b6468
SHA10d7b6225bfd5a5fea2d9895e1470e86a0dc2ddd7
SHA25600b159ce6ab2aa22a678a455d978814597d59942345ad9491ab5dd6ff3066bee
SHA512a36556727e948b7e0e8e6ab5d8bb80fbeffeff020bf38a6f61cd7b498052cbc4972282e5a66a0998e42363468cf89a3a9b9bd17bc56e4160e7462f9086fa656c
-
Filesize
235KB
MD55be5a732113282a7824ceb2a359b6468
SHA10d7b6225bfd5a5fea2d9895e1470e86a0dc2ddd7
SHA25600b159ce6ab2aa22a678a455d978814597d59942345ad9491ab5dd6ff3066bee
SHA512a36556727e948b7e0e8e6ab5d8bb80fbeffeff020bf38a6f61cd7b498052cbc4972282e5a66a0998e42363468cf89a3a9b9bd17bc56e4160e7462f9086fa656c
-
Filesize
987KB
MD55099192858e37d02e92eb0e26da67658
SHA178ffb0acbf3d8680d7850b53c921bef958e4d53d
SHA256ed3379bdacb8ecf62eb7e86d618e6b370cb486e115087b6be96f3379959890d6
SHA5121feae8dcf8b28fdb49e0a3c0cb4d8104ab9711df9e2ad9d374c40ec0300c2335e53548d133072a3170fdf7a6dfc49f60293f3d44f57d0d0f96233b15ff1d71af
-
Filesize
987KB
MD55099192858e37d02e92eb0e26da67658
SHA178ffb0acbf3d8680d7850b53c921bef958e4d53d
SHA256ed3379bdacb8ecf62eb7e86d618e6b370cb486e115087b6be96f3379959890d6
SHA5121feae8dcf8b28fdb49e0a3c0cb4d8104ab9711df9e2ad9d374c40ec0300c2335e53548d133072a3170fdf7a6dfc49f60293f3d44f57d0d0f96233b15ff1d71af
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
842KB
MD556440d35c987ec636af6514945f1d263
SHA1c258074c5b7885bb7738d975a0fe9b35662a12d5
SHA256b9a49998e730d2e1fb8dbe2f7fd68804d53553a63f98fb0eb5d817d58977c94c
SHA512607f427d3ef61c4bf9ccdb50f7a300ea7b3d8171e269e40a17191df295e794facc45ea3994bba909ce3f47d83c517369ef3130b2af28939f70171ed898c19962
-
Filesize
842KB
MD556440d35c987ec636af6514945f1d263
SHA1c258074c5b7885bb7738d975a0fe9b35662a12d5
SHA256b9a49998e730d2e1fb8dbe2f7fd68804d53553a63f98fb0eb5d817d58977c94c
SHA512607f427d3ef61c4bf9ccdb50f7a300ea7b3d8171e269e40a17191df295e794facc45ea3994bba909ce3f47d83c517369ef3130b2af28939f70171ed898c19962
-
Filesize
235KB
MD55be5a732113282a7824ceb2a359b6468
SHA10d7b6225bfd5a5fea2d9895e1470e86a0dc2ddd7
SHA25600b159ce6ab2aa22a678a455d978814597d59942345ad9491ab5dd6ff3066bee
SHA512a36556727e948b7e0e8e6ab5d8bb80fbeffeff020bf38a6f61cd7b498052cbc4972282e5a66a0998e42363468cf89a3a9b9bd17bc56e4160e7462f9086fa656c
-
Filesize
235KB
MD55be5a732113282a7824ceb2a359b6468
SHA10d7b6225bfd5a5fea2d9895e1470e86a0dc2ddd7
SHA25600b159ce6ab2aa22a678a455d978814597d59942345ad9491ab5dd6ff3066bee
SHA512a36556727e948b7e0e8e6ab5d8bb80fbeffeff020bf38a6f61cd7b498052cbc4972282e5a66a0998e42363468cf89a3a9b9bd17bc56e4160e7462f9086fa656c
-
Filesize
656KB
MD516543fafdf15070730715502baa0df50
SHA1e506f4dd7f920f67dcd8b2274519844ef9dcac61
SHA256e5462ba098f9261fa05f0e4df152d8f558c1871b84de5a291b016e971dbffe22
SHA5125e468cb6bbfe154fdc73a21793fe96a91a29d0f46fb7b5b4400132d51f2301eeac5f46813f94d03d089109db0ac83d0b3da27fb32226bc90d4f53c3cf8e3d12a
-
Filesize
656KB
MD516543fafdf15070730715502baa0df50
SHA1e506f4dd7f920f67dcd8b2274519844ef9dcac61
SHA256e5462ba098f9261fa05f0e4df152d8f558c1871b84de5a291b016e971dbffe22
SHA5125e468cb6bbfe154fdc73a21793fe96a91a29d0f46fb7b5b4400132d51f2301eeac5f46813f94d03d089109db0ac83d0b3da27fb32226bc90d4f53c3cf8e3d12a
-
Filesize
290KB
MD50dcb6db316be04c378daade20a9aa75c
SHA1a283f1bdbd0ba99857ad42799b6cf07d9520aac3
SHA256ae562efa5f83ca3cb53ca51d5748ee68a89f17a14457f73bed7f0d379ebdf3b6
SHA512c292ad785c6765630f957b17f75ce0398647c84ca98148a2228f12271971b4bf08ae4d25da08e6b8bc55bea6d976bf4835756af03e760cef98c05c3c1019bce6
-
Filesize
290KB
MD50dcb6db316be04c378daade20a9aa75c
SHA1a283f1bdbd0ba99857ad42799b6cf07d9520aac3
SHA256ae562efa5f83ca3cb53ca51d5748ee68a89f17a14457f73bed7f0d379ebdf3b6
SHA512c292ad785c6765630f957b17f75ce0398647c84ca98148a2228f12271971b4bf08ae4d25da08e6b8bc55bea6d976bf4835756af03e760cef98c05c3c1019bce6
-
Filesize
328KB
MD5af94361216807a91becdfe3a7893bcb5
SHA13198bfe49d9f346bdf7d65a4cf99c24fc3a35552
SHA256654baf9c8bbc930dc00d8f5ba972e3e05f5291686ca4f398818a82bc84e98fbd
SHA512e1e139999971281183b88c0ad938b54701542c7ecb1d9a28fdfadbd167a7f41decd0ca9d35a85c67eeb4204f723adff1c369fcaf3d83a12f41306710686acb7b
-
Filesize
328KB
MD5af94361216807a91becdfe3a7893bcb5
SHA13198bfe49d9f346bdf7d65a4cf99c24fc3a35552
SHA256654baf9c8bbc930dc00d8f5ba972e3e05f5291686ca4f398818a82bc84e98fbd
SHA512e1e139999971281183b88c0ad938b54701542c7ecb1d9a28fdfadbd167a7f41decd0ca9d35a85c67eeb4204f723adff1c369fcaf3d83a12f41306710686acb7b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
89KB
MD529b9780bb2992d018ae312ed4180a663
SHA1592a993f9518c1ceab3186a8b5007826fa204b60
SHA256b0308039b578ab07a5710745e5895b90a88133c669ca14a8f1943845387d223a
SHA512988a85a0270759d2936e9ffcdf0b0543ad29a6be6342472e796b9ee2406730b8f892f9416fe385e58ecffc39862cc74604bc32a7920133209286ca20c0ac346d
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5