Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2023 22:37
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231127-en
General
-
Target
file.exe
-
Size
220KB
-
MD5
1d6f355e2bff2e65ad8582c81ba8782b
-
SHA1
82b46f681ca938cf25380f33308edf380f532871
-
SHA256
20fb25cdc691c31b5b59ec871960363fedb13d10e2f0d274eecb3951811b7fe8
-
SHA512
bfa7ade490c2138184a81f8668a7a25f4eb38bc51ea068cfd3b89f7d323e3c963068e414033ca556aedb09f55edbe2126aa00ffa63acb86d9e29c2e2293fd6b2
-
SSDEEP
3072:115Kn8Ls+WqCZ1m7QJTCaB1LBoj/XsUz5AtiKhdGUZoVawtMTp9:H5Kl+WHvJTCaB1LBoj0jTcK8aEaP
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
http://legdfls2369.com/index.php
http://fpodsp0532xc.com/index.php
http://gucc352093520.com/index.php
http://humydrole.com/tmp/index.php
http://trunk-co.ru/tmp/index.php
http://weareelight.com/tmp/index.php
http://pirateking.online/tmp/index.php
http://piratia.pw/tmp/index.php
http://go-piratia.ru/tmp/index.php
Extracted
smokeloader
autm
Extracted
smokeloader
pub1
Extracted
stealc
http://dskflherlkhopihsf.com
-
url_path
/d414f888bed8c202.php
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7D4B.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7D4B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7D4B.exe -
Deletes itself 1 IoCs
pid Process 3276 Process not Found -
Executes dropped EXE 11 IoCs
pid Process 1200 55CC.exe 4820 62DD.exe 4352 62DD.exe 4584 7D4B.exe 2456 9A0D.exe 1520 A095.exe 4540 A951.exe 1508 Adaptation.pif 988 stbhvvj 2196 aabhvvj 1996 scbhvvj -
Loads dropped DLL 3 IoCs
pid Process 2104 regsvr32.exe 1508 Adaptation.pif 1508 Adaptation.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000023251-45.dat themida behavioral2/files/0x0008000000023251-46.dat themida behavioral2/memory/4584-57-0x0000000000550000-0x000000000101A000-memory.dmp themida behavioral2/memory/4584-210-0x0000000000550000-0x000000000101A000-memory.dmp themida -
resource yara_rule behavioral2/memory/4352-29-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-32-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-33-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-34-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-39-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-40-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-97-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-114-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-118-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-184-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-199-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-220-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4352-231-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 62DD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7D4B.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4584 7D4B.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4820 set thread context of 4352 4820 62DD.exe 99 PID 4540 set thread context of 3536 4540 A951.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4812 1996 WerFault.exe 134 1520 2196 WerFault.exe 133 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 55CC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 55CC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9A0D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9A0D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI stbhvvj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 55CC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9A0D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI stbhvvj Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI stbhvvj Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Adaptation.pif Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Adaptation.pif -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2252 tasklist.exe 2800 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2000 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 file.exe 4520 file.exe 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3276 Process not Found -
Suspicious behavior: MapViewOfSection 26 IoCs
pid Process 4520 file.exe 1200 55CC.exe 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 2456 9A0D.exe 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 988 stbhvvj -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeDebugPrivilege 3536 AppLaunch.exe Token: SeDebugPrivilege 2252 tasklist.exe Token: SeDebugPrivilege 2800 tasklist.exe Token: SeDebugPrivilege 4584 7D4B.exe Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1508 Adaptation.pif 3276 Process not Found 3276 Process not Found 1508 Adaptation.pif 1508 Adaptation.pif 3276 Process not Found 3276 Process not Found -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1508 Adaptation.pif 1508 Adaptation.pif 1508 Adaptation.pif -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3276 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 1200 3276 Process not Found 97 PID 3276 wrote to memory of 1200 3276 Process not Found 97 PID 3276 wrote to memory of 1200 3276 Process not Found 97 PID 3276 wrote to memory of 4820 3276 Process not Found 98 PID 3276 wrote to memory of 4820 3276 Process not Found 98 PID 3276 wrote to memory of 4820 3276 Process not Found 98 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 4820 wrote to memory of 4352 4820 62DD.exe 99 PID 3276 wrote to memory of 4584 3276 Process not Found 100 PID 3276 wrote to memory of 4584 3276 Process not Found 100 PID 3276 wrote to memory of 4584 3276 Process not Found 100 PID 3276 wrote to memory of 3320 3276 Process not Found 102 PID 3276 wrote to memory of 3320 3276 Process not Found 102 PID 3320 wrote to memory of 2104 3320 regsvr32.exe 103 PID 3320 wrote to memory of 2104 3320 regsvr32.exe 103 PID 3320 wrote to memory of 2104 3320 regsvr32.exe 103 PID 3276 wrote to memory of 2456 3276 Process not Found 104 PID 3276 wrote to memory of 2456 3276 Process not Found 104 PID 3276 wrote to memory of 2456 3276 Process not Found 104 PID 3276 wrote to memory of 1520 3276 Process not Found 105 PID 3276 wrote to memory of 1520 3276 Process not Found 105 PID 3276 wrote to memory of 1520 3276 Process not Found 105 PID 3276 wrote to memory of 4540 3276 Process not Found 107 PID 3276 wrote to memory of 4540 3276 Process not Found 107 PID 3276 wrote to memory of 4540 3276 Process not Found 107 PID 3276 wrote to memory of 1940 3276 Process not Found 108 PID 3276 wrote to memory of 1940 3276 Process not Found 108 PID 3276 wrote to memory of 1940 3276 Process not Found 108 PID 3276 wrote to memory of 1940 3276 Process not Found 108 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 4540 wrote to memory of 3536 4540 A951.exe 109 PID 3276 wrote to memory of 3300 3276 Process not Found 110 PID 3276 wrote to memory of 3300 3276 Process not Found 110 PID 3276 wrote to memory of 3300 3276 Process not Found 110 PID 1520 wrote to memory of 4444 1520 A095.exe 111 PID 1520 wrote to memory of 4444 1520 A095.exe 111 PID 1520 wrote to memory of 4444 1520 A095.exe 111 PID 4444 wrote to memory of 5016 4444 cmd.exe 113 PID 4444 wrote to memory of 5016 4444 cmd.exe 113 PID 4444 wrote to memory of 5016 4444 cmd.exe 113 PID 5016 wrote to memory of 2252 5016 cmd.exe 114 PID 5016 wrote to memory of 2252 5016 cmd.exe 114 PID 5016 wrote to memory of 2252 5016 cmd.exe 114 PID 5016 wrote to memory of 1392 5016 cmd.exe 115 PID 5016 wrote to memory of 1392 5016 cmd.exe 115 PID 5016 wrote to memory of 1392 5016 cmd.exe 115 PID 5016 wrote to memory of 2800 5016 cmd.exe 116 PID 5016 wrote to memory of 2800 5016 cmd.exe 116 PID 5016 wrote to memory of 2800 5016 cmd.exe 116 PID 5016 wrote to memory of 2080 5016 cmd.exe 117 PID 5016 wrote to memory of 2080 5016 cmd.exe 117 PID 5016 wrote to memory of 2080 5016 cmd.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4520
-
C:\Users\Admin\AppData\Local\Temp\55CC.exeC:\Users\Admin\AppData\Local\Temp\55CC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1200
-
C:\Users\Admin\AppData\Local\Temp\62DD.exeC:\Users\Admin\AppData\Local\Temp\62DD.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\62DD.exeC:\Users\Admin\AppData\Local\Temp\62DD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\7D4B.exeC:\Users\Admin\AppData\Local\Temp\7D4B.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8962.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8962.dll2⤵
- Loads dropped DLL
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\9A0D.exeC:\Users\Admin\AppData\Local\Temp\9A0D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2456
-
C:\Users\Admin\AppData\Local\Temp\A095.exeC:\Users\Admin\AppData\Local\Temp\A095.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /k cmd < Hottest & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:1392
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"4⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 2964⤵PID:2780
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Span + Cigarette + Instances + Mfg + Cable 296\Adaptation.pif4⤵PID:556
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Complex 296\G4⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\48058\296\Adaptation.pif296\Adaptation.pif 296\G4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost4⤵
- Runs ping.exe
PID:2000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\A951.exeC:\Users\Admin\AppData\Local\Temp\A951.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:1940
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3300
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4748
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3212
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2784
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:852
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4348
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4256
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3052
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1592
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3392
-
C:\Users\Admin\AppData\Roaming\stbhvvjC:\Users\Admin\AppData\Roaming\stbhvvj1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:988
-
C:\Users\Admin\AppData\Roaming\aabhvvjC:\Users\Admin\AppData\Roaming\aabhvvj1⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 3402⤵
- Program crash
PID:1520
-
-
C:\Users\Admin\AppData\Roaming\scbhvvjC:\Users\Admin\AppData\Roaming\scbhvvj1⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 3402⤵
- Program crash
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 1996 -ip 19961⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2196 -ip 21961⤵PID:1500
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
92KB
MD521363921c6943b0ba12e8c3cbd47a7fd
SHA103bb94c70b12783c4d1962cc7cb9f752ff8a9a54
SHA2562f023e72c5bc9804a60441c14980fa8de30d3118e3d7ce67d8951989b1d90c4a
SHA5123749d95295a281e18f7eca6bdecc45d0d08bc98a4da5d5b8ab21cd5022eed125b1b7a4b96c70ed486750be4eabd4da325ab9a7a1fb497dda4c4f30f9adf8da43
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
481KB
MD5daf7c95ffa3878edde190cf2528b89c7
SHA1ce03b0a9cd957ecb89eb0ee3fb53e36dc48e589c
SHA256362fe8651e59873d994c672f5e1bccc8e0cdd43495847e4cd68e9581dbe8da82
SHA512014ab181c8b738f548a83336f04552924cc50fd1d31df30bd6449d79654e22e762da4c1b34d30f6695bc9be8f8ac29b1f896d44ee0399b698b732e95c1ed8ea2
-
Filesize
107KB
MD5ea0984c12452e6529fa15b45d4c0db4a
SHA14ee04ddf92a5fb316bd0e5c07ebd01e42722cec9
SHA2567d912eab3995c5afe59eb81769a4642a155f70be14e927f2c26aa4adfc0b4c3e
SHA512ee0f8a91796e213416749a413dc4d14fa240c280e85f93e033c134ae409e9ee156e3f7b16be0498e85f1d73b88f7422994eccca6b4bcca582b1a5b5e69e734d3
-
Filesize
152KB
MD56c6624c93751ad297285148c310ff274
SHA19773285a0cb3d80626b6cab3ff667562640f641a
SHA256cf1f99ac18850df999db097dce5b94395540e27bed65c17b4c1e2aa37c0ad1ca
SHA512cca0807a8b377c694a48c240990efcf593fedf8ea380e9c56cdc6f75e4a5006ec1b8eceddae089c7c7656266e2ffd8976d1e343bedddd6f170eee686228f3340
-
Filesize
481KB
MD5daf7c95ffa3878edde190cf2528b89c7
SHA1ce03b0a9cd957ecb89eb0ee3fb53e36dc48e589c
SHA256362fe8651e59873d994c672f5e1bccc8e0cdd43495847e4cd68e9581dbe8da82
SHA512014ab181c8b738f548a83336f04552924cc50fd1d31df30bd6449d79654e22e762da4c1b34d30f6695bc9be8f8ac29b1f896d44ee0399b698b732e95c1ed8ea2
-
Filesize
11KB
MD56c3db9d2ee7fdf582ee1ccc7a23b7790
SHA196fcea7cc3d585f4249bc8345787c35f299b65c9
SHA25625784a61a1f3b4c01e071001e65ce34e8ee4e89e7fdbe875726f71865d37f011
SHA51219dc63a80e3194d3e3f083f1906e69c9e443633051e69fc3c0e5342b064f12386bf5b46a6af623d59f2076211d8bed62671dc80bc2832db2750de91fc8d8c68f
-
Filesize
102KB
MD58716ba4268c997b3594e7cfd5ae8ffbe
SHA130f35dc0ebba1c0997d9f50ab01d6db37964dab7
SHA256922ca4c9f27fdf74e3c3c7fd3ebe0c3cdf9ff5520be53038dd170164a7a4bad5
SHA51229f4496763aa8a57b063ab8db53de062bd93236ff0651edca516d2711aae9d5e5c40f0b176819b4b38a518de30f6e7d796732df085951272ab0609cc793b522e
-
Filesize
265KB
MD548c1ab8f82b10195b9ff4244d5bf9540
SHA140c3df2ed56058e474363097a50e3410dc3aae51
SHA25671ab87b2e5ceccebe76ea2f60a3456d8a950662892c5bd50008ac7a40090cc50
SHA51260bd24e06a5d8224e14479bc1300ae9a49c609f017f330a1cbec6315313fc663c0e7be85c38b165f44bf62ffdda89c346c7e2a68cf185ad33dddb244833df8b1
-
Filesize
298KB
MD5c3ac7e357a0c696c7b80c94053cc81b4
SHA10802eb8acccbe2e0924cacb5127f48054b5da38e
SHA256ebe1b557f2979029744308f2ae5640cfcbdb1c3d4b667015a83a2b59ed6d6927
SHA5123fc612476199780d56b2fcf3b2beff17fc17d70997a58e60f21ea29df54f39b6bd2bc5217f322238de72b41f5a8fa029843da57cacc41db5f3fdc1d5a5dec817
-
Filesize
2.7MB
MD55bf98af569eb3146c9f6a7e13af7e9e9
SHA15c92685f2f8695d7d8b5a738e12b27a7b6effb5c
SHA2565bf3de6c035bb65c93e839e5b25de4a3ccf20ae84cff88a1f6ed7a2ca434e91f
SHA51214854e162b645541d077140cf1beb1f7226fbe90c2875bcc752f14e26f2abd895261bbde2218b20355119032e11ba6cc7b3c3f563a513cb60a7d3f1a87830814
-
Filesize
7.7MB
MD5bc4eddf899038532d6ad01463703392c
SHA1829d23d9ad20e3825d1f36b7654fda6f923f315e
SHA2562e36e4995a0e0bd2d57b4c279e8d85667abe962bdb0a2792cc3d6b1213c56f94
SHA5121a06c1cd0c523754909cc0077c003ddc386bac7e051896598515cd8e7d35722a29f36d60900ff2a74c495c15c019572d8757a6a8adaeb26c3b5a054a9d4bc4be
-
Filesize
304KB
MD533a60439e95f0dfc10016075f97aeb0c
SHA1fb3595f8a5f9c243e5ad108ff11bc5cb2400ec2b
SHA2560f6db13c0239ca113c19ebeaec8f3243572fd365c3396eff1777115bc08849a1
SHA512c08ff3d27eb92b369bbdcfb5ee3405e345bb3de3004b985ba48b4308d22851403cfc440b8242c1f4ccbbb75986feead1c800bddd58a225274386b878aaad9a90
-
Filesize
304KB
MD533a60439e95f0dfc10016075f97aeb0c
SHA1fb3595f8a5f9c243e5ad108ff11bc5cb2400ec2b
SHA2560f6db13c0239ca113c19ebeaec8f3243572fd365c3396eff1777115bc08849a1
SHA512c08ff3d27eb92b369bbdcfb5ee3405e345bb3de3004b985ba48b4308d22851403cfc440b8242c1f4ccbbb75986feead1c800bddd58a225274386b878aaad9a90
-
Filesize
1.9MB
MD557c833bfd5042e34bec23dfd711cd151
SHA16bcd1915173d57d369e209943be31eebebdd535a
SHA2569d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d
SHA5123c14531cd81ac2276cac72da573cb5f452c53b96175acca025a8e30251c487fcd382a8bc25a5241e6700832dbb760313bf9e51ffa0fcd480d5ddc6662cbc02e1
-
Filesize
1.9MB
MD557c833bfd5042e34bec23dfd711cd151
SHA16bcd1915173d57d369e209943be31eebebdd535a
SHA2569d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d
SHA5123c14531cd81ac2276cac72da573cb5f452c53b96175acca025a8e30251c487fcd382a8bc25a5241e6700832dbb760313bf9e51ffa0fcd480d5ddc6662cbc02e1
-
Filesize
1.9MB
MD557c833bfd5042e34bec23dfd711cd151
SHA16bcd1915173d57d369e209943be31eebebdd535a
SHA2569d3c881c29156b8fd82ced7c7726c4c65d4e741533c9f886112f440698b1469d
SHA5123c14531cd81ac2276cac72da573cb5f452c53b96175acca025a8e30251c487fcd382a8bc25a5241e6700832dbb760313bf9e51ffa0fcd480d5ddc6662cbc02e1
-
Filesize
4.6MB
MD5a3dea4c1f895c2729505cb4712ad469d
SHA1fdfeebab437bf7f97fb848cd67abec9409adb3b2
SHA256acfa700a776ef8622839fd22f3bcca3e7183e3ee2e21473ca0d9ccdc895c4afd
SHA5129da049b6e9169e1079182ce04fd852e823d6bb31f0be3a814ee687047f3831c3cac58dd46b6a8592714afd102233d40a70a0b66e5f094d014c7059b119aa11c4
-
Filesize
4.6MB
MD5a3dea4c1f895c2729505cb4712ad469d
SHA1fdfeebab437bf7f97fb848cd67abec9409adb3b2
SHA256acfa700a776ef8622839fd22f3bcca3e7183e3ee2e21473ca0d9ccdc895c4afd
SHA5129da049b6e9169e1079182ce04fd852e823d6bb31f0be3a814ee687047f3831c3cac58dd46b6a8592714afd102233d40a70a0b66e5f094d014c7059b119aa11c4
-
Filesize
2.1MB
MD5824ccd36914386ef3376494c93dc2e8f
SHA14fb7898a439b0cecd856f8e6ba434728e6b3e4dd
SHA256cad7dbc2fbf4f4f0426a4f0a467d394d48534e22a3013d6b525fef5c3e976a28
SHA512bfe6e970c5e44d56d9a1523ca3259a08daeaa4af1c9fb230afc58b216944165c44f44dc80f4a3cb510a04dc3921c76e8fd458112ae88aa11b75633690a5c9bd8
-
Filesize
2.1MB
MD5824ccd36914386ef3376494c93dc2e8f
SHA14fb7898a439b0cecd856f8e6ba434728e6b3e4dd
SHA256cad7dbc2fbf4f4f0426a4f0a467d394d48534e22a3013d6b525fef5c3e976a28
SHA512bfe6e970c5e44d56d9a1523ca3259a08daeaa4af1c9fb230afc58b216944165c44f44dc80f4a3cb510a04dc3921c76e8fd458112ae88aa11b75633690a5c9bd8
-
Filesize
219KB
MD519580138ffde25abbd2be3108ae82049
SHA1a09cb792d601ecf35612838495b1031c72bc4e13
SHA2568c5b4f3361663db3d011b8f05555d90de7a213e7b747716ff2e9d84bb1922c99
SHA51292b9fd029590dff1f0ba4408f72aa6b13f536ad76489970b4691e63c936cd2937bbfdfa166ce91993a379fe67e086e281c7a0d6b9efc763232e892089db8f9e9
-
Filesize
219KB
MD519580138ffde25abbd2be3108ae82049
SHA1a09cb792d601ecf35612838495b1031c72bc4e13
SHA2568c5b4f3361663db3d011b8f05555d90de7a213e7b747716ff2e9d84bb1922c99
SHA51292b9fd029590dff1f0ba4408f72aa6b13f536ad76489970b4691e63c936cd2937bbfdfa166ce91993a379fe67e086e281c7a0d6b9efc763232e892089db8f9e9
-
Filesize
1.3MB
MD5663bef796cad090d04538b9b618c2134
SHA1d47c6e447278e09cbd2bccbc6973ec93e381c451
SHA2561c549f923ef59769eccf16055d1fb866881166831bceb8feb5d8d1337abab07f
SHA512ea3e3a562ee2dae6dba947a792cbd94fc679ebca5d8724efbec1bd7c5c39c70be2dcac0930d07a73b515508b436ee9e83fd9cd648f7424e3dd1a72c1e0ffc8d1
-
Filesize
1.3MB
MD5663bef796cad090d04538b9b618c2134
SHA1d47c6e447278e09cbd2bccbc6973ec93e381c451
SHA2561c549f923ef59769eccf16055d1fb866881166831bceb8feb5d8d1337abab07f
SHA512ea3e3a562ee2dae6dba947a792cbd94fc679ebca5d8724efbec1bd7c5c39c70be2dcac0930d07a73b515508b436ee9e83fd9cd648f7424e3dd1a72c1e0ffc8d1
-
Filesize
1.8MB
MD5d91540ed753b8137486c21fcc71f5824
SHA116534b5421a6615cc3d90601f6e0a2d3e68ff567
SHA25666389e8e3338eb2791929ec9768c90905587a4659dc24e82a8d0e3d09e03c4ee
SHA512d15e1ae7c3704c3756a031842fb6853d744ff899d78b845962901151e7628cd76f494ad7ca1043f571da1eb8d3f11206b89a831b782e3a019bbf773c219f4b3a
-
Filesize
1.8MB
MD5d91540ed753b8137486c21fcc71f5824
SHA116534b5421a6615cc3d90601f6e0a2d3e68ff567
SHA25666389e8e3338eb2791929ec9768c90905587a4659dc24e82a8d0e3d09e03c4ee
SHA512d15e1ae7c3704c3756a031842fb6853d744ff899d78b845962901151e7628cd76f494ad7ca1043f571da1eb8d3f11206b89a831b782e3a019bbf773c219f4b3a
-
Filesize
304KB
MD533a60439e95f0dfc10016075f97aeb0c
SHA1fb3595f8a5f9c243e5ad108ff11bc5cb2400ec2b
SHA2560f6db13c0239ca113c19ebeaec8f3243572fd365c3396eff1777115bc08849a1
SHA512c08ff3d27eb92b369bbdcfb5ee3405e345bb3de3004b985ba48b4308d22851403cfc440b8242c1f4ccbbb75986feead1c800bddd58a225274386b878aaad9a90
-
Filesize
304KB
MD533a60439e95f0dfc10016075f97aeb0c
SHA1fb3595f8a5f9c243e5ad108ff11bc5cb2400ec2b
SHA2560f6db13c0239ca113c19ebeaec8f3243572fd365c3396eff1777115bc08849a1
SHA512c08ff3d27eb92b369bbdcfb5ee3405e345bb3de3004b985ba48b4308d22851403cfc440b8242c1f4ccbbb75986feead1c800bddd58a225274386b878aaad9a90
-
Filesize
304KB
MD533a60439e95f0dfc10016075f97aeb0c
SHA1fb3595f8a5f9c243e5ad108ff11bc5cb2400ec2b
SHA2560f6db13c0239ca113c19ebeaec8f3243572fd365c3396eff1777115bc08849a1
SHA512c08ff3d27eb92b369bbdcfb5ee3405e345bb3de3004b985ba48b4308d22851403cfc440b8242c1f4ccbbb75986feead1c800bddd58a225274386b878aaad9a90
-
Filesize
219KB
MD519580138ffde25abbd2be3108ae82049
SHA1a09cb792d601ecf35612838495b1031c72bc4e13
SHA2568c5b4f3361663db3d011b8f05555d90de7a213e7b747716ff2e9d84bb1922c99
SHA51292b9fd029590dff1f0ba4408f72aa6b13f536ad76489970b4691e63c936cd2937bbfdfa166ce91993a379fe67e086e281c7a0d6b9efc763232e892089db8f9e9
-
Filesize
219KB
MD519580138ffde25abbd2be3108ae82049
SHA1a09cb792d601ecf35612838495b1031c72bc4e13
SHA2568c5b4f3361663db3d011b8f05555d90de7a213e7b747716ff2e9d84bb1922c99
SHA51292b9fd029590dff1f0ba4408f72aa6b13f536ad76489970b4691e63c936cd2937bbfdfa166ce91993a379fe67e086e281c7a0d6b9efc763232e892089db8f9e9
-
Filesize
219KB
MD519580138ffde25abbd2be3108ae82049
SHA1a09cb792d601ecf35612838495b1031c72bc4e13
SHA2568c5b4f3361663db3d011b8f05555d90de7a213e7b747716ff2e9d84bb1922c99
SHA51292b9fd029590dff1f0ba4408f72aa6b13f536ad76489970b4691e63c936cd2937bbfdfa166ce91993a379fe67e086e281c7a0d6b9efc763232e892089db8f9e9
-
Filesize
220KB
MD51d6f355e2bff2e65ad8582c81ba8782b
SHA182b46f681ca938cf25380f33308edf380f532871
SHA25620fb25cdc691c31b5b59ec871960363fedb13d10e2f0d274eecb3951811b7fe8
SHA512bfa7ade490c2138184a81f8668a7a25f4eb38bc51ea068cfd3b89f7d323e3c963068e414033ca556aedb09f55edbe2126aa00ffa63acb86d9e29c2e2293fd6b2
-
Filesize
220KB
MD51d6f355e2bff2e65ad8582c81ba8782b
SHA182b46f681ca938cf25380f33308edf380f532871
SHA25620fb25cdc691c31b5b59ec871960363fedb13d10e2f0d274eecb3951811b7fe8
SHA512bfa7ade490c2138184a81f8668a7a25f4eb38bc51ea068cfd3b89f7d323e3c963068e414033ca556aedb09f55edbe2126aa00ffa63acb86d9e29c2e2293fd6b2