Analysis
-
max time kernel
108s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2023 21:38
Static task
static1
Behavioral task
behavioral1
Sample
1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe
Resource
win10v2004-20230831-en
General
-
Target
1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe
-
Size
247KB
-
MD5
d9fd9682ec83472fff7d75b829eb725f
-
SHA1
205d18239718414906f08b39adbdff9c853a4fc2
-
SHA256
1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f
-
SHA512
92f58331a99ae384097869632ee816f79bca0e6cf5af25f17656d68b2f6a8db970f23878156f869a118c95ac99ea1ef83405a4fe9c35d2060fea64b814edc1f3
-
SSDEEP
6144:bEfWUAz6DCGbAR/VeDC1tAOCcC0urBiIg:bkAzaC+UjljurBiIg
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.83
http://5.42.65.80/8bmeVwqx/index.php
-
install_dir
207aa4515d
-
install_file
oneetx.exe
-
strings_key
3e634dd0840c68ae2ced83c2be7bf0d4
Extracted
redline
amadey_api
amadapi.tuktuk.ug:11290
-
auth_value
a004bea47cf55a1c8841d46c3fe3e6f5
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2816-50-0x0000000000050000-0x00000000001DE000-memory.dmp family_redline behavioral1/memory/4964-51-0x0000000000400000-0x000000000045A000-memory.dmp family_redline behavioral1/memory/2816-56-0x0000000000050000-0x00000000001DE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 4612 created 3136 4612 latestX.exe 50 PID 4612 created 3136 4612 latestX.exe 50 PID 4612 created 3136 4612 latestX.exe 50 PID 4612 created 3136 4612 latestX.exe 50 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation 6EC3.exe Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2816 6B48.exe 2632 6EC3.exe 1368 70C8.exe 3380 oneetx.exe 4612 latestX.exe 3828 taskhost.exe 4044 winlog.exe 4516 msedge.exe 4132 ntlhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4044 winlog.exe 4132 ntlhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3608 set thread context of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 2816 set thread context of 4964 2816 6B48.exe 102 PID 3828 set thread context of 2468 3828 taskhost.exe 118 -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3116 sc.exe 1912 sc.exe 3560 sc.exe 4500 sc.exe 2020 sc.exe 4668 sc.exe 2372 sc.exe 2448 sc.exe 4696 sc.exe 1932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3484 3608 WerFault.exe 83 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4704 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 80 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 AppLaunch.exe 2988 AppLaunch.exe 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE 3136 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3136 Explorer.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2988 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeDebugPrivilege 1368 70C8.exe Token: SeDebugPrivilege 4964 vbc.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeDebugPrivilege 2468 vbc.exe Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeShutdownPrivilege 3136 Explorer.EXE Token: SeCreatePagefilePrivilege 3136 Explorer.EXE Token: SeDebugPrivilege 1972 powershell.exe Token: SeShutdownPrivilege 1548 powercfg.exe Token: SeCreatePagefilePrivilege 1548 powercfg.exe Token: SeDebugPrivilege 3132 powershell.exe Token: SeShutdownPrivilege 4744 powercfg.exe Token: SeCreatePagefilePrivilege 4744 powercfg.exe Token: SeShutdownPrivilege 1272 powercfg.exe Token: SeCreatePagefilePrivilege 1272 powercfg.exe Token: SeShutdownPrivilege 4600 powercfg.exe Token: SeCreatePagefilePrivilege 4600 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 6EC3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 3608 wrote to memory of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 3608 wrote to memory of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 3608 wrote to memory of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 3608 wrote to memory of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 3608 wrote to memory of 2988 3608 1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe 86 PID 3136 wrote to memory of 2816 3136 Explorer.EXE 101 PID 3136 wrote to memory of 2816 3136 Explorer.EXE 101 PID 3136 wrote to memory of 2816 3136 Explorer.EXE 101 PID 2816 wrote to memory of 4964 2816 6B48.exe 102 PID 2816 wrote to memory of 4964 2816 6B48.exe 102 PID 2816 wrote to memory of 4964 2816 6B48.exe 102 PID 2816 wrote to memory of 4964 2816 6B48.exe 102 PID 2816 wrote to memory of 4964 2816 6B48.exe 102 PID 3136 wrote to memory of 2632 3136 Explorer.EXE 103 PID 3136 wrote to memory of 2632 3136 Explorer.EXE 103 PID 3136 wrote to memory of 2632 3136 Explorer.EXE 103 PID 3136 wrote to memory of 1368 3136 Explorer.EXE 104 PID 3136 wrote to memory of 1368 3136 Explorer.EXE 104 PID 3136 wrote to memory of 1368 3136 Explorer.EXE 104 PID 2632 wrote to memory of 3380 2632 6EC3.exe 105 PID 2632 wrote to memory of 3380 2632 6EC3.exe 105 PID 2632 wrote to memory of 3380 2632 6EC3.exe 105 PID 3380 wrote to memory of 4704 3380 oneetx.exe 106 PID 3380 wrote to memory of 4704 3380 oneetx.exe 106 PID 3380 wrote to memory of 4704 3380 oneetx.exe 106 PID 3380 wrote to memory of 808 3380 oneetx.exe 108 PID 3380 wrote to memory of 808 3380 oneetx.exe 108 PID 3380 wrote to memory of 808 3380 oneetx.exe 108 PID 808 wrote to memory of 3608 808 cmd.exe 110 PID 808 wrote to memory of 3608 808 cmd.exe 110 PID 808 wrote to memory of 3608 808 cmd.exe 110 PID 808 wrote to memory of 320 808 cmd.exe 111 PID 808 wrote to memory of 320 808 cmd.exe 111 PID 808 wrote to memory of 320 808 cmd.exe 111 PID 808 wrote to memory of 2684 808 cmd.exe 112 PID 808 wrote to memory of 2684 808 cmd.exe 112 PID 808 wrote to memory of 2684 808 cmd.exe 112 PID 808 wrote to memory of 3848 808 cmd.exe 113 PID 808 wrote to memory of 3848 808 cmd.exe 113 PID 808 wrote to memory of 3848 808 cmd.exe 113 PID 808 wrote to memory of 5116 808 cmd.exe 114 PID 808 wrote to memory of 5116 808 cmd.exe 114 PID 808 wrote to memory of 5116 808 cmd.exe 114 PID 808 wrote to memory of 4932 808 cmd.exe 115 PID 808 wrote to memory of 4932 808 cmd.exe 115 PID 808 wrote to memory of 4932 808 cmd.exe 115 PID 3380 wrote to memory of 4612 3380 oneetx.exe 116 PID 3380 wrote to memory of 4612 3380 oneetx.exe 116 PID 3380 wrote to memory of 3828 3380 oneetx.exe 117 PID 3380 wrote to memory of 3828 3380 oneetx.exe 117 PID 3380 wrote to memory of 3828 3380 oneetx.exe 117 PID 3828 wrote to memory of 2468 3828 taskhost.exe 118 PID 3828 wrote to memory of 2468 3828 taskhost.exe 118 PID 3828 wrote to memory of 2468 3828 taskhost.exe 118 PID 3828 wrote to memory of 2468 3828 taskhost.exe 118 PID 3828 wrote to memory of 2468 3828 taskhost.exe 118 PID 3380 wrote to memory of 4044 3380 oneetx.exe 119 PID 3380 wrote to memory of 4044 3380 oneetx.exe 119 PID 3380 wrote to memory of 4516 3380 oneetx.exe 120 PID 3380 wrote to memory of 4516 3380 oneetx.exe 120 PID 4044 wrote to memory of 4132 4044 winlog.exe 121 PID 4044 wrote to memory of 4132 4044 winlog.exe 121 PID 5072 wrote to memory of 4668 5072 cmd.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe"C:\Users\Admin\AppData\Local\Temp\1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 1523⤵
- Program crash
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\6B48.exeC:\Users\Admin\AppData\Local\Temp\6B48.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\6EC3.exeC:\Users\Admin\AppData\Local\Temp\6EC3.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"5⤵PID:5116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E5⤵PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"4⤵
- Executes dropped EXE
PID:4516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\70C8.exeC:\Users\Admin\AppData\Local\Temp\70C8.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4668
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2372
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2448
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4696
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1932
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4340
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4028
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2028
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3116
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1912
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3560
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2020
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4500
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:3840
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4508
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3976
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:628
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2156
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4900
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3608 -ip 36081⤵PID:4408
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
1Scripting
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
2KB
MD59cbca2a895534f39fb0c6e12b43469d1
SHA11391323f936359e7fe7a610e43018b4677603cb1
SHA256646ce19104c8ee217cabe6ed69d84ffffdf114eff9ecfbe35163a3e96e5aa1cd
SHA5121cceac4aa4d45fa92bd6dc4d44241c1086628a696cf69ec49f29cd761fa85f48aa45227937c7f5b068d746da10f68e4e6dba4ab30566a86bdab1ed5808259d4f
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
1KB
MD5949a7f7951f74f017842db97b3d6d281
SHA1325e4e12d8219106518730cd75f973d244a0d071
SHA25695a4d75944d486fea07a9ac6296867540e62564f1f611d5eb763acadad7eb321
SHA5127bf8027bf30d88afe5046a171924339019b5e92d6033074c0fd177029425e0e1e468c5d48bbd7e1ecc60a45a2c4d3790a96a20890b03437c073aa1829aef941d
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
1.0MB
MD516b159683dbd42129859e26f5eb38761
SHA132352e4d8c4aac9059d4d36fa0f09a3b4a1be280
SHA256599f373efcca773f12804c80c5399343e596d71d3aa8794c8230256f420b4086
SHA5121a5630710cea2808dda8155d6d8c89ea7dcce5b0624e89e3fbc80fbd9dd8098d533ab12d5e0cb8fb8aeb98f9bca3a1d40feac613400e7557c990d1757b66bd85
-
Filesize
1.0MB
MD516b159683dbd42129859e26f5eb38761
SHA132352e4d8c4aac9059d4d36fa0f09a3b4a1be280
SHA256599f373efcca773f12804c80c5399343e596d71d3aa8794c8230256f420b4086
SHA5121a5630710cea2808dda8155d6d8c89ea7dcce5b0624e89e3fbc80fbd9dd8098d533ab12d5e0cb8fb8aeb98f9bca3a1d40feac613400e7557c990d1757b66bd85
-
Filesize
1.0MB
MD516b159683dbd42129859e26f5eb38761
SHA132352e4d8c4aac9059d4d36fa0f09a3b4a1be280
SHA256599f373efcca773f12804c80c5399343e596d71d3aa8794c8230256f420b4086
SHA5121a5630710cea2808dda8155d6d8c89ea7dcce5b0624e89e3fbc80fbd9dd8098d533ab12d5e0cb8fb8aeb98f9bca3a1d40feac613400e7557c990d1757b66bd85
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
7.0MB
MD507f52cda25a10e6415a09e2ab5c10424
SHA18bfd738a7d2ecced62d381921a2bfb46bbf00dfe
SHA256b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff
SHA5129a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
1.2MB
MD51a18fc4db3affaacf43f4022df7a2c32
SHA12ef240262c43bdd5f6a9db9f7e6abb1e408366ba
SHA256b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
SHA512be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
660.1MB
MD52a99958c093c9bf8f0b3198347749cec
SHA12a8daecef93f11c48035a667a0238b4c4b072d4f
SHA2565deecea64e287c0b4e314a532865f61c0875059b42558e02547099a7958b6216
SHA512142948c95dde8ea0dcebe46e9db29c46dd6202bc7c769577b1c612ab7e0d9d8d1c388265cd0c006e9f9762942922ba09464adb5ead7b6b633bf42d8d22618c8b
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62