Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/03/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe
Resource
win10-20230220-en
General
-
Target
ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe
-
Size
1002KB
-
MD5
ca435acdfcab140bd54d7b720a8dc228
-
SHA1
03f31ab6b97e3b9e32fd612b51b027d7e908527b
-
SHA256
ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab
-
SHA512
f8063e95c4e97621cd17cba81bc23fa334bb70dbbd555020f1de8b95dd5014a5a237d601fac40d8bf286e474c0ad12af584f7c196c6836dc3a18fae4ede685c7
-
SSDEEP
12288:qMrjy90ZEQ6Sf5LPhsi5YRMsm+GlOGU1Wq5tPyoHDHq+lQ21G8mdP80V6zg/v/d7:1yaLPIm+GlODWsPy+DIuG8mi0kzm7
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
build_main
80.85.156.168:20189
-
auth_value
5e5c9cacc6d168f8ade7fb6419edb114
Extracted
redline
Rocket
95.217.188.21:7283
-
auth_value
0095203c91b01efccf3842dc176e53f2
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz5336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz5336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v3617Dw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v3617Dw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v3617Dw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v3617Dw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz5336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz5336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz5336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v3617Dw.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 23 IoCs
resource yara_rule behavioral1/memory/1300-196-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/1300-197-0x0000000004DD0000-0x0000000004E14000-memory.dmp family_redline behavioral1/memory/1300-198-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-199-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-201-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-203-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-205-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-207-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-209-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-211-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-213-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-215-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-219-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-217-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-221-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-223-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-225-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-227-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-229-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-231-0x0000000004DD0000-0x0000000004E0E000-memory.dmp family_redline behavioral1/memory/1300-273-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline behavioral1/memory/1300-274-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline behavioral1/memory/1300-1117-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 524 zap6446.exe 664 zap3730.exe 2120 zap8203.exe 4156 tz5336.exe 1384 v3617Dw.exe 1300 w44Cy44.exe 2692 xTWJe63.exe 3168 y21uf62.exe 4596 legenda.exe 5016 KMuffPQJRlr6.exe 1408 LowesDistillery.exe 2428 AlCapone99.exe 1412 legenda.exe -
Loads dropped DLL 1 IoCs
pid Process 5108 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v3617Dw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz5336.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v3617Dw.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe Key opened \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe Key opened \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap3730.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap8203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap8203.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap6446.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap6446.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3730.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5016 set thread context of 624 5016 KMuffPQJRlr6.exe 88 PID 2428 set thread context of 4128 2428 AlCapone99.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 LowesDistillery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier LowesDistillery.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4156 tz5336.exe 4156 tz5336.exe 1384 v3617Dw.exe 1384 v3617Dw.exe 1300 w44Cy44.exe 1300 w44Cy44.exe 2692 xTWJe63.exe 2692 xTWJe63.exe 624 AppLaunch.exe 4128 AppLaunch.exe 4128 AppLaunch.exe 624 AppLaunch.exe 1408 LowesDistillery.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4156 tz5336.exe Token: SeDebugPrivilege 1384 v3617Dw.exe Token: SeDebugPrivilege 1300 w44Cy44.exe Token: SeDebugPrivilege 2692 xTWJe63.exe Token: SeDebugPrivilege 1408 LowesDistillery.exe Token: SeDebugPrivilege 624 AppLaunch.exe Token: SeDebugPrivilege 4128 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 524 4092 ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe 66 PID 4092 wrote to memory of 524 4092 ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe 66 PID 4092 wrote to memory of 524 4092 ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe 66 PID 524 wrote to memory of 664 524 zap6446.exe 67 PID 524 wrote to memory of 664 524 zap6446.exe 67 PID 524 wrote to memory of 664 524 zap6446.exe 67 PID 664 wrote to memory of 2120 664 zap3730.exe 68 PID 664 wrote to memory of 2120 664 zap3730.exe 68 PID 664 wrote to memory of 2120 664 zap3730.exe 68 PID 2120 wrote to memory of 4156 2120 zap8203.exe 69 PID 2120 wrote to memory of 4156 2120 zap8203.exe 69 PID 2120 wrote to memory of 1384 2120 zap8203.exe 70 PID 2120 wrote to memory of 1384 2120 zap8203.exe 70 PID 2120 wrote to memory of 1384 2120 zap8203.exe 70 PID 664 wrote to memory of 1300 664 zap3730.exe 71 PID 664 wrote to memory of 1300 664 zap3730.exe 71 PID 664 wrote to memory of 1300 664 zap3730.exe 71 PID 524 wrote to memory of 2692 524 zap6446.exe 73 PID 524 wrote to memory of 2692 524 zap6446.exe 73 PID 524 wrote to memory of 2692 524 zap6446.exe 73 PID 4092 wrote to memory of 3168 4092 ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe 74 PID 4092 wrote to memory of 3168 4092 ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe 74 PID 4092 wrote to memory of 3168 4092 ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe 74 PID 3168 wrote to memory of 4596 3168 y21uf62.exe 75 PID 3168 wrote to memory of 4596 3168 y21uf62.exe 75 PID 3168 wrote to memory of 4596 3168 y21uf62.exe 75 PID 4596 wrote to memory of 3676 4596 legenda.exe 76 PID 4596 wrote to memory of 3676 4596 legenda.exe 76 PID 4596 wrote to memory of 3676 4596 legenda.exe 76 PID 4596 wrote to memory of 592 4596 legenda.exe 78 PID 4596 wrote to memory of 592 4596 legenda.exe 78 PID 4596 wrote to memory of 592 4596 legenda.exe 78 PID 592 wrote to memory of 3952 592 cmd.exe 80 PID 592 wrote to memory of 3952 592 cmd.exe 80 PID 592 wrote to memory of 3952 592 cmd.exe 80 PID 592 wrote to memory of 360 592 cmd.exe 81 PID 592 wrote to memory of 360 592 cmd.exe 81 PID 592 wrote to memory of 360 592 cmd.exe 81 PID 592 wrote to memory of 4132 592 cmd.exe 82 PID 592 wrote to memory of 4132 592 cmd.exe 82 PID 592 wrote to memory of 4132 592 cmd.exe 82 PID 592 wrote to memory of 4116 592 cmd.exe 83 PID 592 wrote to memory of 4116 592 cmd.exe 83 PID 592 wrote to memory of 4116 592 cmd.exe 83 PID 592 wrote to memory of 4228 592 cmd.exe 84 PID 592 wrote to memory of 4228 592 cmd.exe 84 PID 592 wrote to memory of 4228 592 cmd.exe 84 PID 592 wrote to memory of 4232 592 cmd.exe 85 PID 592 wrote to memory of 4232 592 cmd.exe 85 PID 592 wrote to memory of 4232 592 cmd.exe 85 PID 4596 wrote to memory of 5016 4596 legenda.exe 86 PID 4596 wrote to memory of 5016 4596 legenda.exe 86 PID 4596 wrote to memory of 5016 4596 legenda.exe 86 PID 5016 wrote to memory of 624 5016 KMuffPQJRlr6.exe 88 PID 5016 wrote to memory of 624 5016 KMuffPQJRlr6.exe 88 PID 5016 wrote to memory of 624 5016 KMuffPQJRlr6.exe 88 PID 5016 wrote to memory of 624 5016 KMuffPQJRlr6.exe 88 PID 5016 wrote to memory of 624 5016 KMuffPQJRlr6.exe 88 PID 4596 wrote to memory of 1408 4596 legenda.exe 89 PID 4596 wrote to memory of 1408 4596 legenda.exe 89 PID 4596 wrote to memory of 1408 4596 legenda.exe 89 PID 4596 wrote to memory of 2428 4596 legenda.exe 90 PID 4596 wrote to memory of 2428 4596 legenda.exe 90 PID 4596 wrote to memory of 2428 4596 legenda.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe"C:\Users\Admin\AppData\Local\Temp\ee8ef94f35b53a964f50acc338e134e356d8073645cbd233c8281d836ea56fab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6446.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap6446.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3730.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3730.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8203.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8203.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5336.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5336.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3617Dw.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3617Dw.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w44Cy44.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w44Cy44.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xTWJe63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xTWJe63.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y21uf62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y21uf62.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:3676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:4132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:4228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:4232
-
-
-
C:\Users\Admin\AppData\Roaming\1000075000\KMuffPQJRlr6.exe"C:\Users\Admin\AppData\Roaming\1000075000\KMuffPQJRlr6.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000076001\LowesDistillery.exe"C:\Users\Admin\AppData\Local\Temp\1000076001\LowesDistillery.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1408 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵PID:4460
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:432
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵PID:4496
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key5⤵PID:1780
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:5088
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear6⤵PID:3096
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key6⤵PID:868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000079001\AlCapone99.exe"C:\Users\Admin\AppData\Local\Temp\1000079001\AlCapone99.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:1412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD513b788cff530954784ba3005069cc093
SHA1ee05e172f685366d0238d674f8b65f74d50b8f5b
SHA256da193ca9f2a4f9397ee4944b55ff0ccf8d75b234e94a519ca8b624585c04d344
SHA512a4980c9585280fa44dbb5bcbe985e2691965db12d8bbc26e56327a938f77247dd4584b432a8fd6a5ed721a56ed05570f399c63eca12d6136025500e81aab15ca
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
261KB
MD53db6d94b8df4916aa7cb0d67f2bba3f6
SHA1b27b508ce16462268b6a96a727007755fe62c8a1
SHA25615b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
SHA51247495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
Filesize
261KB
MD53db6d94b8df4916aa7cb0d67f2bba3f6
SHA1b27b508ce16462268b6a96a727007755fe62c8a1
SHA25615b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
SHA51247495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
Filesize
261KB
MD53db6d94b8df4916aa7cb0d67f2bba3f6
SHA1b27b508ce16462268b6a96a727007755fe62c8a1
SHA25615b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
SHA51247495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
818KB
MD5b241712388ca2b001d6b0b4a37dd4f9a
SHA1a5e0062213d668e4006d070a2221f25463e2c3bc
SHA256f0ef83816793dba2633a203917afbb4c1cd35b959bfb49b923d18db38531fc93
SHA512dec3d3c3a4dd2d46ed172e1488f6749347d56fa8d80858576fcd8d7d93ce54a768220cb787837963f7b4196a59e3e76f074614a06b27198258e9bbc0e212684d
-
Filesize
818KB
MD5b241712388ca2b001d6b0b4a37dd4f9a
SHA1a5e0062213d668e4006d070a2221f25463e2c3bc
SHA256f0ef83816793dba2633a203917afbb4c1cd35b959bfb49b923d18db38531fc93
SHA512dec3d3c3a4dd2d46ed172e1488f6749347d56fa8d80858576fcd8d7d93ce54a768220cb787837963f7b4196a59e3e76f074614a06b27198258e9bbc0e212684d
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
676KB
MD54cd87448716ec347e6260088fbe07f67
SHA1b54cba690cc914ad62394c0615018a4c50277e08
SHA256a9f13dda52f6a7ab1de00af05790446069492eb597281c25e6ac2f7f04c4db21
SHA512b558435207a56dddacd981f882dc57481cd01849208b8d56af0942d3cda8e2151f953cd27a5ad4cc13471d14a9e150311ed83489fd61580094749c0c04710f2d
-
Filesize
676KB
MD54cd87448716ec347e6260088fbe07f67
SHA1b54cba690cc914ad62394c0615018a4c50277e08
SHA256a9f13dda52f6a7ab1de00af05790446069492eb597281c25e6ac2f7f04c4db21
SHA512b558435207a56dddacd981f882dc57481cd01849208b8d56af0942d3cda8e2151f953cd27a5ad4cc13471d14a9e150311ed83489fd61580094749c0c04710f2d
-
Filesize
349KB
MD5f0021610a79959059ad6dd93825d5c29
SHA1aa4c686268e7a3560bf95f7e2f6e6f42e199e3e8
SHA2564ca5844eb65d53147662c886b5a2df669edb05df40c8256e9dd3dc4d8a86e80c
SHA5122d206291b04858dc2e8a2ec43d445534f3e2ca711be5c66fd0fb7d3cae75585cb27fe175d2e03f34e907e3644917154d58e9cf5cd0a55368cac8e9ccbbfe0936
-
Filesize
349KB
MD5f0021610a79959059ad6dd93825d5c29
SHA1aa4c686268e7a3560bf95f7e2f6e6f42e199e3e8
SHA2564ca5844eb65d53147662c886b5a2df669edb05df40c8256e9dd3dc4d8a86e80c
SHA5122d206291b04858dc2e8a2ec43d445534f3e2ca711be5c66fd0fb7d3cae75585cb27fe175d2e03f34e907e3644917154d58e9cf5cd0a55368cac8e9ccbbfe0936
-
Filesize
334KB
MD5967052d704efb0f1f0eb3e3a2fb72b02
SHA16b86d15e155f342a12ecdfc2969438a4fed1f07f
SHA2565563de11a07e3c03de5c8bea589a9e1bb8011356914e9111cb5f60f5bc14b6cf
SHA512fef21a8c37ef62fff42a7034810c0d3572c780af69547ffb8e261363d49bbc8a14190bcfa8b9775798424b31695260cf9ff1e6668f5af085e0b1bbff21704cef
-
Filesize
334KB
MD5967052d704efb0f1f0eb3e3a2fb72b02
SHA16b86d15e155f342a12ecdfc2969438a4fed1f07f
SHA2565563de11a07e3c03de5c8bea589a9e1bb8011356914e9111cb5f60f5bc14b6cf
SHA512fef21a8c37ef62fff42a7034810c0d3572c780af69547ffb8e261363d49bbc8a14190bcfa8b9775798424b31695260cf9ff1e6668f5af085e0b1bbff21704cef
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5dc2dfef3dfc80cb168a5709cfcea298d
SHA1b7d54c0f431380579db3a27396ee90da67ec6b5c
SHA2562590bd295a495d9b4489be315fdd2490b9ede95e8f34d8ebebce1b7e3f3d526e
SHA5129d347d7cd23798487c77e961cc97dabfb86ddb3dc0e462b641cdd5ae4c09b0d2c383ee8b5d8dea3700f7a54576c979064b8c3fdc4b5a6ad2ebee103904013aaa
-
Filesize
290KB
MD5dc2dfef3dfc80cb168a5709cfcea298d
SHA1b7d54c0f431380579db3a27396ee90da67ec6b5c
SHA2562590bd295a495d9b4489be315fdd2490b9ede95e8f34d8ebebce1b7e3f3d526e
SHA5129d347d7cd23798487c77e961cc97dabfb86ddb3dc0e462b641cdd5ae4c09b0d2c383ee8b5d8dea3700f7a54576c979064b8c3fdc4b5a6ad2ebee103904013aaa
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2