Analysis
-
max time kernel
172s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 15:15
Static task
static1
Behavioral task
behavioral1
Sample
aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe
Resource
win10v2004-20230915-en
General
-
Target
aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe
-
Size
1.0MB
-
MD5
825e821c856e389528cf734a5f6bb97f
-
SHA1
adc1cd14618dfbad4d393ac01ed25bcc806ba8d8
-
SHA256
aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85
-
SHA512
8fc21898517ef3a12fd1a456110d1125841f341e7776b66494fd11a81485fe7d3e581f922d70c4c2c728b68aef12bf694342240fdbfa86d23ca52e3296ed395d
-
SSDEEP
24576:ByelBt3Vh5XB9ylUww7DNZiuXEvzqfkb7mfUZwzS/sjS:0elBpVXQPuDbFELqfkvmfUZ1/
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000230dc-108.dat healer behavioral1/files/0x00080000000230dc-109.dat healer behavioral1/memory/2572-111-0x0000000000510000-0x000000000051A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1492-53-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 19 IoCs
pid Process 3220 ye2TE24.exe 888 dD7ef88.exe 2484 pB4PY59.exe 4632 1dJ21uD1.exe 5092 2yn2840.exe 1688 3iE60Md.exe 1964 4NJ170iH.exe 1448 5Uc9ej3.exe 2264 3D78.exe 3820 4875.exe 940 ff1pT8Sp.exe 3968 4C4E.bat 404 54DB.exe 4660 BZ1mB0JV.exe 2572 58D4.exe 1336 uh7VK3yZ.exe 1652 5F5C.exe 4724 JN3WQ2LK.exe 4124 1XD17na4.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ye2TE24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dD7ef88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pB4PY59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" 3D78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ff1pT8Sp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" uh7VK3yZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" JN3WQ2LK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" BZ1mB0JV.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4632 set thread context of 5112 4632 1dJ21uD1.exe 96 PID 5092 set thread context of 3056 5092 2yn2840.exe 106 PID 1688 set thread context of 2764 1688 3iE60Md.exe 114 PID 1964 set thread context of 1492 1964 4NJ170iH.exe 120 PID 3820 set thread context of 1320 3820 4875.exe 129 PID 404 set thread context of 1572 404 54DB.exe 137 -
Program crash 7 IoCs
pid pid_target Process procid_target 3340 4632 WerFault.exe 94 4020 5092 WerFault.exe 104 5080 3056 WerFault.exe 106 3060 1688 WerFault.exe 113 260 1964 WerFault.exe 119 3916 3820 WerFault.exe 126 768 404 WerFault.exe 132 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5112 AppLaunch.exe 5112 AppLaunch.exe 2764 AppLaunch.exe 2764 AppLaunch.exe 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found 3160 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2764 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5112 AppLaunch.exe Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found Token: SeShutdownPrivilege 3160 Process not Found Token: SeCreatePagefilePrivilege 3160 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3220 3304 aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe 91 PID 3304 wrote to memory of 3220 3304 aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe 91 PID 3304 wrote to memory of 3220 3304 aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe 91 PID 3220 wrote to memory of 888 3220 ye2TE24.exe 92 PID 3220 wrote to memory of 888 3220 ye2TE24.exe 92 PID 3220 wrote to memory of 888 3220 ye2TE24.exe 92 PID 888 wrote to memory of 2484 888 dD7ef88.exe 93 PID 888 wrote to memory of 2484 888 dD7ef88.exe 93 PID 888 wrote to memory of 2484 888 dD7ef88.exe 93 PID 2484 wrote to memory of 4632 2484 pB4PY59.exe 94 PID 2484 wrote to memory of 4632 2484 pB4PY59.exe 94 PID 2484 wrote to memory of 4632 2484 pB4PY59.exe 94 PID 4632 wrote to memory of 520 4632 1dJ21uD1.exe 95 PID 4632 wrote to memory of 520 4632 1dJ21uD1.exe 95 PID 4632 wrote to memory of 520 4632 1dJ21uD1.exe 95 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 4632 wrote to memory of 5112 4632 1dJ21uD1.exe 96 PID 2484 wrote to memory of 5092 2484 pB4PY59.exe 104 PID 2484 wrote to memory of 5092 2484 pB4PY59.exe 104 PID 2484 wrote to memory of 5092 2484 pB4PY59.exe 104 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 5092 wrote to memory of 3056 5092 2yn2840.exe 106 PID 888 wrote to memory of 1688 888 dD7ef88.exe 113 PID 888 wrote to memory of 1688 888 dD7ef88.exe 113 PID 888 wrote to memory of 1688 888 dD7ef88.exe 113 PID 1688 wrote to memory of 2764 1688 3iE60Md.exe 114 PID 1688 wrote to memory of 2764 1688 3iE60Md.exe 114 PID 1688 wrote to memory of 2764 1688 3iE60Md.exe 114 PID 1688 wrote to memory of 2764 1688 3iE60Md.exe 114 PID 1688 wrote to memory of 2764 1688 3iE60Md.exe 114 PID 1688 wrote to memory of 2764 1688 3iE60Md.exe 114 PID 3220 wrote to memory of 1964 3220 ye2TE24.exe 119 PID 3220 wrote to memory of 1964 3220 ye2TE24.exe 119 PID 3220 wrote to memory of 1964 3220 ye2TE24.exe 119 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 1964 wrote to memory of 1492 1964 4NJ170iH.exe 120 PID 3304 wrote to memory of 1448 3304 aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe 123 PID 3304 wrote to memory of 1448 3304 aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe 123 PID 3304 wrote to memory of 1448 3304 aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe 123 PID 3160 wrote to memory of 2264 3160 Process not Found 125 PID 3160 wrote to memory of 2264 3160 Process not Found 125 PID 3160 wrote to memory of 2264 3160 Process not Found 125 PID 3160 wrote to memory of 3820 3160 Process not Found 126 PID 3160 wrote to memory of 3820 3160 Process not Found 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe"C:\Users\Admin\AppData\Local\Temp\aa70392bd815672b90b2bb32445f48889c2e32cce24298c9f9dbccd6d124fe85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ye2TE24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ye2TE24.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dD7ef88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dD7ef88.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pB4PY59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pB4PY59.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1dJ21uD1.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1dJ21uD1.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 5646⤵
- Program crash
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yn2840.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2yn2840.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 5407⤵
- Program crash
PID:5080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 5646⤵
- Program crash
PID:4020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3iE60Md.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3iE60Md.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 5725⤵
- Program crash
PID:3060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4NJ170iH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4NJ170iH.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 5924⤵
- Program crash
PID:260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Uc9ej3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Uc9ej3.exe2⤵
- Executes dropped EXE
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4632 -ip 46321⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5092 -ip 50921⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3056 -ip 30561⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1688 -ip 16881⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1964 -ip 19641⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\3D78.exeC:\Users\Admin\AppData\Local\Temp\3D78.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ff1pT8Sp.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ff1pT8Sp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BZ1mB0JV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BZ1mB0JV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\uh7VK3yZ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\uh7VK3yZ.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\JN3WQ2LK.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\JN3WQ2LK.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1XD17na4.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\1XD17na4.exe6⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1812
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4875.exeC:\Users\Admin\AppData\Local\Temp\4875.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 2722⤵
- Program crash
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\4C4E.bat"C:\Users\Admin\AppData\Local\Temp\4C4E.bat"1⤵
- Executes dropped EXE
PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3820 -ip 38201⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\54DB.exeC:\Users\Admin\AppData\Local\Temp\54DB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 2482⤵
- Program crash
PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\58D4.exeC:\Users\Admin\AppData\Local\Temp\58D4.exe1⤵
- Executes dropped EXE
PID:2572
-
C:\Users\Admin\AppData\Local\Temp\5F5C.exeC:\Users\Admin\AppData\Local\Temp\5F5C.exe1⤵
- Executes dropped EXE
PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 404 -ip 4041⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.2MB
MD5a5a3e764ce3e951c58a844ddae7e36aa
SHA105cee37d9f30d2c6b1c6b624fb6349aa293d5b0b
SHA25664266b2649e1d6fff227844126898832a0c7425f1e65d0928911cea3ebb8634a
SHA5127d831a8a937800266db3ea2c2ed56f7b759abc9c2693969f6cfa3e7efaf22e54aaa1a68bd19dc47582b0917a80e9323ec30e31ea355bc6edbb0514d020507e5a
-
Filesize
1.2MB
MD5a5a3e764ce3e951c58a844ddae7e36aa
SHA105cee37d9f30d2c6b1c6b624fb6349aa293d5b0b
SHA25664266b2649e1d6fff227844126898832a0c7425f1e65d0928911cea3ebb8634a
SHA5127d831a8a937800266db3ea2c2ed56f7b759abc9c2693969f6cfa3e7efaf22e54aaa1a68bd19dc47582b0917a80e9323ec30e31ea355bc6edbb0514d020507e5a
-
Filesize
410KB
MD5ce35ba818b2f64c50d9d64aa8a6283db
SHA17ee710f29564a275ced5d6266d2a4a2bfe1bf319
SHA256370a0a4a1566dcb10443c1837509a0569f8353564a84127c5400f85afe8b2411
SHA512c5201af19aef07de03cdb0783d4cd650e44a3131ff6b31ca47e17c576e29d1b9efb0a96bac1748630d43e13ce5020ebe7effea9057a1821fca962bf2c89e00f8
-
Filesize
410KB
MD5ce35ba818b2f64c50d9d64aa8a6283db
SHA17ee710f29564a275ced5d6266d2a4a2bfe1bf319
SHA256370a0a4a1566dcb10443c1837509a0569f8353564a84127c5400f85afe8b2411
SHA512c5201af19aef07de03cdb0783d4cd650e44a3131ff6b31ca47e17c576e29d1b9efb0a96bac1748630d43e13ce5020ebe7effea9057a1821fca962bf2c89e00f8
-
Filesize
98KB
MD539457b8a04d406d8e314579ff329e221
SHA1835a1c4fc5051adeccb5dfb105925c50ae13d9d8
SHA256a3b68d9c8ad30f9f4aaf2eab59896d8dc330b076003919c3e59f9cd4dbfe334b
SHA512933400c1a26adc3502923a223b76251b67c5ccabfd05637051a71e6f5eadd932234575f2d9e04ea58e259226599f1619f135e1a8f347db7531c8ce5a57cfe4f9
-
Filesize
98KB
MD539457b8a04d406d8e314579ff329e221
SHA1835a1c4fc5051adeccb5dfb105925c50ae13d9d8
SHA256a3b68d9c8ad30f9f4aaf2eab59896d8dc330b076003919c3e59f9cd4dbfe334b
SHA512933400c1a26adc3502923a223b76251b67c5ccabfd05637051a71e6f5eadd932234575f2d9e04ea58e259226599f1619f135e1a8f347db7531c8ce5a57cfe4f9
-
Filesize
449KB
MD54cf1cd6c171fe82070f83f34137164a2
SHA1f48d6d4412176d4b2777c325f111c7aa5f5164ce
SHA2565c6b328383f2bbb072c1cc8f625f8cc16e53655b48193eaa8da4c51928399913
SHA512e928d929fa951ab9b53c16eee09184ba41189bdb599e5fd9fe8be382536e4a1138c5901c79e382bd02a3dc17b125fd4f2546926418e6f9b565c09c0e4adc0e89
-
Filesize
449KB
MD54cf1cd6c171fe82070f83f34137164a2
SHA1f48d6d4412176d4b2777c325f111c7aa5f5164ce
SHA2565c6b328383f2bbb072c1cc8f625f8cc16e53655b48193eaa8da4c51928399913
SHA512e928d929fa951ab9b53c16eee09184ba41189bdb599e5fd9fe8be382536e4a1138c5901c79e382bd02a3dc17b125fd4f2546926418e6f9b565c09c0e4adc0e89
-
Filesize
449KB
MD54cf1cd6c171fe82070f83f34137164a2
SHA1f48d6d4412176d4b2777c325f111c7aa5f5164ce
SHA2565c6b328383f2bbb072c1cc8f625f8cc16e53655b48193eaa8da4c51928399913
SHA512e928d929fa951ab9b53c16eee09184ba41189bdb599e5fd9fe8be382536e4a1138c5901c79e382bd02a3dc17b125fd4f2546926418e6f9b565c09c0e4adc0e89
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
21KB
MD557543bf9a439bf01773d3d508a221fda
SHA15728a0b9f1856aa5183d15ba00774428be720c35
SHA25670d2e4df54793d08b8e76f1bb1db26721e0398da94dca629ab77bd41cc27fd4e
SHA51228f2eb1fef817df513568831ca550564d490f7bd6c46ada8e06b2cd81bbc59bc2d7b9f955dbfc31c6a41237d0d0f8aa40aaac7ae2fabf9902228f6b669b7fe20
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
98KB
MD5ddfaf5926a0786acad5ed882a7847b31
SHA12c4e34c3bd0f0bc87abd357a5401660fd5da3f74
SHA256763ceed359fd183d84cc1d5f657ef9d9bc8e996af6f627c1f9a57dc112f1e6bf
SHA5122027d74a7a8b9fbe68362bd71d334fe338baba829f0fe5d9c2a8b826a9c5e2bd97f714214b978796fe428e1de776a591192db1efab44f29e1cc9425c05247268
-
Filesize
98KB
MD5ddfaf5926a0786acad5ed882a7847b31
SHA12c4e34c3bd0f0bc87abd357a5401660fd5da3f74
SHA256763ceed359fd183d84cc1d5f657ef9d9bc8e996af6f627c1f9a57dc112f1e6bf
SHA5122027d74a7a8b9fbe68362bd71d334fe338baba829f0fe5d9c2a8b826a9c5e2bd97f714214b978796fe428e1de776a591192db1efab44f29e1cc9425c05247268
-
Filesize
918KB
MD5f71de62f8c4c96d7d445d7deb4535472
SHA18f9f269400326d01538aafe08e6fb3bc957f82d8
SHA256bf95e2190c9bc714f857512976766eebaae728ade069f38260bb328df46823e8
SHA51206400afef07f7b620add5021bf8f6405a3687cf1074d3c4595b17f9af905beac7781445aaa23ff0f53bff1955177264b1a766325aba040cd702a7f9d9887a50b
-
Filesize
918KB
MD5f71de62f8c4c96d7d445d7deb4535472
SHA18f9f269400326d01538aafe08e6fb3bc957f82d8
SHA256bf95e2190c9bc714f857512976766eebaae728ade069f38260bb328df46823e8
SHA51206400afef07f7b620add5021bf8f6405a3687cf1074d3c4595b17f9af905beac7781445aaa23ff0f53bff1955177264b1a766325aba040cd702a7f9d9887a50b
-
Filesize
449KB
MD54cf1cd6c171fe82070f83f34137164a2
SHA1f48d6d4412176d4b2777c325f111c7aa5f5164ce
SHA2565c6b328383f2bbb072c1cc8f625f8cc16e53655b48193eaa8da4c51928399913
SHA512e928d929fa951ab9b53c16eee09184ba41189bdb599e5fd9fe8be382536e4a1138c5901c79e382bd02a3dc17b125fd4f2546926418e6f9b565c09c0e4adc0e89
-
Filesize
449KB
MD54cf1cd6c171fe82070f83f34137164a2
SHA1f48d6d4412176d4b2777c325f111c7aa5f5164ce
SHA2565c6b328383f2bbb072c1cc8f625f8cc16e53655b48193eaa8da4c51928399913
SHA512e928d929fa951ab9b53c16eee09184ba41189bdb599e5fd9fe8be382536e4a1138c5901c79e382bd02a3dc17b125fd4f2546926418e6f9b565c09c0e4adc0e89
-
Filesize
627KB
MD5978f18eac0d0de5e8865f686cdc6bf1f
SHA17427d6083d9db6010ad31bb516f91d98db13b6fb
SHA256e192e3c637260ad2c29b0ee0fa984bae6b2b70d6002aaa504b2d1cd616ab5336
SHA512f5af1ef4271d81b4dd3be2f13d20b8a2127b4bf90a6956c4fa0a82c65280860ae3769a16526eb471d8affbc656c3177de041be9f5c664b4b417bcc331443c2c6
-
Filesize
627KB
MD5978f18eac0d0de5e8865f686cdc6bf1f
SHA17427d6083d9db6010ad31bb516f91d98db13b6fb
SHA256e192e3c637260ad2c29b0ee0fa984bae6b2b70d6002aaa504b2d1cd616ab5336
SHA512f5af1ef4271d81b4dd3be2f13d20b8a2127b4bf90a6956c4fa0a82c65280860ae3769a16526eb471d8affbc656c3177de041be9f5c664b4b417bcc331443c2c6
-
Filesize
258KB
MD5f573e3fc899e3db56dfc5cd953021fd0
SHA1dba4a33b3fd3ee6305b13700adf26bc82589113b
SHA256e393d1245a8db2894c659f020a6bb2148a940dddc8bc714ed51b277771f8bb09
SHA51239fdb7b2031892b831eb391aa7b87687c4e8a3cdae6d66e8a716fd5edb7e89062bd788e363dc98aa4a0b900ddccff8a59bd262d0b729ab66556f1f40aaf75a23
-
Filesize
258KB
MD5f573e3fc899e3db56dfc5cd953021fd0
SHA1dba4a33b3fd3ee6305b13700adf26bc82589113b
SHA256e393d1245a8db2894c659f020a6bb2148a940dddc8bc714ed51b277771f8bb09
SHA51239fdb7b2031892b831eb391aa7b87687c4e8a3cdae6d66e8a716fd5edb7e89062bd788e363dc98aa4a0b900ddccff8a59bd262d0b729ab66556f1f40aaf75a23
-
Filesize
98KB
MD5bd09bad6bed6b9b8b133ebc7a4748113
SHA12cbeba69406391e916146ec9974009e8bd51ff91
SHA2567ef3aedcd4cffcf38576b257f611923a7847b5153c03668eae209be95cd19ed1
SHA5121719bc7ca7f170715042ddd0196a860c888a3e9d83b8b3da235b1d6b158b51d0a0f90bfa83b1aff64bde217c72bc7eb151bd437f95a804b964adac5eda1bd3df
-
Filesize
1.1MB
MD56468ec5c54b27b1d83d56bc1d16b3498
SHA179f612dc89359b156335f719bf50cc43f6e5868f
SHA25691c953a9a470036fdbf791ef925d492eff79847f79843c74ff33c0bb20402f12
SHA512c9ffaaffcda176fee4904e03887cc4ddbd860bb4cb04ad8b082aadef9571d63a98210cde2b6497b146c2adfc61a27943673368efa8d284e76ef181fe8d071262
-
Filesize
1.1MB
MD56468ec5c54b27b1d83d56bc1d16b3498
SHA179f612dc89359b156335f719bf50cc43f6e5868f
SHA25691c953a9a470036fdbf791ef925d492eff79847f79843c74ff33c0bb20402f12
SHA512c9ffaaffcda176fee4904e03887cc4ddbd860bb4cb04ad8b082aadef9571d63a98210cde2b6497b146c2adfc61a27943673368efa8d284e76ef181fe8d071262
-
Filesize
388KB
MD531ea8d7a2de5ceb29d9847ba231f94e3
SHA10d73ce0c726e2e6d9d0d602eac068ee6eaf7639d
SHA2566dec6805e0528ba8484b47068340f05c31a5f0c38e6cfb0838bcaaeaa1cad366
SHA51299b3cefa0ac30128e1d77f117dc9ef63bcf0d1fbdbad3b203da6111daabc668ffcecf5abc5099db5707e38f3a29f3b4438571480df8570dfe3f2e141137475a9
-
Filesize
388KB
MD531ea8d7a2de5ceb29d9847ba231f94e3
SHA10d73ce0c726e2e6d9d0d602eac068ee6eaf7639d
SHA2566dec6805e0528ba8484b47068340f05c31a5f0c38e6cfb0838bcaaeaa1cad366
SHA51299b3cefa0ac30128e1d77f117dc9ef63bcf0d1fbdbad3b203da6111daabc668ffcecf5abc5099db5707e38f3a29f3b4438571480df8570dfe3f2e141137475a9
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
410KB
MD5a6b8248340addf97a80850dafef06116
SHA1ed7b3409814a7f423264320aec9c004f554600e9
SHA256d510dfe62ddcc7c68c4d3d5307d8ce4182a55aa3292c5903d3f66b5bc2572adc
SHA5129e20f64d3aa0953f85ce554c3a9559a37570f274779a2c1885e29a7bbe7f056fe3791a53151b1d52c45c259190f43eb2d0a20ef6dccc89c2081f5cbe00cf339d
-
Filesize
410KB
MD5a6b8248340addf97a80850dafef06116
SHA1ed7b3409814a7f423264320aec9c004f554600e9
SHA256d510dfe62ddcc7c68c4d3d5307d8ce4182a55aa3292c5903d3f66b5bc2572adc
SHA5129e20f64d3aa0953f85ce554c3a9559a37570f274779a2c1885e29a7bbe7f056fe3791a53151b1d52c45c259190f43eb2d0a20ef6dccc89c2081f5cbe00cf339d
-
Filesize
923KB
MD56c376d62ffe6e7677883f3624cbcc7e3
SHA108bce197433d00078668082cd788a6ed0619a92a
SHA25610aa53948ddc77974fe5daca449b916322c65479112ee16e41c400fd86507cca
SHA512c7f4868badc0344101ce7bec4c6f7d7e86b8a17962c6b866d92a12f134d21da930ebac7ce6b4d773afaefda6409cd87124a72d063ab3a6e55f072dc13f3c5a31
-
Filesize
923KB
MD56c376d62ffe6e7677883f3624cbcc7e3
SHA108bce197433d00078668082cd788a6ed0619a92a
SHA25610aa53948ddc77974fe5daca449b916322c65479112ee16e41c400fd86507cca
SHA512c7f4868badc0344101ce7bec4c6f7d7e86b8a17962c6b866d92a12f134d21da930ebac7ce6b4d773afaefda6409cd87124a72d063ab3a6e55f072dc13f3c5a31
-
Filesize
633KB
MD5c82e058dafdbe098d092c98d7220e144
SHA1f8c4ae67698342b273b932e04ffc522660d4f479
SHA25608e0e83462b833358d01217830b696c3da41a5e8a0aea7fcc7227714f7112819
SHA5122f0a0f135e578ef40bc501d78d921d942b5a5501f17de4c90c9f95b281b69b608c2055f3934b7bb9c9f5493e0645aa5c83cf5657f37637eef864379dee449d54
-
Filesize
633KB
MD5c82e058dafdbe098d092c98d7220e144
SHA1f8c4ae67698342b273b932e04ffc522660d4f479
SHA25608e0e83462b833358d01217830b696c3da41a5e8a0aea7fcc7227714f7112819
SHA5122f0a0f135e578ef40bc501d78d921d942b5a5501f17de4c90c9f95b281b69b608c2055f3934b7bb9c9f5493e0645aa5c83cf5657f37637eef864379dee449d54
-
Filesize
437KB
MD569a9dc8c81aa87b05b083f90978a0684
SHA1202b3aff6a434ea5a80152c3719603e70c54b5d9
SHA256e4a2c167d9de84f4c8df56babdae4b2d8c3da0ee80892e5e0aec7e7d54c9ea09
SHA5121314fa8645013b042e7389048d68f11e3b611372e0d6ec6dcb971ffdee4fecc39f2077ecb7527891d75543b25cc06a1f6fccea72c6e5b3a34ef1706438d41551
-
Filesize
437KB
MD569a9dc8c81aa87b05b083f90978a0684
SHA1202b3aff6a434ea5a80152c3719603e70c54b5d9
SHA256e4a2c167d9de84f4c8df56babdae4b2d8c3da0ee80892e5e0aec7e7d54c9ea09
SHA5121314fa8645013b042e7389048d68f11e3b611372e0d6ec6dcb971ffdee4fecc39f2077ecb7527891d75543b25cc06a1f6fccea72c6e5b3a34ef1706438d41551
-
Filesize
410KB
MD5a6b8248340addf97a80850dafef06116
SHA1ed7b3409814a7f423264320aec9c004f554600e9
SHA256d510dfe62ddcc7c68c4d3d5307d8ce4182a55aa3292c5903d3f66b5bc2572adc
SHA5129e20f64d3aa0953f85ce554c3a9559a37570f274779a2c1885e29a7bbe7f056fe3791a53151b1d52c45c259190f43eb2d0a20ef6dccc89c2081f5cbe00cf339d
-
Filesize
410KB
MD5a6b8248340addf97a80850dafef06116
SHA1ed7b3409814a7f423264320aec9c004f554600e9
SHA256d510dfe62ddcc7c68c4d3d5307d8ce4182a55aa3292c5903d3f66b5bc2572adc
SHA5129e20f64d3aa0953f85ce554c3a9559a37570f274779a2c1885e29a7bbe7f056fe3791a53151b1d52c45c259190f43eb2d0a20ef6dccc89c2081f5cbe00cf339d
-
Filesize
410KB
MD5a6b8248340addf97a80850dafef06116
SHA1ed7b3409814a7f423264320aec9c004f554600e9
SHA256d510dfe62ddcc7c68c4d3d5307d8ce4182a55aa3292c5903d3f66b5bc2572adc
SHA5129e20f64d3aa0953f85ce554c3a9559a37570f274779a2c1885e29a7bbe7f056fe3791a53151b1d52c45c259190f43eb2d0a20ef6dccc89c2081f5cbe00cf339d