Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-03-2023 04:06
Static task
static1
Behavioral task
behavioral1
Sample
ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe
Resource
win10-20230220-en
General
-
Target
ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe
-
Size
1014KB
-
MD5
d7b8d00a157c99098353d7c3720c3565
-
SHA1
9b35011452438400624e53a84d60d52c1883c74e
-
SHA256
ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f
-
SHA512
e33e2707c3457027ad13f217699630a15396fdad766016e1d6f2840067c2efe8965066629a9c5e340c15a03bec6f06ab00d2de9e7e9bde908694f4505ada35a4
-
SSDEEP
24576:pyyuimEZ9s3xdTr8amDBNRSbwjS+Ob0lDA2Cp:cyuK3s3x6amD/R4US+OoXC
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz9242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz9242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz9242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v2712pb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v2712pb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz9242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz9242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v2712pb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v2712pb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v2712pb.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1064-197-0x0000000004870000-0x00000000048B6000-memory.dmp family_redline behavioral1/memory/1064-198-0x0000000007130000-0x0000000007174000-memory.dmp family_redline behavioral1/memory/1064-203-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-204-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-206-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-208-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-212-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-214-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-210-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-216-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-218-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-220-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-222-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-224-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-226-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-228-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-230-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-232-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-234-0x0000000007130000-0x000000000716E000-memory.dmp family_redline behavioral1/memory/1064-236-0x0000000007130000-0x000000000716E000-memory.dmp family_redline -
Downloads MZ/PE file
-
.NET Reactor proctector 7 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000600000001aed1-1196.dat net_reactor behavioral1/files/0x000600000001aed1-1203.dat net_reactor behavioral1/files/0x000600000001aed1-1204.dat net_reactor behavioral1/memory/2208-1206-0x0000000000060000-0x00000000005D4000-memory.dmp net_reactor behavioral1/memory/2208-1207-0x0000000004F10000-0x0000000004F9E000-memory.dmp net_reactor behavioral1/memory/2208-1254-0x0000000004ED0000-0x0000000004EE0000-memory.dmp net_reactor behavioral1/files/0x000600000001aed1-2682.dat net_reactor -
Executes dropped EXE 15 IoCs
pid Process 4496 zap9412.exe 4252 zap8216.exe 1992 zap3768.exe 4016 tz9242.exe 2356 v2712pb.exe 1064 w03ep98.exe 4680 xSfDP57.exe 3044 y44FH10.exe 5072 legenda.exe 1164 ss47.exe 1604 ss47.exe 340 ComPlusMethone.exe 2208 Good.exe 1108 Good.exe 2160 legenda.exe -
Loads dropped DLL 1 IoCs
pid Process 3908 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz9242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v2712pb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v2712pb.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap9412.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap8216.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyTestApplication = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000138001\\Good.exe" Good.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3768.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap3768.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap8216.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 340 set thread context of 4212 340 ComPlusMethone.exe 91 PID 2208 set thread context of 1108 2208 Good.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4948 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2380 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4016 tz9242.exe 4016 tz9242.exe 2356 v2712pb.exe 2356 v2712pb.exe 1064 w03ep98.exe 1064 w03ep98.exe 4680 xSfDP57.exe 4680 xSfDP57.exe 4212 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4016 tz9242.exe Token: SeDebugPrivilege 2356 v2712pb.exe Token: SeDebugPrivilege 1064 w03ep98.exe Token: SeDebugPrivilege 4680 xSfDP57.exe Token: SeDebugPrivilege 340 ComPlusMethone.exe Token: SeDebugPrivilege 2208 Good.exe Token: SeDebugPrivilege 4212 InstallUtil.exe Token: SeDebugPrivilege 1108 Good.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4496 1852 ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe 67 PID 1852 wrote to memory of 4496 1852 ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe 67 PID 1852 wrote to memory of 4496 1852 ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe 67 PID 4496 wrote to memory of 4252 4496 zap9412.exe 68 PID 4496 wrote to memory of 4252 4496 zap9412.exe 68 PID 4496 wrote to memory of 4252 4496 zap9412.exe 68 PID 4252 wrote to memory of 1992 4252 zap8216.exe 69 PID 4252 wrote to memory of 1992 4252 zap8216.exe 69 PID 4252 wrote to memory of 1992 4252 zap8216.exe 69 PID 1992 wrote to memory of 4016 1992 zap3768.exe 70 PID 1992 wrote to memory of 4016 1992 zap3768.exe 70 PID 1992 wrote to memory of 2356 1992 zap3768.exe 71 PID 1992 wrote to memory of 2356 1992 zap3768.exe 71 PID 1992 wrote to memory of 2356 1992 zap3768.exe 71 PID 4252 wrote to memory of 1064 4252 zap8216.exe 72 PID 4252 wrote to memory of 1064 4252 zap8216.exe 72 PID 4252 wrote to memory of 1064 4252 zap8216.exe 72 PID 4496 wrote to memory of 4680 4496 zap9412.exe 74 PID 4496 wrote to memory of 4680 4496 zap9412.exe 74 PID 4496 wrote to memory of 4680 4496 zap9412.exe 74 PID 1852 wrote to memory of 3044 1852 ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe 75 PID 1852 wrote to memory of 3044 1852 ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe 75 PID 1852 wrote to memory of 3044 1852 ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe 75 PID 3044 wrote to memory of 5072 3044 y44FH10.exe 76 PID 3044 wrote to memory of 5072 3044 y44FH10.exe 76 PID 3044 wrote to memory of 5072 3044 y44FH10.exe 76 PID 5072 wrote to memory of 4948 5072 legenda.exe 77 PID 5072 wrote to memory of 4948 5072 legenda.exe 77 PID 5072 wrote to memory of 4948 5072 legenda.exe 77 PID 5072 wrote to memory of 4884 5072 legenda.exe 79 PID 5072 wrote to memory of 4884 5072 legenda.exe 79 PID 5072 wrote to memory of 4884 5072 legenda.exe 79 PID 4884 wrote to memory of 432 4884 cmd.exe 81 PID 4884 wrote to memory of 432 4884 cmd.exe 81 PID 4884 wrote to memory of 432 4884 cmd.exe 81 PID 4884 wrote to memory of 604 4884 cmd.exe 82 PID 4884 wrote to memory of 604 4884 cmd.exe 82 PID 4884 wrote to memory of 604 4884 cmd.exe 82 PID 4884 wrote to memory of 3304 4884 cmd.exe 83 PID 4884 wrote to memory of 3304 4884 cmd.exe 83 PID 4884 wrote to memory of 3304 4884 cmd.exe 83 PID 4884 wrote to memory of 2772 4884 cmd.exe 84 PID 4884 wrote to memory of 2772 4884 cmd.exe 84 PID 4884 wrote to memory of 2772 4884 cmd.exe 84 PID 4884 wrote to memory of 5052 4884 cmd.exe 85 PID 4884 wrote to memory of 5052 4884 cmd.exe 85 PID 4884 wrote to memory of 5052 4884 cmd.exe 85 PID 4884 wrote to memory of 668 4884 cmd.exe 86 PID 4884 wrote to memory of 668 4884 cmd.exe 86 PID 4884 wrote to memory of 668 4884 cmd.exe 86 PID 5072 wrote to memory of 1164 5072 legenda.exe 87 PID 5072 wrote to memory of 1164 5072 legenda.exe 87 PID 5072 wrote to memory of 1604 5072 legenda.exe 88 PID 5072 wrote to memory of 1604 5072 legenda.exe 88 PID 5072 wrote to memory of 340 5072 legenda.exe 89 PID 5072 wrote to memory of 340 5072 legenda.exe 89 PID 5072 wrote to memory of 2208 5072 legenda.exe 90 PID 5072 wrote to memory of 2208 5072 legenda.exe 90 PID 5072 wrote to memory of 2208 5072 legenda.exe 90 PID 340 wrote to memory of 4212 340 ComPlusMethone.exe 91 PID 340 wrote to memory of 4212 340 ComPlusMethone.exe 91 PID 340 wrote to memory of 4212 340 ComPlusMethone.exe 91 PID 340 wrote to memory of 4212 340 ComPlusMethone.exe 91 PID 340 wrote to memory of 4212 340 ComPlusMethone.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe"C:\Users\Admin\AppData\Local\Temp\ccb18d15d61b31a1f1a75fcd5048332816c23f883075be9d5b646fee82a8ca4f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9412.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9412.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8216.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3768.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3768.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9242.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9242.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2712pb.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2712pb.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03ep98.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03ep98.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xSfDP57.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xSfDP57.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y44FH10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y44FH10.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:4948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:3304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:5052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000135001\ss47.exe"C:\Users\Admin\AppData\Local\Temp\1000135001\ss47.exe"4⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\1000136001\ss47.exe"C:\Users\Admin\AppData\Local\Temp\1000136001\ss47.exe"4⤵
- Executes dropped EXE
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\1000137001\ComPlusMethone.exe"C:\Users\Admin\AppData\Local\Temp\1000137001\ComPlusMethone.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"5⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4212 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵PID:4368
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:3664
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile7⤵PID:1016
-
-
C:\Windows\SysWOW64\findstr.exefindstr All7⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key6⤵PID:5036
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1936
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear7⤵PID:1160
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key7⤵PID:2160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000138001\Good.exe"C:\Users\Admin\AppData\Local\Temp\1000138001\Good.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\1000138001\Good.exe"C:\Users\Admin\AppData\Local\Temp\1000138001\Good.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000138001\Good.exe"6⤵PID:2908
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:2600
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:2380
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:2160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321B
MD5076d7c48064de4effadfe36d1857322d
SHA1273f4d3f67c4ec0a637317ce2a536e52cc1c2090
SHA2567cdcfb48cb249895caa7d3b5ce9ad53c7185d426f0f5669fe79bc5e047ff29ed
SHA512e540c14a5093a1607dd47b0cdf96e21957d1b70aae24dcd99cdb3e3292451222760e8106b1e6e6091928b9998a6d307709e39081565a5e49d85c64e03bc55abf
-
Filesize
866KB
MD544d59cf2b7e4700b703e95eaa7fdbdc7
SHA1879ad987dfd297aa23626ff824da3fd43a09f32f
SHA25643e4574bbe757104766b7299c8ebf76026f0932b079e6a0ecd4325f6c0ddb36f
SHA512a6ac926bafb1aae6e0c135b18fe1b4e86a73710ba7dda15950adf13ac2a67f7d0d7128d22175985eefbd1341c210448b1a48019f5590d09be23898969b4f0049
-
Filesize
866KB
MD544d59cf2b7e4700b703e95eaa7fdbdc7
SHA1879ad987dfd297aa23626ff824da3fd43a09f32f
SHA25643e4574bbe757104766b7299c8ebf76026f0932b079e6a0ecd4325f6c0ddb36f
SHA512a6ac926bafb1aae6e0c135b18fe1b4e86a73710ba7dda15950adf13ac2a67f7d0d7128d22175985eefbd1341c210448b1a48019f5590d09be23898969b4f0049
-
Filesize
866KB
MD544d59cf2b7e4700b703e95eaa7fdbdc7
SHA1879ad987dfd297aa23626ff824da3fd43a09f32f
SHA25643e4574bbe757104766b7299c8ebf76026f0932b079e6a0ecd4325f6c0ddb36f
SHA512a6ac926bafb1aae6e0c135b18fe1b4e86a73710ba7dda15950adf13ac2a67f7d0d7128d22175985eefbd1341c210448b1a48019f5590d09be23898969b4f0049
-
Filesize
866KB
MD544d59cf2b7e4700b703e95eaa7fdbdc7
SHA1879ad987dfd297aa23626ff824da3fd43a09f32f
SHA25643e4574bbe757104766b7299c8ebf76026f0932b079e6a0ecd4325f6c0ddb36f
SHA512a6ac926bafb1aae6e0c135b18fe1b4e86a73710ba7dda15950adf13ac2a67f7d0d7128d22175985eefbd1341c210448b1a48019f5590d09be23898969b4f0049
-
Filesize
866KB
MD544d59cf2b7e4700b703e95eaa7fdbdc7
SHA1879ad987dfd297aa23626ff824da3fd43a09f32f
SHA25643e4574bbe757104766b7299c8ebf76026f0932b079e6a0ecd4325f6c0ddb36f
SHA512a6ac926bafb1aae6e0c135b18fe1b4e86a73710ba7dda15950adf13ac2a67f7d0d7128d22175985eefbd1341c210448b1a48019f5590d09be23898969b4f0049
-
Filesize
6.9MB
MD5cf52142e72a8cae6f9f667b19d098459
SHA1c2923e5a5f9aefebb037faf7841e777e6e81dfaf
SHA2565b30b08d05b34a4eb195a704e40efa8555e1985fab9886840c5f336a2e572671
SHA512c104213e0278fa18171a5235d0f1625029149410d6ace0eca2824d108bd1a7097cd931d81bc957bc03f431d93355f07f0e7719c0da181287104b8aeb5fdf82d6
-
Filesize
6.9MB
MD5cf52142e72a8cae6f9f667b19d098459
SHA1c2923e5a5f9aefebb037faf7841e777e6e81dfaf
SHA2565b30b08d05b34a4eb195a704e40efa8555e1985fab9886840c5f336a2e572671
SHA512c104213e0278fa18171a5235d0f1625029149410d6ace0eca2824d108bd1a7097cd931d81bc957bc03f431d93355f07f0e7719c0da181287104b8aeb5fdf82d6
-
Filesize
6.9MB
MD5cf52142e72a8cae6f9f667b19d098459
SHA1c2923e5a5f9aefebb037faf7841e777e6e81dfaf
SHA2565b30b08d05b34a4eb195a704e40efa8555e1985fab9886840c5f336a2e572671
SHA512c104213e0278fa18171a5235d0f1625029149410d6ace0eca2824d108bd1a7097cd931d81bc957bc03f431d93355f07f0e7719c0da181287104b8aeb5fdf82d6
-
Filesize
5.4MB
MD59086ff963ae98510ea0eb9abad045939
SHA1e9999c73e07daf9ba223fbf796d56ae762b748fa
SHA256138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f
SHA512f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee
-
Filesize
5.4MB
MD59086ff963ae98510ea0eb9abad045939
SHA1e9999c73e07daf9ba223fbf796d56ae762b748fa
SHA256138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f
SHA512f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee
-
Filesize
5.4MB
MD59086ff963ae98510ea0eb9abad045939
SHA1e9999c73e07daf9ba223fbf796d56ae762b748fa
SHA256138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f
SHA512f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee
-
Filesize
5.4MB
MD59086ff963ae98510ea0eb9abad045939
SHA1e9999c73e07daf9ba223fbf796d56ae762b748fa
SHA256138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f
SHA512f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
829KB
MD5e78b91834f7f32ce2835f6e8ab662833
SHA15242357e919074f1283da5473135febf88e2977a
SHA2564fcef42632546e8bcce8ef61e2a2dd901fb0c53ab2ab81048452e113a3807c59
SHA51274cdc0aad3a0d0367d80d5ea5869b9533bc07b62cc4bbbaee196c4f38b4b3529080b18538ea3637e40af3f04944d8113076578cf30a6352892da03f5a1c6d6fb
-
Filesize
829KB
MD5e78b91834f7f32ce2835f6e8ab662833
SHA15242357e919074f1283da5473135febf88e2977a
SHA2564fcef42632546e8bcce8ef61e2a2dd901fb0c53ab2ab81048452e113a3807c59
SHA51274cdc0aad3a0d0367d80d5ea5869b9533bc07b62cc4bbbaee196c4f38b4b3529080b18538ea3637e40af3f04944d8113076578cf30a6352892da03f5a1c6d6fb
-
Filesize
175KB
MD550809fe16d7c482c1f4a2ea19fdcbc0a
SHA111b6f69c06a724da15183b16039c5cbc86016158
SHA25609917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1
SHA512c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f
-
Filesize
175KB
MD550809fe16d7c482c1f4a2ea19fdcbc0a
SHA111b6f69c06a724da15183b16039c5cbc86016158
SHA25609917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1
SHA512c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f
-
Filesize
687KB
MD5d424964545e0cad72826e388b35413d3
SHA11cb5561e33cc9ca64fd4695765ea1b0a31c64b6d
SHA256765f64317c81e967a9015979a040650b1b52a6ad3ff6d87357d5053457b64d4f
SHA512c129d623e043bfba65649d72b60b860f6e90de7228a53bf53c95c91336f8f36fb2141025b21e63cffc0a683dfaf744cfad7143765e1152364585220ec529289e
-
Filesize
687KB
MD5d424964545e0cad72826e388b35413d3
SHA11cb5561e33cc9ca64fd4695765ea1b0a31c64b6d
SHA256765f64317c81e967a9015979a040650b1b52a6ad3ff6d87357d5053457b64d4f
SHA512c129d623e043bfba65649d72b60b860f6e90de7228a53bf53c95c91336f8f36fb2141025b21e63cffc0a683dfaf744cfad7143765e1152364585220ec529289e
-
Filesize
357KB
MD5018746a9f1d64b16065ca12e36c9a56f
SHA107b2f9d8d047266c412930736685b96b5fa40209
SHA256b4611ce682634cf3ca8a0029e188f157b17098b72c194209451960c0ca1ec964
SHA51294246ca528ac24c1fdcb5009ec4e619c050e6a9a8177ea95970e8d173dc06c652ade4f08e8eaa2942923fc630b1e32d4692990541ffe3298d0d264bb6eaf4f79
-
Filesize
357KB
MD5018746a9f1d64b16065ca12e36c9a56f
SHA107b2f9d8d047266c412930736685b96b5fa40209
SHA256b4611ce682634cf3ca8a0029e188f157b17098b72c194209451960c0ca1ec964
SHA51294246ca528ac24c1fdcb5009ec4e619c050e6a9a8177ea95970e8d173dc06c652ade4f08e8eaa2942923fc630b1e32d4692990541ffe3298d0d264bb6eaf4f79
-
Filesize
340KB
MD5461e80ad36bf3fe5d466271f24fe7b9a
SHA152a7dcd576e0c348c269c3a5f39e66afad6dd80c
SHA256ab78a6e6e21ae61e5ab27d7b04803af9e8f8f0eab1d100dcc54826f64d08c08e
SHA5126734dcecf16a3c51f917f4d58c9a81390b412d74facc5a0a81462803015966c727a09b12194f5953af02432f3a305e63ee7d769f49acf2cff3fa3fcffe4a913c
-
Filesize
340KB
MD5461e80ad36bf3fe5d466271f24fe7b9a
SHA152a7dcd576e0c348c269c3a5f39e66afad6dd80c
SHA256ab78a6e6e21ae61e5ab27d7b04803af9e8f8f0eab1d100dcc54826f64d08c08e
SHA5126734dcecf16a3c51f917f4d58c9a81390b412d74facc5a0a81462803015966c727a09b12194f5953af02432f3a305e63ee7d769f49acf2cff3fa3fcffe4a913c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
300KB
MD5662cc911f1cb0b43cccd94de352ea508
SHA1507dad9947355d0d73231e7dc404005597e07a54
SHA256d8d228c0235cd3694ec4ce3621632ae0b51da71ddb443b1d171b1b1c1fca45cc
SHA512b13d5a8b3f9323dff4a76610d7a79ee6880a4084fe8072500349f2495a2dbcfbec55626384355450fa41cf02c6a1a3c104162881d558ad992fdce5605c23b2b8
-
Filesize
300KB
MD5662cc911f1cb0b43cccd94de352ea508
SHA1507dad9947355d0d73231e7dc404005597e07a54
SHA256d8d228c0235cd3694ec4ce3621632ae0b51da71ddb443b1d171b1b1c1fca45cc
SHA512b13d5a8b3f9323dff4a76610d7a79ee6880a4084fe8072500349f2495a2dbcfbec55626384355450fa41cf02c6a1a3c104162881d558ad992fdce5605c23b2b8
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2