Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 23:34
Static task
static1
Behavioral task
behavioral1
Sample
c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe
Resource
win10v2004-20230703-en
General
-
Target
c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe
-
Size
164KB
-
MD5
ef0ecd2f11d3b6bd090474db2a2432ba
-
SHA1
67127f642d92296aaa7f7d3ba9fbac77bdfaad33
-
SHA256
c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db
-
SHA512
ab7f818fe9f4f018af87f187a7c63c8aa6157e1b30b0f8ac2077ccf8c3c8fa787049f35353cb31a4f49e37bc9e4f8ea0d354bf84453f73fccd0230c90313810e
-
SSDEEP
3072:XiML/SFYg65k6NZt313UZgdrOiCToYGzN2uLK5wY:XVL/nDk6jteZgQoYGz3LPY
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Extracted
lumma
gstatic-node.io
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral1/memory/3128-235-0x00000000023A0000-0x00000000027A0000-memory.dmp family_rhadamanthys behavioral1/memory/3128-237-0x00000000023A0000-0x00000000027A0000-memory.dmp family_rhadamanthys behavioral1/memory/3128-238-0x00000000023A0000-0x00000000027A0000-memory.dmp family_rhadamanthys behavioral1/memory/3128-239-0x00000000023A0000-0x00000000027A0000-memory.dmp family_rhadamanthys behavioral1/memory/3128-253-0x00000000023A0000-0x00000000027A0000-memory.dmp family_rhadamanthys behavioral1/memory/3128-256-0x00000000023A0000-0x00000000027A0000-memory.dmp family_rhadamanthys -
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
3FE2.exedescription pid process target process PID 3128 created 3240 3128 3FE2.exe Explorer.EXE -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 4168 bcdedit.exe 5116 bcdedit.exe -
Renames multiple (65) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exepid process 4524 wbadmin.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Drops startup file 1 IoCs
Processes:
y6[Gi4`1.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\y6[Gi4`1.exe y6[Gi4`1.exe -
Executes dropped EXE 7 IoCs
Processes:
3FE2.exe488E.exevm[R1ZQW.exey6[Gi4`1.exetSsr`r.exevm[R1ZQW.exey6[Gi4`1.exepid process 3128 3FE2.exe 3900 488E.exe 2316 vm[R1ZQW.exe 3896 y6[Gi4`1.exe 4728 tSsr`r.exe 2816 vm[R1ZQW.exe 4984 y6[Gi4`1.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
y6[Gi4`1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\y6[Gi4`1 = "C:\\Users\\Admin\\AppData\\Local\\y6[Gi4`1.exe" y6[Gi4`1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\y6[Gi4`1 = "C:\\Users\\Admin\\AppData\\Local\\y6[Gi4`1.exe" y6[Gi4`1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
Processes:
y6[Gi4`1.exedescription ioc process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1498570331-2313266200-788959944-1000\desktop.ini y6[Gi4`1.exe File opened for modification C:\Program Files\desktop.ini y6[Gi4`1.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1498570331-2313266200-788959944-1000\desktop.ini y6[Gi4`1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
vm[R1ZQW.exedescription pid process target process PID 2316 set thread context of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe -
Drops file in Program Files directory 64 IoCs
Processes:
y6[Gi4`1.exedescription ioc process File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui y6[Gi4`1.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyrun.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\net.dll.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack.dll y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\sunpkcs11.jar y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\default.jfc y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.event_1.3.100.v20140115-1647.jar y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.util_1.0.500.v20130404-1337.jar y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-ui_zh_CN.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-windows_zh_CN.jar y6[Gi4`1.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdaps.dll y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_MoveDrop32x32.gif y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.common_3.6.200.v20130402-1505.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_ja_4.4.0.v20140623020002.jar y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_ja.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\jvm.hprof.txt.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.services.nl_ja_4.4.0.v20140623020002.jar y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\MANIFEST.MF.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_ja_4.4.0.v20140623020002.jar y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-outline_ja.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\mix.gif y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.p2.ui.overridden_5.5.0.165303.jar y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.metadataprovider.exsd y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\org-openide-util-lookup.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_zh_CN.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-io-ui.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\7-Zip\Lang\nn.txt.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\glass.dll y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_sv.properties.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.jdp_5.5.0.165303.jar y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png y6[Gi4`1.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt y6[Gi4`1.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages.properties.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser_5.5.0.165303.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.xml y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-dialogs_zh_CN.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\net.dll y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\meta-index y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_win.css y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_ja_4.4.0.v20140623020002.jar y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.repository.nl_ja_4.4.0.v20140623020002.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_zh_CN.jar y6[Gi4`1.exe File opened for modification C:\Program Files\BackupHide.xhtml y6[Gi4`1.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui y6[Gi4`1.exe File opened for modification C:\Program Files\ConfirmRepair.shtml y6[Gi4`1.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoCanary.png.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\invalid32x32.gif.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.properties y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-multitabs_zh_CN.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring_ja.jar.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt y6[Gi4`1.exe File created C:\Program Files\CloseExpand.mpe.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp_5.5.0.165303.jar y6[Gi4`1.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.components.ui_5.5.0.165303.jar y6[Gi4`1.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\plugin.xml.id[08233F11-3483].[[email protected]].8base y6[Gi4`1.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4216 3128 WerFault.exe 3FE2.exe 2156 3900 WerFault.exe 488E.exe 2252 4984 WerFault.exe y6[Gi4`1.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vm[R1ZQW.exevds.exec9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vm[R1ZQW.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vm[R1ZQW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vm[R1ZQW.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1368 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exeExplorer.EXEpid process 216 c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe 216 c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3240 Explorer.EXE -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exeExplorer.EXEvm[R1ZQW.exepid process 216 c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 2816 vm[R1ZQW.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXEy6[Gi4`1.exevssvc.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeDebugPrivilege 3896 y6[Gi4`1.exe Token: SeBackupPrivilege 3452 vssvc.exe Token: SeRestorePrivilege 3452 vssvc.exe Token: SeAuditPrivilege 3452 vssvc.exe Token: SeIncreaseQuotaPrivilege 2372 WMIC.exe Token: SeSecurityPrivilege 2372 WMIC.exe Token: SeTakeOwnershipPrivilege 2372 WMIC.exe Token: SeLoadDriverPrivilege 2372 WMIC.exe Token: SeSystemProfilePrivilege 2372 WMIC.exe Token: SeSystemtimePrivilege 2372 WMIC.exe Token: SeProfSingleProcessPrivilege 2372 WMIC.exe Token: SeIncBasePriorityPrivilege 2372 WMIC.exe Token: SeCreatePagefilePrivilege 2372 WMIC.exe Token: SeBackupPrivilege 2372 WMIC.exe Token: SeRestorePrivilege 2372 WMIC.exe Token: SeShutdownPrivilege 2372 WMIC.exe Token: SeDebugPrivilege 2372 WMIC.exe Token: SeSystemEnvironmentPrivilege 2372 WMIC.exe Token: SeRemoteShutdownPrivilege 2372 WMIC.exe Token: SeUndockPrivilege 2372 WMIC.exe Token: SeManageVolumePrivilege 2372 WMIC.exe Token: 33 2372 WMIC.exe Token: 34 2372 WMIC.exe Token: 35 2372 WMIC.exe Token: 36 2372 WMIC.exe Token: SeIncreaseQuotaPrivilege 2372 WMIC.exe Token: SeSecurityPrivilege 2372 WMIC.exe Token: SeTakeOwnershipPrivilege 2372 WMIC.exe Token: SeLoadDriverPrivilege 2372 WMIC.exe Token: SeSystemProfilePrivilege 2372 WMIC.exe Token: SeSystemtimePrivilege 2372 WMIC.exe Token: SeProfSingleProcessPrivilege 2372 WMIC.exe Token: SeIncBasePriorityPrivilege 2372 WMIC.exe Token: SeCreatePagefilePrivilege 2372 WMIC.exe Token: SeBackupPrivilege 2372 WMIC.exe Token: SeRestorePrivilege 2372 WMIC.exe Token: SeShutdownPrivilege 2372 WMIC.exe Token: SeDebugPrivilege 2372 WMIC.exe Token: SeSystemEnvironmentPrivilege 2372 WMIC.exe Token: SeRemoteShutdownPrivilege 2372 WMIC.exe Token: SeUndockPrivilege 2372 WMIC.exe Token: SeManageVolumePrivilege 2372 WMIC.exe Token: 33 2372 WMIC.exe Token: 34 2372 WMIC.exe Token: 35 2372 WMIC.exe Token: 36 2372 WMIC.exe Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Explorer.EXE3FE2.exevm[R1ZQW.exey6[Gi4`1.execmd.execmd.exedescription pid process target process PID 3240 wrote to memory of 3128 3240 Explorer.EXE 3FE2.exe PID 3240 wrote to memory of 3128 3240 Explorer.EXE 3FE2.exe PID 3240 wrote to memory of 3128 3240 Explorer.EXE 3FE2.exe PID 3240 wrote to memory of 3900 3240 Explorer.EXE 488E.exe PID 3240 wrote to memory of 3900 3240 Explorer.EXE 488E.exe PID 3240 wrote to memory of 3900 3240 Explorer.EXE 488E.exe PID 3240 wrote to memory of 2108 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2108 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2108 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2108 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 3876 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 3876 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 3876 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1712 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1712 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1712 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1712 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1832 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1832 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1832 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 4332 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 4332 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 4332 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 4332 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2164 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2164 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2164 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2164 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2468 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2468 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2468 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 2468 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1568 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1568 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1568 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1704 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1704 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1704 3240 Explorer.EXE explorer.exe PID 3240 wrote to memory of 1704 3240 Explorer.EXE explorer.exe PID 3128 wrote to memory of 4240 3128 3FE2.exe certreq.exe PID 3128 wrote to memory of 4240 3128 3FE2.exe certreq.exe PID 3128 wrote to memory of 4240 3128 3FE2.exe certreq.exe PID 3128 wrote to memory of 4240 3128 3FE2.exe certreq.exe PID 2316 wrote to memory of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe PID 2316 wrote to memory of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe PID 2316 wrote to memory of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe PID 2316 wrote to memory of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe PID 2316 wrote to memory of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe PID 2316 wrote to memory of 2816 2316 vm[R1ZQW.exe vm[R1ZQW.exe PID 3896 wrote to memory of 3948 3896 y6[Gi4`1.exe cmd.exe PID 3896 wrote to memory of 3948 3896 y6[Gi4`1.exe cmd.exe PID 3896 wrote to memory of 2244 3896 y6[Gi4`1.exe cmd.exe PID 3896 wrote to memory of 2244 3896 y6[Gi4`1.exe cmd.exe PID 2244 wrote to memory of 3904 2244 cmd.exe netsh.exe PID 2244 wrote to memory of 3904 2244 cmd.exe netsh.exe PID 3948 wrote to memory of 1368 3948 cmd.exe vssadmin.exe PID 3948 wrote to memory of 1368 3948 cmd.exe vssadmin.exe PID 3948 wrote to memory of 2372 3948 cmd.exe WMIC.exe PID 3948 wrote to memory of 2372 3948 cmd.exe WMIC.exe PID 2244 wrote to memory of 3616 2244 cmd.exe netsh.exe PID 2244 wrote to memory of 3616 2244 cmd.exe netsh.exe PID 3948 wrote to memory of 4168 3948 cmd.exe bcdedit.exe PID 3948 wrote to memory of 4168 3948 cmd.exe bcdedit.exe PID 3948 wrote to memory of 5116 3948 cmd.exe bcdedit.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe"C:\Users\Admin\AppData\Local\Temp\c9666af965998eddcc1f1e03f97040435bf00ff0a557945cba96cbff93c286db.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:216 -
C:\Users\Admin\AppData\Local\Temp\3FE2.exeC:\Users\Admin\AppData\Local\Temp\3FE2.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 10163⤵
- Program crash
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\488E.exeC:\Users\Admin\AppData\Local\Temp\488E.exe2⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 33363⤵
- Program crash
PID:2156 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2108
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3876
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1712
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1832
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4332
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2164
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2468
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1568
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1704
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3128 -ip 31281⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 39001⤵PID:2920
-
C:\Users\Admin\AppData\Local\Microsoft\vm[R1ZQW.exe"C:\Users\Admin\AppData\Local\Microsoft\vm[R1ZQW.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Microsoft\vm[R1ZQW.exe"C:\Users\Admin\AppData\Local\Microsoft\vm[R1ZQW.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2816
-
C:\Users\Admin\AppData\Local\Microsoft\y6[Gi4`1.exe"C:\Users\Admin\AppData\Local\Microsoft\y6[Gi4`1.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Microsoft\y6[Gi4`1.exe"C:\Users\Admin\AppData\Local\Microsoft\y6[Gi4`1.exe"2⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 4283⤵
- Program crash
PID:2252 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
PID:3904 -
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:3616 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1368 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:4168 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:5116 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
PID:4524
-
C:\Users\Admin\AppData\Local\Microsoft\tSsr`r.exe"C:\Users\Admin\AppData\Local\Microsoft\tSsr`r.exe"1⤵
- Executes dropped EXE
PID:4728
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:4960
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:284
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4984 -ip 49841⤵PID:1700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id[08233F11-3483].[[email protected]].8base
Filesize3.2MB
MD57687e74daa74f44efabb51f5efe72bc3
SHA1d87a3a810e0caa2d95210c0eaff1061973094b27
SHA256647eb7d6cb9777be0fdac10fa0b8c919127f781936e26658020cc8cb9f1a1961
SHA512e676a69fd8d42f0d21f7e85078910075fa741344868f92295a6749d757451e2497b1b54f538032845f7505efbe71fd53b0bb640ca96a76728e6db053b74a9058
-
Filesize
164KB
MD56ac14216327dcfb60b33ebd914f62769
SHA1d55eba9a523347f5ee65c9e27a3dc73a1eb4cf7b
SHA25625f77a058ec8aff36602762a75066b3ba52652ce90fc823b51dc81e4b14bbeb9
SHA5126af659cfee302b0faefd85a87bc0aa3e10c40aeb18c6246cf2b335a34b40c21279f1b76ae420217f2caa3913d66e96116860ce442fad5fe465d2273de79ff3ed
-
Filesize
164KB
MD56ac14216327dcfb60b33ebd914f62769
SHA1d55eba9a523347f5ee65c9e27a3dc73a1eb4cf7b
SHA25625f77a058ec8aff36602762a75066b3ba52652ce90fc823b51dc81e4b14bbeb9
SHA5126af659cfee302b0faefd85a87bc0aa3e10c40aeb18c6246cf2b335a34b40c21279f1b76ae420217f2caa3913d66e96116860ce442fad5fe465d2273de79ff3ed
-
Filesize
164KB
MD509d7f30d2f8432be6087038562a029dd
SHA107fc20446a03a20c191e750ef21737ec948d9544
SHA2568c7319e9b6bd1ec0fa5658aaf55096a7e549b21a380de406c705969f165cb3f8
SHA512abc4670991a0a109a292d36f2b5116685374d0c85c157eefac3b44e240050b51c41839b8df4ffdad3ef6460dcd70c2b9457492c7d486fccd7a48e931cebacf7e
-
Filesize
164KB
MD509d7f30d2f8432be6087038562a029dd
SHA107fc20446a03a20c191e750ef21737ec948d9544
SHA2568c7319e9b6bd1ec0fa5658aaf55096a7e549b21a380de406c705969f165cb3f8
SHA512abc4670991a0a109a292d36f2b5116685374d0c85c157eefac3b44e240050b51c41839b8df4ffdad3ef6460dcd70c2b9457492c7d486fccd7a48e931cebacf7e
-
Filesize
164KB
MD509d7f30d2f8432be6087038562a029dd
SHA107fc20446a03a20c191e750ef21737ec948d9544
SHA2568c7319e9b6bd1ec0fa5658aaf55096a7e549b21a380de406c705969f165cb3f8
SHA512abc4670991a0a109a292d36f2b5116685374d0c85c157eefac3b44e240050b51c41839b8df4ffdad3ef6460dcd70c2b9457492c7d486fccd7a48e931cebacf7e
-
Filesize
164KB
MD5de348ef9eed7ccdaed5a70ae15796a86
SHA142914d94e8024ca94e58bb4bd9cfa4d0ae524975
SHA256a2333bcbbdbf6846ea6945637f93ecc2500a32bbfa9032c4cc39021a4e41a855
SHA512605bdb115b9fc95b1c0924f01b3b62b27737d94fe97825e81ebc5f1de107a317bd47fbe88be9d2ac4e6b3c9d0d537a8b38986b24480a54495442c6206e9eb163
-
Filesize
164KB
MD5de348ef9eed7ccdaed5a70ae15796a86
SHA142914d94e8024ca94e58bb4bd9cfa4d0ae524975
SHA256a2333bcbbdbf6846ea6945637f93ecc2500a32bbfa9032c4cc39021a4e41a855
SHA512605bdb115b9fc95b1c0924f01b3b62b27737d94fe97825e81ebc5f1de107a317bd47fbe88be9d2ac4e6b3c9d0d537a8b38986b24480a54495442c6206e9eb163
-
Filesize
164KB
MD5de348ef9eed7ccdaed5a70ae15796a86
SHA142914d94e8024ca94e58bb4bd9cfa4d0ae524975
SHA256a2333bcbbdbf6846ea6945637f93ecc2500a32bbfa9032c4cc39021a4e41a855
SHA512605bdb115b9fc95b1c0924f01b3b62b27737d94fe97825e81ebc5f1de107a317bd47fbe88be9d2ac4e6b3c9d0d537a8b38986b24480a54495442c6206e9eb163
-
Filesize
374KB
MD5aaf3d68aeea347268ede50e621ca21ce
SHA10e7c0e38a200a9ea3af663dfd33941cc5e1657c9
SHA25609c9bc026f600cb19848ba96858b3dbfe13f03358dc0703818d3bfa3d632d416
SHA51261416225031cbb74114ee61e3f7ce697e73423c75a0f2e96f51557b3d289ad868034e2e07ead926cd12a95b524ed37cf1626dc75dc99c47fac9cb8f843002bd0
-
Filesize
374KB
MD5aaf3d68aeea347268ede50e621ca21ce
SHA10e7c0e38a200a9ea3af663dfd33941cc5e1657c9
SHA25609c9bc026f600cb19848ba96858b3dbfe13f03358dc0703818d3bfa3d632d416
SHA51261416225031cbb74114ee61e3f7ce697e73423c75a0f2e96f51557b3d289ad868034e2e07ead926cd12a95b524ed37cf1626dc75dc99c47fac9cb8f843002bd0
-
Filesize
290KB
MD56d35d4cb11e99f8645441b0f1f96da3d
SHA13b6e12da0c1c37d38db867ab6330ace34461c56a
SHA2569066d830ae21197499f19a044054b0ea96f5be17cbb246714e15f36f32312204
SHA51201b5b75ce608f55f70c6471bb20f0a248116ef902f4bd602b5cf11fed747e0af9b811fbe74d393895672806f2b525900c6cef0ce889229d27032683a5e591aa4
-
Filesize
290KB
MD56d35d4cb11e99f8645441b0f1f96da3d
SHA13b6e12da0c1c37d38db867ab6330ace34461c56a
SHA2569066d830ae21197499f19a044054b0ea96f5be17cbb246714e15f36f32312204
SHA51201b5b75ce608f55f70c6471bb20f0a248116ef902f4bd602b5cf11fed747e0af9b811fbe74d393895672806f2b525900c6cef0ce889229d27032683a5e591aa4