Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2023 21:49
Static task
static1
Behavioral task
behavioral1
Sample
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe
Resource
win7-20230220-en
General
-
Target
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe
-
Size
3.0MB
-
MD5
4b32941cd92e048e6a2d16c6069edf62
-
SHA1
5d167b4588575ffbc7a06cd9fa22552dced38951
-
SHA256
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d
-
SHA512
8b5c75642960991648fd18fb2c5421f8d082f0982a4b5950dd091547dc53943fccb287a404593fbb08282188c3c94d75e05c28f1a58f83a5b6559f34a516442e
-
SSDEEP
98304:6fFbrdnYUGkQqOSlBk1G4QBeKW0wnpTX5OIX:6fFbhBMqOxFgW3nRr
Malware Config
Extracted
aurora
94.142.138.215:8081
Signatures
-
Detects Redline Stealer samples 2 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/668-144-0x0000000004D20000-0x0000000005348000-memory.dmp redline_stealer behavioral2/memory/668-149-0x00000000054B0000-0x0000000005516000-memory.dmp redline_stealer -
Detects any file with a triage score of 10 4 IoCs
This file has been assigned a triage score of 10, indicating a high likelihood of malicious behavior.
Processes:
resource yara_rule behavioral2/memory/516-135-0x0000000000470000-0x0000000000C92000-memory.dmp triage_score_10 behavioral2/memory/516-136-0x0000000000470000-0x0000000000C92000-memory.dmp triage_score_10 behavioral2/memory/516-137-0x0000000000470000-0x0000000000C92000-memory.dmp triage_score_10 behavioral2/memory/516-138-0x0000000000470000-0x0000000000C92000-memory.dmp triage_score_10 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exepid process 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe 668 powershell.exe 668 powershell.exe 3744 powershell.exe 3744 powershell.exe 1660 powershell.exe 1660 powershell.exe 3976 powershell.exe 3976 powershell.exe 4344 powershell.exe 4344 powershell.exe 3220 powershell.exe 3220 powershell.exe 4996 powershell.exe 4996 powershell.exe 1000 powershell.exe 1000 powershell.exe 876 powershell.exe 876 powershell.exe 4188 powershell.exe 4188 powershell.exe 3248 powershell.exe 3248 powershell.exe 3416 powershell.exe 3416 powershell.exe 3260 powershell.exe 3260 powershell.exe 1328 powershell.exe 1328 powershell.exe 5104 powershell.exe 5104 powershell.exe 4996 powershell.exe 4996 powershell.exe 4412 powershell.exe 4412 powershell.exe 4140 powershell.exe 4140 powershell.exe 3744 powershell.exe 3744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 1424 WMIC.exe Token: SeSecurityPrivilege 1424 WMIC.exe Token: SeTakeOwnershipPrivilege 1424 WMIC.exe Token: SeLoadDriverPrivilege 1424 WMIC.exe Token: SeSystemProfilePrivilege 1424 WMIC.exe Token: SeSystemtimePrivilege 1424 WMIC.exe Token: SeProfSingleProcessPrivilege 1424 WMIC.exe Token: SeIncBasePriorityPrivilege 1424 WMIC.exe Token: SeCreatePagefilePrivilege 1424 WMIC.exe Token: SeBackupPrivilege 1424 WMIC.exe Token: SeRestorePrivilege 1424 WMIC.exe Token: SeShutdownPrivilege 1424 WMIC.exe Token: SeDebugPrivilege 1424 WMIC.exe Token: SeSystemEnvironmentPrivilege 1424 WMIC.exe Token: SeRemoteShutdownPrivilege 1424 WMIC.exe Token: SeUndockPrivilege 1424 WMIC.exe Token: SeManageVolumePrivilege 1424 WMIC.exe Token: 33 1424 WMIC.exe Token: 34 1424 WMIC.exe Token: 35 1424 WMIC.exe Token: 36 1424 WMIC.exe Token: SeIncreaseQuotaPrivilege 1424 WMIC.exe Token: SeSecurityPrivilege 1424 WMIC.exe Token: SeTakeOwnershipPrivilege 1424 WMIC.exe Token: SeLoadDriverPrivilege 1424 WMIC.exe Token: SeSystemProfilePrivilege 1424 WMIC.exe Token: SeSystemtimePrivilege 1424 WMIC.exe Token: SeProfSingleProcessPrivilege 1424 WMIC.exe Token: SeIncBasePriorityPrivilege 1424 WMIC.exe Token: SeCreatePagefilePrivilege 1424 WMIC.exe Token: SeBackupPrivilege 1424 WMIC.exe Token: SeRestorePrivilege 1424 WMIC.exe Token: SeShutdownPrivilege 1424 WMIC.exe Token: SeDebugPrivilege 1424 WMIC.exe Token: SeSystemEnvironmentPrivilege 1424 WMIC.exe Token: SeRemoteShutdownPrivilege 1424 WMIC.exe Token: SeUndockPrivilege 1424 WMIC.exe Token: SeManageVolumePrivilege 1424 WMIC.exe Token: 33 1424 WMIC.exe Token: 34 1424 WMIC.exe Token: 35 1424 WMIC.exe Token: 36 1424 WMIC.exe Token: SeIncreaseQuotaPrivilege 2396 wmic.exe Token: SeSecurityPrivilege 2396 wmic.exe Token: SeTakeOwnershipPrivilege 2396 wmic.exe Token: SeLoadDriverPrivilege 2396 wmic.exe Token: SeSystemProfilePrivilege 2396 wmic.exe Token: SeSystemtimePrivilege 2396 wmic.exe Token: SeProfSingleProcessPrivilege 2396 wmic.exe Token: SeIncBasePriorityPrivilege 2396 wmic.exe Token: SeCreatePagefilePrivilege 2396 wmic.exe Token: SeBackupPrivilege 2396 wmic.exe Token: SeRestorePrivilege 2396 wmic.exe Token: SeShutdownPrivilege 2396 wmic.exe Token: SeDebugPrivilege 2396 wmic.exe Token: SeSystemEnvironmentPrivilege 2396 wmic.exe Token: SeRemoteShutdownPrivilege 2396 wmic.exe Token: SeUndockPrivilege 2396 wmic.exe Token: SeManageVolumePrivilege 2396 wmic.exe Token: 33 2396 wmic.exe Token: 34 2396 wmic.exe Token: 35 2396 wmic.exe Token: 36 2396 wmic.exe Token: SeIncreaseQuotaPrivilege 2396 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.execmd.execmd.execmd.execmd.exedescription pid process target process PID 516 wrote to memory of 2320 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 2320 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 2320 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 2320 wrote to memory of 1424 2320 cmd.exe WMIC.exe PID 2320 wrote to memory of 1424 2320 cmd.exe WMIC.exe PID 2320 wrote to memory of 1424 2320 cmd.exe WMIC.exe PID 516 wrote to memory of 2396 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe wmic.exe PID 516 wrote to memory of 2396 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe wmic.exe PID 516 wrote to memory of 2396 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe wmic.exe PID 516 wrote to memory of 2392 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 2392 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 2392 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 2392 wrote to memory of 764 2392 cmd.exe WMIC.exe PID 2392 wrote to memory of 764 2392 cmd.exe WMIC.exe PID 2392 wrote to memory of 764 2392 cmd.exe WMIC.exe PID 516 wrote to memory of 4408 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 4408 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 4408 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 4408 wrote to memory of 2632 4408 cmd.exe WMIC.exe PID 4408 wrote to memory of 2632 4408 cmd.exe WMIC.exe PID 4408 wrote to memory of 2632 4408 cmd.exe WMIC.exe PID 516 wrote to memory of 5008 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 5008 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 516 wrote to memory of 5008 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe cmd.exe PID 5008 wrote to memory of 4748 5008 cmd.exe systeminfo.exe PID 5008 wrote to memory of 4748 5008 cmd.exe systeminfo.exe PID 5008 wrote to memory of 4748 5008 cmd.exe systeminfo.exe PID 516 wrote to memory of 668 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 668 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 668 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3744 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3744 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3744 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 1660 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 1660 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 1660 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3976 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3976 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3976 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4344 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4344 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4344 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3220 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3220 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3220 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4996 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4996 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4996 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 1000 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 1000 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 1000 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 876 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 876 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 876 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4188 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4188 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 4188 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3248 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3248 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3248 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3416 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3416 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3416 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe PID 516 wrote to memory of 3260 516 a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe"C:\Users\Admin\AppData\Local\Temp\a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:4748
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKARe\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\KJyiXJrscc\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVma\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJi\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiG\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdK\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\XYeUCWKsXb\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
15KB
MD541af8f7441d564d4f5a753b6b829d485
SHA1701322c41eb1af65fb781753cd1e1d7b6e9cdb71
SHA2564ebccf997b43b59a61fb719b017b5f978cfb36599881b7db54413e53bedf2870
SHA512e03ecce21509111cc8aee0959b87727c048708d5319d8677a8fcb5b09b07abf2c3232f969d8c89ff5b93527374be22bedd1351b98595a2de971349f1dfb4340e
-
Filesize
15KB
MD5a4c93a899b93ad4a8c094e56743b0aa2
SHA1f217e14fedca11b9d340853dc28e7e40cf6655b6
SHA25645f565cb3685b7d319b490b75c33f0dc69a66ce8bf3ff64985b083f28afbed78
SHA512e68d14037e011c2e97d191153d04206c92e7045746d92e68bece16f12d0b35d5ee5c4c7bef21db4072068975cac3dd87aec458174f210ac231311269ca8fcca2
-
Filesize
15KB
MD5b996fecebb17a7d332073020b7dd8809
SHA18f7b6238fa7821736e9f364bf470c0ea76b135d0
SHA2564b60d072367343470c922f1951e8b92a1796ee874e9f225fa96e0899dcc098ee
SHA51225f7e72008dd2d10bea97007c763ae24d327151be9f9575e49ace6e8afbd77fc6376533015c647b23f48530b6581060836c2113958813fe1983d28fb7eaf7e80
-
Filesize
15KB
MD500176484d406dba6dd914db325a095ab
SHA1f66ad76ba2e469eb1020c80ddbd04e97931b5f24
SHA2561e5a866e9a1793b9ac9e760993bc2ed18d750865017987023f270dd2f5447cae
SHA512c1ee26168cf7c55e76edaefe5fff64c7e2029f8a682c8dc14134ae568ba46a14f032398ce11a17c74e5dcab405b4a907c0d9b97cf02ee9c7be27b0c02774e7e3
-
Filesize
15KB
MD57f5160804a530cb425cde060bfdbbdc7
SHA116abcaed7fc2abcb7c8df5f2109db6a749e01c01
SHA2566a33e0ce05f30f04471949e3bd9ccc00e85e8c5e265c007265ab3d6216d1ab71
SHA512da84155d5544cd6202ed7df03a26a433f0222e228591c2e9b809a080d8e6b509f51af065d850641a5c40e85da61ace363163a8452c1aff7be622bc6754a0975d
-
Filesize
15KB
MD53a98ad553775647f9cd701eb3ba5916b
SHA12f33e878a78691cf14644bdf984b067a73b144c6
SHA256cbd1050eeb674f47825315a10ee97aaa59774971bfd9dbcac83d93766f392d03
SHA512df0b07ea3e269f2ada787df8d1ea003f7e76e0e2a14c6a1476cfdc6f18c641337eb9da3306ed043bbb16f957f0ab4dd16244a6296306b4cf7adbe83912311523
-
Filesize
15KB
MD5e6c633e20444725976289c46c522233f
SHA177852f57288154a57f868436b9d4cafe0ad37bae
SHA2566b0825e4dff8312b22a90f3e027c4f14da2f179e1e634efa0cca47542d12f38e
SHA512758281c07113e8e217fce4f5c03475ef958a2f5a474ef0c390ac4b41bf0a78ca882e3bfa2fd7d27589e926a8fb497a305406ca168acb1bd4ce786bb9d03cd7f9
-
Filesize
15KB
MD5832240aa6604ba0e62126aeb1d53cc74
SHA13b8f8bd4c132769a4e0e4ea3e3eceec0018313d4
SHA2569ecbe3f47ec4b9c5f0973caa430030d1c14637f640e72f4ab8862be719b54bcf
SHA51266feabb28bd70925cc477861fffbbf464856bd857ac296884fdff7b71b9f74f73ac8c23f39f9bf5e7848f979dc8390feb06aa2051904da63b7c6041e11cdbf3f
-
Filesize
15KB
MD5ab6ce59b820a66077e4a108bc568da86
SHA1b82622a6f81383ed06513f6734e62957faeb8fbb
SHA256a2bab3638c4d7f003595d7c1f8002d1726ebcc230496665f71b1ad069c556531
SHA512fff1d47e76960bf9a1358cb5b4d342e88282e483532994dd2bb09d06e3e868871319e356fd441297b743e2628dd141031e537a9aea9867a4fe7935f3edc3659a
-
Filesize
15KB
MD5dbf8ac831337672c6111d94b9d753ccd
SHA16ad238a790fcf6af07e6e8487f9447f1f71f5be2
SHA256301d5a686bb153d84ecbb25249b794d37aaff8d93f97b6d7ddee6274f49bfe19
SHA51283a2d362b65c3469001eebc3735cab5716f21f8b776663dbc47d280f2f9c7f2b5d68c53fad220562d09287d17217bd4cc77be721210d66ebbe860fd606f7002f
-
Filesize
15KB
MD5cdacb10a34a42f536db6b0346033a801
SHA1bf859720ec95503c427060048f2e99c75693ee16
SHA256a4bbabed5a3b26aa86f23958879886a93f426c04b70d3a4a06cde5802aaaa8f6
SHA512186388f8cab264da068a317bb6f452bc07b9254d55dfb61deb77903f0bd73bb3f5c232687b4ff854f2b04891d667295e6bf3d06edb09342b52246e11449cf307
-
Filesize
15KB
MD5542e0e59dbc6429c19dda96ac745e416
SHA12d10f247b2f4a6b28041e459ccd95a00bb20178b
SHA256cd57c9ce56113b584db2fe773f17ed63c2e44b2c1fe97edc3424fd75da154dbe
SHA5127ac158191c8c1d9fb485d4b2c07615ed425a5753e0b374b14b042abf96739a314dca4f3b16d8d4dd97a4bbc18c669a3ab2382fc3e94adf901ba560fe96c6d979
-
Filesize
15KB
MD5ae09b3d366242c8245a7a08f5240261f
SHA1cb7353ff3c378d59ce4dd796d45bc15e66ef8de5
SHA256b699f442beb4a79c5b512a1768e7ec2edafd35d5800caa878d17ebfa19c024cc
SHA512f384000440c4ba273402e3846473f96c14872c87f0a1df53e35cb325eb8bb5d9524960e81a1bfff8ea859f348b996f81a970c007c5e478308250e6edaee5caa8
-
Filesize
15KB
MD594635d6003044a812e6a05f1182d00b2
SHA14563c566c2a4fd045cbd323369c5bf4854aa0971
SHA256ed3a38d42a10c9b6a5fb85478ce12b6ae04a3c4a05663921913cab774f04ec36
SHA512e99723820f41cd347db0ab4fe1b4fd5804287a0a22e5cbb3ca906eba03f37dd3be02055101364a4cb63b03338da376ed595976de07669dc761e0b419c12e2fda
-
Filesize
15KB
MD5fb2c9e004848355ffcfcf49bba609bf4
SHA14c84823bcc4053d5dd40ebaf1da7666dea0a9f34
SHA25662f8f46f6d6b6b990a84f4b8b0223ee98e9ff2caaf9f800fd074cb59f44d52bd
SHA512f1698c6969d19c5f7458d71a281ab77330d95699378aa8c9aeccd77f568c6dd2b5b3b0514296023b42678bc38bc4223f4777b0a7bc01634430bfa6429eee7c2c
-
Filesize
15KB
MD51d7ea1c1bea075b9ba399258de0a50ce
SHA13d914bd6e01b4dde87209384a3fc13410cc4c208
SHA25621e9c2a2d50a2710affa8900377218bfa6b9ff0414086fe21cd21c0439cbcc39
SHA512b70528fa50269db6233dcf372878b90b458009c3674d7591e32ec1c67789632e1a45515833cc0d0e15314d204b9e569449bd64f1caa3c5eb0f4b3bb22c4b9d4a
-
Filesize
15KB
MD5c10e709784b30bfdbe7af5e128cd46d0
SHA1ae44710a577cfd0fb4a0f3dc53d01fae42305b7f
SHA2565cc9303996b13665bd0627e2e5ae15916d7715a4b1a66feeb94928e6d82f7616
SHA512f911b69e39730c1ad7ea89871e48afc80f4138f43a2262ff9ac4717baff72b3af8fa6660085e945ee356191c646b61919cc709a6474990073e81e3b0d406713e
-
Filesize
15KB
MD547b5f581a147d9457ed6f2a7230f210f
SHA1610bdfd85d1aa5b0c5ea90db81004a53993a825e
SHA256eb09e31a904c72e36570225cf7af18dad31a7751fab1dc71aa2edc77c18794d8
SHA512b597de9f0e1079f8a8159c086d335c55ec90063fa9dce100e9facdd6ce2f26cfa9ac7af659586de1ad3bccdc310bea1e6fbdda9d8ceeced529501be475692dd2
-
Filesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
92KB
MD54b609cebb20f08b79628408f4fa2ad42
SHA1f725278c8bc0527c316e01827f195de5c9a8f934
SHA2562802818c570f9da1ce2e2fe2ff12cd3190b4c287866a3e4dfe2ad3a7df4cecdf
SHA51219111811722223521c8ef801290e2d5d8a49c0800363b9cf4232ca037dbcc515aa16ba6c043193f81388260db0e9a7cdb31b0da8c7ffa5bcad67ddbd842e2c60
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
Filesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
Filesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
Filesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
Filesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc