Analysis
-
max time kernel
73s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 01:40
Static task
static1
Behavioral task
behavioral1
Sample
7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe
Resource
win10v2004-20231215-en
General
-
Target
7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe
-
Size
2.0MB
-
MD5
72fb4b278b6a9927a7d8a7801e5bb672
-
SHA1
7c27b347c171974bc21697165177c93717b8fc30
-
SHA256
7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59
-
SHA512
49c752c3773b998e7ecce4d2acbcfe769c0e6ae0b2661e99085614982a840ad15c682344c4554478bfe6f9ed6fa9e5dc7d8cfd122db6e69b7ecd6de1398adf38
-
SSDEEP
49152:qL8Zj+zbbJ+ejFvwvHw+SKZDH/CQesuengxRztOQxHAfS:rj+n1+e2o9WCkNnYFtOQxH8
Malware Config
Extracted
smokeloader
2022
http://185.215.113.68/fks/index.php
Extracted
smokeloader
up3
Extracted
stealc
http://5.42.66.58
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
redline
777
195.20.16.103:20440
Signatures
-
Detect Lumma Stealer payload V4 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1808-99-0x0000000002500000-0x000000000257C000-memory.dmp family_lumma_v4 behavioral2/memory/1808-100-0x0000000000400000-0x0000000000892000-memory.dmp family_lumma_v4 behavioral2/memory/1808-101-0x0000000000400000-0x0000000000892000-memory.dmp family_lumma_v4 behavioral2/memory/1808-102-0x0000000002500000-0x000000000257C000-memory.dmp family_lumma_v4 -
Glupteba payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3212-193-0x0000000002EF0000-0x00000000037DB000-memory.dmp family_glupteba behavioral2/memory/3212-261-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3212-426-0x0000000002EF0000-0x00000000037DB000-memory.dmp family_glupteba behavioral2/memory/3212-500-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1464-750-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Drops startup file 1 IoCs
Processes:
4IQ909YE.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 4IQ909YE.exe -
Executes dropped EXE 6 IoCs
Processes:
Jl8SY93.exe4IQ909YE.exe6iK5kO2.exe7bL8aq67.exe47F1.exe5F72.exepid process 2044 Jl8SY93.exe 2056 4IQ909YE.exe 1808 6iK5kO2.exe 628 7bL8aq67.exe 1788 47F1.exe 4324 5F72.exe -
Loads dropped DLL 1 IoCs
Processes:
4IQ909YE.exepid process 2056 4IQ909YE.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
4IQ909YE.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4IQ909YE.exe Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4IQ909YE.exe Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4IQ909YE.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
4IQ909YE.exe7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exeJl8SY93.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 4IQ909YE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jl8SY93.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 ipinfo.io 70 api.ipify.org 25 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
4IQ909YE.exepid process 2056 4IQ909YE.exe 2056 4IQ909YE.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4168 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1052 2056 WerFault.exe 4IQ909YE.exe 1932 1808 WerFault.exe 6iK5kO2.exe 4156 3160 WerFault.exe toolspub2.exe 3328 3332 WerFault.exe E82E.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
7bL8aq67.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7bL8aq67.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7bL8aq67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7bL8aq67.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3244 schtasks.exe 4324 schtasks.exe 3248 schtasks.exe 1912 schtasks.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4IQ909YE.exe7bL8aq67.exepid process 2056 4IQ909YE.exe 2056 4IQ909YE.exe 628 7bL8aq67.exe 628 7bL8aq67.exe 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 3384 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7bL8aq67.exepid process 628 7bL8aq67.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4IQ909YE.exedescription pid process Token: SeDebugPrivilege 2056 4IQ909YE.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
4IQ909YE.exepid process 2056 4IQ909YE.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exeJl8SY93.exe4IQ909YE.execmd.execmd.exedescription pid process target process PID 1436 wrote to memory of 2044 1436 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe Jl8SY93.exe PID 1436 wrote to memory of 2044 1436 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe Jl8SY93.exe PID 1436 wrote to memory of 2044 1436 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe Jl8SY93.exe PID 2044 wrote to memory of 2056 2044 Jl8SY93.exe 4IQ909YE.exe PID 2044 wrote to memory of 2056 2044 Jl8SY93.exe 4IQ909YE.exe PID 2044 wrote to memory of 2056 2044 Jl8SY93.exe 4IQ909YE.exe PID 2056 wrote to memory of 5108 2056 4IQ909YE.exe cmd.exe PID 2056 wrote to memory of 5108 2056 4IQ909YE.exe cmd.exe PID 2056 wrote to memory of 5108 2056 4IQ909YE.exe cmd.exe PID 5108 wrote to memory of 3248 5108 cmd.exe schtasks.exe PID 5108 wrote to memory of 3248 5108 cmd.exe schtasks.exe PID 5108 wrote to memory of 3248 5108 cmd.exe schtasks.exe PID 2056 wrote to memory of 116 2056 4IQ909YE.exe cmd.exe PID 2056 wrote to memory of 116 2056 4IQ909YE.exe cmd.exe PID 2056 wrote to memory of 116 2056 4IQ909YE.exe cmd.exe PID 116 wrote to memory of 1912 116 cmd.exe schtasks.exe PID 116 wrote to memory of 1912 116 cmd.exe schtasks.exe PID 116 wrote to memory of 1912 116 cmd.exe schtasks.exe PID 2044 wrote to memory of 1808 2044 Jl8SY93.exe 6iK5kO2.exe PID 2044 wrote to memory of 1808 2044 Jl8SY93.exe 6iK5kO2.exe PID 2044 wrote to memory of 1808 2044 Jl8SY93.exe 6iK5kO2.exe PID 1436 wrote to memory of 628 1436 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe 7bL8aq67.exe PID 1436 wrote to memory of 628 1436 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe 7bL8aq67.exe PID 1436 wrote to memory of 628 1436 7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe 7bL8aq67.exe PID 3384 wrote to memory of 1788 3384 47F1.exe PID 3384 wrote to memory of 1788 3384 47F1.exe PID 3384 wrote to memory of 1788 3384 47F1.exe PID 3384 wrote to memory of 4324 3384 5F72.exe PID 3384 wrote to memory of 4324 3384 5F72.exe PID 3384 wrote to memory of 4324 3384 5F72.exe -
outlook_office_path 1 IoCs
Processes:
4IQ909YE.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4IQ909YE.exe -
outlook_win_path 1 IoCs
Processes:
4IQ909YE.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4IQ909YE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe"C:\Users\Admin\AppData\Local\Temp\7faa55e48d960f35296cfd917d2070c21a3967f5f8ace1d761ce888bda5fbc59.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jl8SY93.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jl8SY93.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4IQ909YE.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4IQ909YE.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 30004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6iK5kO2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6iK5kO2.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 10044⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL8aq67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL8aq67.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2056 -ip 20561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1808 -ip 18081⤵
-
C:\Users\Admin\AppData\Local\Temp\47F1.exeC:\Users\Admin\AppData\Local\Temp\47F1.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\5F72.exeC:\Users\Admin\AppData\Local\Temp\5F72.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 3284⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-BQ5F5.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-BQ5F5.tmp\tuc4.tmp" /SL5="$5005A,7884275,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 234⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 235⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -i4⤵
-
C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe"C:\Program Files (x86)\DataPumpCRT\datapumpcrt.exe" -s4⤵
-
C:\Users\Admin\AppData\Local\Temp\etopt.exe"C:\Users\Admin\AppData\Local\Temp\etopt.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\nsw6DEB.tmp.exeC:\Users\Admin\AppData\Local\Temp\nsw6DEB.tmp.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3160 -ip 31601⤵
-
C:\Users\Admin\AppData\Local\Temp\7D0D.exeC:\Users\Admin\AppData\Local\Temp\7D0D.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C90B.bat" "1⤵
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 11⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CBBB.bat" "1⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\E82E.exeC:\Users\Admin\AppData\Local\Temp\E82E.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\E82E.exeC:\Users\Admin\AppData\Local\Temp\E82E.exe2⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e9125904-2448-459a-978c-32813e5e414a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\E82E.exe"C:\Users\Admin\AppData\Local\Temp\E82E.exe" --Admin IsNotAutoStart IsNotTask3⤵
-
C:\Users\Admin\AppData\Local\Temp\E82E.exe"C:\Users\Admin\AppData\Local\Temp\E82E.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 5685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3332 -ip 33321⤵
-
C:\Users\Admin\AppData\Local\Temp\2864.exeC:\Users\Admin\AppData\Local\Temp\2864.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3C2C.exeC:\Users\Admin\AppData\Local\Temp\3C2C.exe1⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
1.4MB
MD5ba6ba144d6fa913727236a0e0d7e358f
SHA198784bdc93dc247480eedb5c54e87a3de3b64ffa
SHA25613967392184076eb7684a76d90b7c8f5f28645e8e1ba78eb72e821811a8d0417
SHA5123eade887ba8822f46948d1ca3515a5d22935a4b14355a89a2e627a3a52932589e09b404f6e9ef6a6312a7594be5b7eb609ed24e8976fdb9320332afccfc55bb6
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
92KB
MD530ecdc165ace5b70f8a22d92adb18c3f
SHA1c67d61ad12c1be5f054d3d77dc64b9086edb48ca
SHA25635743c2d007d7764c122dfa756505f3c26cf679c865de58ec7e2f5b9b8a0282b
SHA512152726f17bbe62d0767267d48d81a15131d54b998b29ebbcb651e2395639ff392135f773fd39950d75e30d3843ddce8118c7388a9df355be30cb359f505dbe74
-
C:\Users\Admin\AppData\Local\Temp\47F1.exeFilesize
2.1MB
MD5dd818f1485af9cfa3d74e9670c50d38e
SHA147919fc40db965174fc0acd766a7c4c19beb7fcf
SHA256ed4e6f0d2337e7b1072ef53e0050ce84b0cc462499133acbd79e7dd2daab000c
SHA512951f409127eea9f6d82c648cfd9610b6b90ee2067999ce7e1fc7d8520ba1d37ccc7ab1bf2a2e4e62b34c6eb37e40164267d3570be1e3a4856f2ad3a1df1b68c7
-
C:\Users\Admin\AppData\Local\Temp\47F1.exeFilesize
1.5MB
MD5d98ad0014ca1be4ca0d85050f290dbec
SHA1e4f00b24c1e7f78f4430b84732bc0a5c3a0df8bb
SHA256bdac8abcea52c465c9d1b47bc283ccd7b5b083c218d952110c9f0d021e464f44
SHA5122cefce7cd10579ca87b622a162ab6353c8a623b133912195db40d3ba42aa07f8803717619112156c77beeca6eb4aa049b7ff07fa0dd1c8a7466dc4084b054c35
-
C:\Users\Admin\AppData\Local\Temp\5F72.exeFilesize
2.5MB
MD5eea20494fcf67e4d95d38e63269530ac
SHA138e0a8f4162289440d6eb95aa884b93862790ab9
SHA256b8705493926787134ba5b133a375cc31141b46918777f9105b6e166eddef2034
SHA512988e820ae39edf07f1f8884f5c5a7f786ece73c368832eb546856091ad132a8e8a1ea15fc26ee9476d116e992c0a08a7662560a65b04e38fc7311784f7cb1538
-
C:\Users\Admin\AppData\Local\Temp\5F72.exeFilesize
1.4MB
MD529ad4bbb6878e4ae9e86f96d787a4d2a
SHA143491d5fb05dcafefbb7ec33fe3215f66aa02eb7
SHA256c0c3357f225ecf38bd77980dda3cfd617cdcc8b7580d67ddc18953378b1e2839
SHA51273df42acefcd66ed5c3324c6a3c831d02531202e5e943a280e36a83cb56f7c1679e01966f1fcffc7407db089a050f2cde5bae61826821f6d51ec9a61c446b6c3
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL8aq67.exeFilesize
38KB
MD58e747912a78fe6a52557bbb1c9460b7f
SHA1adf272c9ab78d35ed95e1ca9ade5bcb6e7d6282c
SHA256d53e2a9fce4b9994f4f6daccf4887fac0fcb2964d3d7575ec4829006bafa3ff5
SHA512cabfc048aa9e072326070bc10a044b794ababd7613d57ff797123bd05f54d08b04913d6f23f3283b6d6731d8baa30cba9d8ac0d9d6f1cc41f3ba88a64ac5f2bc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jl8SY93.exeFilesize
1.9MB
MD5cee5de19d672a855630b8ad8019d5e60
SHA139c084e2901d3aeddab3aaf51947557a234014fc
SHA256ef4d5dd82c521bfe741b0782bb9f32081a518a485e5cf06ef67e108caa0c57fe
SHA51204a4238bec8d5ff4ea080bef0df60da398087dd72c982b165f585c8f47519a632ef582a2ec91283469fc586b97ae100c7fe13c067d1357dff01ecad0074386e2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4IQ909YE.exeFilesize
1.5MB
MD5c2111e61e7ba399ef043c265c4215de2
SHA1a7c1289cf1e2ae758d8c1ef409a9b4b8a468da1a
SHA256606bc55fad2b4b1ec117c8df11571f153ac95736e6fcfa8dd8874d88eaa1a48b
SHA5129f972eb5a7725507cef4d8a597d2872466a0883ef58d3c2cf1f5e59379129e9531978c73d1cf07ad47d7877f874af8486e182778b1d3acfbebba60bfb21509de
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6iK5kO2.exeFilesize
448KB
MD5700a9938d0fcff91df12cbefe7435c88
SHA1f1f661f00b19007a5355a982677761e5cf14a2c4
SHA256946583a0803167de24c7c0d768fe49546108e43500a1c2c838e7e0560addc818
SHA5127fa6b52d10bcfc56ac4a43eda11ae107347ba302cc5a29c446b2d4a3f93425db486ed24a496a8acd87d98d9cfb8cad6505eb0d8d5d509bc323427b6931c8fff8
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exeFilesize
833KB
MD510310214edbf3f8903ad96e0d954ab4c
SHA1c1a17833aa8f2735528bf32656740c8e69817d0a
SHA25604437bcf560930e7cd08bdfd8278d53873f531c85f507210b0b1c25d40c4242f
SHA512938fda85cdfa61c92c2923012fab91a21f5dc19a92b48e3c8bb0b7897066c96499ac0e5c440d9830c889e5488d4468670498f63d3aa2aaecdf8340e43f123724
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exeFilesize
2.2MB
MD531f42479194700f598c22ea83fa196c1
SHA10552ca7766283d7add7c06312ecb5e858d3a2ea0
SHA256098b76a1d654efe963b1d6167dc77d34627b8488d742c49bfb70e8d70b1755a7
SHA512afc83e94dc92453312a4d24193b0d3c17cf37644a5cf25b2c934f27d58968c41a5b176de12c2c5c5c8c1d2fbdb57d235a5073fe304f6b12e11a40e2cb52ee836
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exeFilesize
92KB
MD53d4e9c6b7c72ef640574cec0a0d63437
SHA1ae6b23512affb5f2cfbcb81b46c5d6bc0cf0d533
SHA256f43588d137f5daf9aac7e1ec4670217854c6849056522621a641f9cdbb2c0877
SHA5120d3b49e38c64f3ed9a6a14b4940f4e6746cd3e69cf2020f14a676ec99cf4d62256d291a1648e9c43ec4f88dd218ca34df1522dd0174ad873016a6033a48d3e83
-
C:\Users\Admin\AppData\Local\Temp\tempAVSUkvRHym8zk4r\RhQG2vzypzU8Web DataFilesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Local\Temp\tempAVSUkvRHym8zk4r\juZEOqvYBehrWeb DataFilesize
92KB
MD502687bdd724237480b7a9065aa27a3ce
SHA1585f0b1772fdab19ff1c669ff71cb33ed4e5589c
SHA2569a535a05e405b789e9fdaf7eaf38e8673e4d0a8bd83768e72992282a69327d89
SHA512f8ce4f6ad7211cbd17ba0cb574ac8f292727709479e059f4429a818d3b74dbe75d6e6f8cb5576b6bc7e3c1bd0b471127f0ddb38e816fad8aa44a77c15de7e6df
-
C:\Users\Admin\AppData\Local\Temp\tempAVSUkvRHym8zk4r\sqlite3.dllFilesize
791KB
MD50fe0a178f711b623a8897e4b0bb040d1
SHA101ea412aeab3d331f825d93d7ee1f5fa6d3c46e6
SHA2560c7cd52abdb6eb3e556d81caac398a127495e4a251ef600e6505a81385a1982d
SHA5126c53c489c4464b9dc9a5dd31c48bb4afa65f7d6df9cc71e705cea2074ebd5e249cad4894eac6f6b308b3574633bc6e1706dfc5fda5f46c27f1e37d21e65fbc54
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exeFilesize
283KB
MD52d24e3baa2a16e47bee10e91381e6391
SHA1013b59b2cd69e93694196dfb34fddc8684cfd619
SHA256ff2e975c649d66476c48ac9fe64455eb0727fede676d000728d09d62d2dc6db4
SHA512be515895b29390e1c9c44620f7b18c8ae57d08627b8bbf7484b551ccf079011f95baa78e71c1a2a6280b544dd06444b509b7c9ba126b525d813afd68010b03e7
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exeFilesize
92KB
MD534a8ce442674425ae01d01e7f4c88bcb
SHA1d7d30970aa75ce1271402a0adae465fe1f9995c9
SHA2567a084687df35c670ce06698e719664a55198c43660d47fc8fb16afda7ac59062
SHA5129ddecb5b6827a1aff9682cc442d03a9a711dadf2325a4e3044eb3e8b3b465f0bfbf61b916408da1cc84585185c2794a80d1c636a7646441ed2f104fea6386ea3
-
memory/348-173-0x00000000005B0000-0x00000000005B9000-memory.dmpFilesize
36KB
-
memory/348-171-0x0000000000660000-0x0000000000760000-memory.dmpFilesize
1024KB
-
memory/628-106-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/628-108-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/744-178-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/744-399-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/940-294-0x0000000003040000-0x0000000003041000-memory.dmpFilesize
4KB
-
memory/940-282-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/940-331-0x0000000004340000-0x0000000004F68000-memory.dmpFilesize
12.2MB
-
memory/940-349-0x0000000003080000-0x00000000030BA000-memory.dmpFilesize
232KB
-
memory/1028-401-0x00000000009B0000-0x00000000009CC000-memory.dmpFilesize
112KB
-
memory/1028-605-0x0000000000400000-0x0000000000851000-memory.dmpFilesize
4.3MB
-
memory/1028-400-0x0000000000BB0000-0x0000000000CB0000-memory.dmpFilesize
1024KB
-
memory/1028-528-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/1028-402-0x0000000000400000-0x0000000000851000-memory.dmpFilesize
4.3MB
-
memory/1256-449-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1256-452-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/1336-682-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/1464-750-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/1788-117-0x0000000004DD0000-0x0000000004E6C000-memory.dmpFilesize
624KB
-
memory/1788-116-0x00000000000F0000-0x00000000004B6000-memory.dmpFilesize
3.8MB
-
memory/1788-115-0x00000000745C0000-0x0000000074D70000-memory.dmpFilesize
7.7MB
-
memory/1788-211-0x00000000745C0000-0x0000000074D70000-memory.dmpFilesize
7.7MB
-
memory/1808-100-0x0000000000400000-0x0000000000892000-memory.dmpFilesize
4.6MB
-
memory/1808-101-0x0000000000400000-0x0000000000892000-memory.dmpFilesize
4.6MB
-
memory/1808-98-0x0000000000B20000-0x0000000000C20000-memory.dmpFilesize
1024KB
-
memory/1808-99-0x0000000002500000-0x000000000257C000-memory.dmpFilesize
496KB
-
memory/1808-102-0x0000000002500000-0x000000000257C000-memory.dmpFilesize
496KB
-
memory/1832-283-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/1832-502-0x0000000000400000-0x00000000004BC000-memory.dmpFilesize
752KB
-
memory/2056-93-0x0000000000920000-0x0000000000D7E000-memory.dmpFilesize
4.4MB
-
memory/2056-30-0x000000000B300000-0x000000000B654000-memory.dmpFilesize
3.3MB
-
memory/2056-85-0x000000000AC80000-0x000000000ACE6000-memory.dmpFilesize
408KB
-
memory/2056-29-0x000000000AB80000-0x000000000AB9E000-memory.dmpFilesize
120KB
-
memory/2056-16-0x0000000008F10000-0x0000000008F86000-memory.dmpFilesize
472KB
-
memory/2056-15-0x0000000000920000-0x0000000000D7E000-memory.dmpFilesize
4.4MB
-
memory/2056-14-0x0000000000920000-0x0000000000D7E000-memory.dmpFilesize
4.4MB
-
memory/2464-364-0x0000000004B50000-0x0000000004B86000-memory.dmpFilesize
216KB
-
memory/2464-424-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/2464-385-0x0000000005C20000-0x0000000005F74000-memory.dmpFilesize
3.3MB
-
memory/2464-372-0x0000000005290000-0x00000000058B8000-memory.dmpFilesize
6.2MB
-
memory/2464-386-0x0000000006120000-0x000000000613E000-memory.dmpFilesize
120KB
-
memory/2464-387-0x00000000061E0000-0x000000000622C000-memory.dmpFilesize
304KB
-
memory/2464-375-0x0000000005A40000-0x0000000005AA6000-memory.dmpFilesize
408KB
-
memory/2464-365-0x00000000745C0000-0x0000000074D70000-memory.dmpFilesize
7.7MB
-
memory/2464-374-0x0000000005250000-0x0000000005272000-memory.dmpFilesize
136KB
-
memory/2464-373-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/2464-391-0x00000000072A0000-0x00000000072E4000-memory.dmpFilesize
272KB
-
memory/2464-370-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/2464-437-0x00000000078B0000-0x00000000078B8000-memory.dmpFilesize
32KB
-
memory/2464-436-0x0000000007960000-0x000000000797A000-memory.dmpFilesize
104KB
-
memory/2464-403-0x0000000007B40000-0x00000000081BA000-memory.dmpFilesize
6.5MB
-
memory/2464-404-0x00000000074F0000-0x000000000750A000-memory.dmpFilesize
104KB
-
memory/2464-435-0x0000000007870000-0x0000000007884000-memory.dmpFilesize
80KB
-
memory/2464-405-0x00000000076B0000-0x00000000076E2000-memory.dmpFilesize
200KB
-
memory/2464-407-0x00000000717E0000-0x000000007182C000-memory.dmpFilesize
304KB
-
memory/2464-419-0x00000000076F0000-0x000000000770E000-memory.dmpFilesize
120KB
-
memory/2464-406-0x000000007F0D0000-0x000000007F0E0000-memory.dmpFilesize
64KB
-
memory/2464-434-0x0000000007860000-0x000000000786E000-memory.dmpFilesize
56KB
-
memory/2464-425-0x0000000007800000-0x000000000780A000-memory.dmpFilesize
40KB
-
memory/2464-427-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/2464-409-0x0000000070C30000-0x0000000070F84000-memory.dmpFilesize
3.3MB
-
memory/2464-428-0x00000000078C0000-0x0000000007956000-memory.dmpFilesize
600KB
-
memory/2464-429-0x0000000007820000-0x0000000007831000-memory.dmpFilesize
68KB
-
memory/2464-423-0x0000000007710000-0x00000000077B3000-memory.dmpFilesize
652KB
-
memory/3160-432-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3160-181-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3160-176-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3212-421-0x0000000002AF0000-0x0000000002EEC000-memory.dmpFilesize
4.0MB
-
memory/3212-261-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3212-193-0x0000000002EF0000-0x00000000037DB000-memory.dmpFilesize
8.9MB
-
memory/3212-189-0x0000000002AF0000-0x0000000002EEC000-memory.dmpFilesize
4.0MB
-
memory/3212-426-0x0000000002EF0000-0x00000000037DB000-memory.dmpFilesize
8.9MB
-
memory/3212-500-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/3244-459-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/3244-446-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/3256-499-0x0000000000400000-0x0000000000965000-memory.dmpFilesize
5.4MB
-
memory/3256-161-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/3256-371-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB
-
memory/3384-107-0x0000000003250000-0x0000000003266000-memory.dmpFilesize
88KB
-
memory/3384-408-0x0000000007D90000-0x0000000007DA6000-memory.dmpFilesize
88KB
-
memory/3896-450-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/3896-444-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/4324-123-0x0000000000E20000-0x00000000020FE000-memory.dmpFilesize
18.9MB
-
memory/4324-122-0x00000000745C0000-0x0000000074D70000-memory.dmpFilesize
7.7MB
-
memory/4324-249-0x00000000745C0000-0x0000000074D70000-memory.dmpFilesize
7.7MB
-
memory/4812-680-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB