Analysis
-
max time kernel
154s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
669bb51bb539eaeb45c9163670d84c84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
669bb51bb539eaeb45c9163670d84c84.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231222-en
General
-
Target
669bb51bb539eaeb45c9163670d84c84.exe
-
Size
3.9MB
-
MD5
669bb51bb539eaeb45c9163670d84c84
-
SHA1
b54d4d19cd239b5ce601df691690419fe66e661e
-
SHA256
6537dc51442beed86b6cf785a5f3f5525aa9bebb25cadd3f38399797adf14259
-
SHA512
a19823991645c724d0fcc36a4245af971a1eaf3909c268adf809a1bc212a6c09f13d2f394dab3c64dafba1504b34eccfd908b8f1f12cc09b31162b3c5766c9f3
-
SSDEEP
49152:9g+VxojDZfHdIX8A/DL/T+Uao5CcD67o31cDhBd8ADzUnrU2Yz0SihIwRHpmLEcZ:yKuhHoNao5CcD67o31KB2EoaUH/xa
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.171/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.185
Extracted
smokeloader
pub5
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
nullmixer
http://hsiens.xyz/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4956-116-0x0000000004A90000-0x0000000004AB2000-memory.dmp family_redline behavioral2/memory/4956-134-0x0000000007810000-0x0000000007830000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4956-116-0x0000000004A90000-0x0000000004AB2000-memory.dmp family_sectoprat behavioral2/memory/4956-134-0x0000000007810000-0x0000000007830000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/3496-100-0x00000000049D0000-0x0000000004A6D000-memory.dmp family_vidar behavioral2/memory/3496-113-0x0000000000400000-0x0000000002D12000-memory.dmp family_vidar behavioral2/memory/3496-179-0x0000000000400000-0x0000000002D12000-memory.dmp family_vidar behavioral2/memory/3496-210-0x00000000049D0000-0x0000000004A6D000-memory.dmp family_vidar behavioral2/memory/3496-220-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x0002000000022775-54.dat aspack_v212_v242 behavioral2/files/0x000b00000002300a-53.dat aspack_v212_v242 behavioral2/files/0x000b00000002300c-59.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 669bb51bb539eaeb45c9163670d84c84.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Wed155a25e62a3deb4.exe -
Executes dropped EXE 15 IoCs
pid Process 1248 setup_installer.exe 4772 setup_install.exe 3160 Wed15251f7879.exe 3128 Wed1595f777e32404.exe 1120 Wed154e8ab94f22a4.exe 4280 Wed155a25e62a3deb4.exe 1020 Wed15156f2613c99fcf8.exe 4956 Wed153a7112ac244.exe 2920 Wed15f94f82567f.exe 1244 Wed157806d79d1e.exe 3496 Wed155467a30a93c1b8a.exe 4376 Wed155a25e62a3deb4.exe 2332 Riconobbe.exe.com 2532 Riconobbe.exe.com 3104 Riconobbe.exe.com -
Loads dropped DLL 5 IoCs
pid Process 4772 setup_install.exe 4772 setup_install.exe 4772 setup_install.exe 4772 setup_install.exe 4772 setup_install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Wed157806d79d1e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 5036 4772 WerFault.exe 90 4004 3496 WerFault.exe 112 1080 3496 WerFault.exe 112 2280 3496 WerFault.exe 112 1640 3496 WerFault.exe 112 4972 3496 WerFault.exe 112 852 3496 WerFault.exe 112 4592 3496 WerFault.exe 112 1724 3496 WerFault.exe 112 4448 3496 WerFault.exe 112 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed15251f7879.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed15251f7879.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed15251f7879.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2900 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3160 Wed15251f7879.exe 3160 Wed15251f7879.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 1448 powershell.exe 1448 powershell.exe 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 1448 powershell.exe 3532 Process not Found -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4880 Process not Found 1896 Process not Found 2016 Process not Found 3372 Process not Found 3292 Process not Found 3752 Process not Found 5060 Process not Found 4532 Process not Found 5028 Process not Found 4568 Process not Found 4436 Process not Found 388 Process not Found 1676 Process not Found 3252 Process not Found 1608 Process not Found 1400 Process not Found 700 Process not Found 4172 Process not Found 4764 Process not Found 3476 Process not Found 1448 Process not Found 4144 Process not Found 212 Process not Found 4804 Process not Found 4004 Process not Found 2224 Process not Found 3188 Process not Found 2464 Process not Found 1456 Process not Found 4524 Process not Found 696 Process not Found 772 Process not Found 4824 Process not Found 3412 Process not Found 3120 Process not Found 2640 Process not Found 4416 Process not Found 2644 Process not Found 2988 Process not Found 1528 Process not Found 776 Process not Found 4392 Process not Found 4776 Process not Found 2024 Process not Found 3200 Process not Found 3800 Process not Found 4848 Process not Found 904 Process not Found 1664 Process not Found 4048 Process not Found 4512 Process not Found 600 Process not Found 4324 Process not Found 1332 Process not Found 396 Process not Found 1164 Process not Found 1200 Process not Found 1092 Process not Found 1236 Process not Found 1404 Process not Found 1592 Process not Found 532 Process not Found 3084 Process not Found 4652 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3160 Wed15251f7879.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1120 Wed154e8ab94f22a4.exe Token: SeDebugPrivilege 3128 Wed1595f777e32404.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeDebugPrivilege 4956 Wed153a7112ac244.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeCreateGlobalPrivilege 4624 dwm.exe Token: SeChangeNotifyPrivilege 4624 dwm.exe Token: 33 4624 dwm.exe Token: SeIncBasePriorityPrivilege 4624 dwm.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeCreateGlobalPrivilege 4264 dwm.exe Token: SeChangeNotifyPrivilege 4264 dwm.exe Token: 33 4264 dwm.exe Token: SeIncBasePriorityPrivilege 4264 dwm.exe Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found Token: SeShutdownPrivilege 3532 Process not Found Token: SeCreatePagefilePrivilege 3532 Process not Found -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2332 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 2332 Riconobbe.exe.com 2332 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 2532 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 2532 Riconobbe.exe.com 2532 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 3104 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 3104 Riconobbe.exe.com 3104 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 2332 Riconobbe.exe.com 2332 Riconobbe.exe.com 2332 Riconobbe.exe.com 2532 Riconobbe.exe.com 2532 Riconobbe.exe.com 2532 Riconobbe.exe.com 3104 Riconobbe.exe.com 3104 Riconobbe.exe.com 3104 Riconobbe.exe.com 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found 3532 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 1248 4620 669bb51bb539eaeb45c9163670d84c84.exe 89 PID 4620 wrote to memory of 1248 4620 669bb51bb539eaeb45c9163670d84c84.exe 89 PID 4620 wrote to memory of 1248 4620 669bb51bb539eaeb45c9163670d84c84.exe 89 PID 1248 wrote to memory of 4772 1248 setup_installer.exe 90 PID 1248 wrote to memory of 4772 1248 setup_installer.exe 90 PID 1248 wrote to memory of 4772 1248 setup_installer.exe 90 PID 4772 wrote to memory of 1712 4772 setup_install.exe 93 PID 4772 wrote to memory of 1712 4772 setup_install.exe 93 PID 4772 wrote to memory of 1712 4772 setup_install.exe 93 PID 4772 wrote to memory of 2816 4772 setup_install.exe 103 PID 4772 wrote to memory of 2816 4772 setup_install.exe 103 PID 4772 wrote to memory of 2816 4772 setup_install.exe 103 PID 4772 wrote to memory of 3756 4772 setup_install.exe 98 PID 4772 wrote to memory of 3756 4772 setup_install.exe 98 PID 4772 wrote to memory of 3756 4772 setup_install.exe 98 PID 4772 wrote to memory of 4140 4772 setup_install.exe 97 PID 4772 wrote to memory of 4140 4772 setup_install.exe 97 PID 4772 wrote to memory of 4140 4772 setup_install.exe 97 PID 4772 wrote to memory of 3060 4772 setup_install.exe 96 PID 4772 wrote to memory of 3060 4772 setup_install.exe 96 PID 4772 wrote to memory of 3060 4772 setup_install.exe 96 PID 4772 wrote to memory of 2520 4772 setup_install.exe 95 PID 4772 wrote to memory of 2520 4772 setup_install.exe 95 PID 4772 wrote to memory of 2520 4772 setup_install.exe 95 PID 4772 wrote to memory of 4976 4772 setup_install.exe 94 PID 4772 wrote to memory of 4976 4772 setup_install.exe 94 PID 4772 wrote to memory of 4976 4772 setup_install.exe 94 PID 4772 wrote to memory of 3964 4772 setup_install.exe 102 PID 4772 wrote to memory of 3964 4772 setup_install.exe 102 PID 4772 wrote to memory of 3964 4772 setup_install.exe 102 PID 4772 wrote to memory of 1804 4772 setup_install.exe 101 PID 4772 wrote to memory of 1804 4772 setup_install.exe 101 PID 4772 wrote to memory of 1804 4772 setup_install.exe 101 PID 4772 wrote to memory of 2844 4772 setup_install.exe 100 PID 4772 wrote to memory of 2844 4772 setup_install.exe 100 PID 4772 wrote to memory of 2844 4772 setup_install.exe 100 PID 3756 wrote to memory of 3160 3756 cmd.exe 105 PID 3756 wrote to memory of 3160 3756 cmd.exe 105 PID 3756 wrote to memory of 3160 3756 cmd.exe 105 PID 1712 wrote to memory of 1448 1712 cmd.exe 104 PID 1712 wrote to memory of 1448 1712 cmd.exe 104 PID 1712 wrote to memory of 1448 1712 cmd.exe 104 PID 3964 wrote to memory of 3128 3964 cmd.exe 106 PID 3964 wrote to memory of 3128 3964 cmd.exe 106 PID 2844 wrote to memory of 1120 2844 cmd.exe 107 PID 2844 wrote to memory of 1120 2844 cmd.exe 107 PID 2816 wrote to memory of 4280 2816 cmd.exe 108 PID 2816 wrote to memory of 4280 2816 cmd.exe 108 PID 2816 wrote to memory of 4280 2816 cmd.exe 108 PID 4140 wrote to memory of 1020 4140 cmd.exe 111 PID 4140 wrote to memory of 1020 4140 cmd.exe 111 PID 2520 wrote to memory of 4956 2520 cmd.exe 109 PID 2520 wrote to memory of 4956 2520 cmd.exe 109 PID 2520 wrote to memory of 4956 2520 cmd.exe 109 PID 4976 wrote to memory of 2920 4976 cmd.exe 110 PID 4976 wrote to memory of 2920 4976 cmd.exe 110 PID 4976 wrote to memory of 2920 4976 cmd.exe 110 PID 1804 wrote to memory of 1244 1804 cmd.exe 113 PID 1804 wrote to memory of 1244 1804 cmd.exe 113 PID 1804 wrote to memory of 1244 1804 cmd.exe 113 PID 3060 wrote to memory of 3496 3060 cmd.exe 112 PID 3060 wrote to memory of 3496 3060 cmd.exe 112 PID 3060 wrote to memory of 3496 3060 cmd.exe 112 PID 4280 wrote to memory of 4376 4280 Wed155a25e62a3deb4.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\669bb51bb539eaeb45c9163670d84c84.exe"C:\Users\Admin\AppData\Local\Temp\669bb51bb539eaeb45c9163670d84c84.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed15f94f82567f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed15f94f82567f.exeWed15f94f82567f.exe5⤵
- Executes dropped EXE
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed153a7112ac244.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed153a7112ac244.exeWed153a7112ac244.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed155467a30a93c1b8a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed155467a30a93c1b8a.exeWed155467a30a93c1b8a.exe5⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 8246⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 8326⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 8766⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 8846⤵
- Program crash
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 10406⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 10726⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 15486⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 15566⤵
- Program crash
PID:1724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 15686⤵
- Program crash
PID:4448
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed15156f2613c99fcf8.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed15156f2613c99fcf8.exeWed15156f2613c99fcf8.exe5⤵
- Executes dropped EXE
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed15251f7879.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed15251f7879.exeWed15251f7879.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed154e8ab94f22a4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed154e8ab94f22a4.exeWed154e8ab94f22a4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed157806d79d1e.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed157806d79d1e.exeWed157806d79d1e.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1244 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:4324
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Del.doc6⤵PID:3872
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:4960
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NZrkFJTgsCdMvCokxiUUxUBYmGUZCyshQzrAfUxHKQBByATJNifzJsTTnyLZOTMjkrVrmIWmMjlEaZSZNkkcPXDmmpwppcSQtfd$" Una.doc8⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comRiconobbe.exe.com H8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Riconobbe.exe.com H10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3104
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping NUPNSVML -n 308⤵
- Runs ping.exe
PID:2900
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed1595f777e32404.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed1595f777e32404.exeWed1595f777e32404.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed155a25e62a3deb4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed155a25e62a3deb4.exeWed155a25e62a3deb4.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed155a25e62a3deb4.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E4B64F7\Wed155a25e62a3deb4.exe" -a6⤵
- Executes dropped EXE
PID:4376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 5644⤵
- Program crash
PID:5036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4772 -ip 47721⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3496 -ip 34961⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3496 -ip 34961⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3496 -ip 34961⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3496 -ip 34961⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3496 -ip 34961⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3496 -ip 34961⤵PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3496 -ip 34961⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3496 -ip 34961⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3496 -ip 34961⤵PID:3256
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2788
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2504
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
135KB
MD5e945895936e176b41974d76b0e879b21
SHA13fd9d9276b74033b1c8b2689552def5fc82ef0fd
SHA2561041326fc137c8291080c6f7f1e180f3d7c51ac99f01a512eea6e34f018377b4
SHA51202d3fcead2c6880527d4a87923ac68a58d0f0f9cf33c410c731ab514b9a5443fc662db2a86eb0efe989a9a2daf15b59f32eba51fab8a7929ce99889870ca39fa
-
Filesize
279KB
MD5af23965c3e2673940b70f436bb45f766
SHA1ccc8b03ea8c568f1b333458cff3f156898fc29f7
SHA256e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503
SHA512f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611
-
Filesize
8KB
MD577c6eb4eb2a045c304ae95ef5bbaa2b2
SHA1eeb4a9ab13957bfafd6e015f65c09ba65b3d699c
SHA2563e35832690fd1115024f918f4bc37e756b1617ae628e55b94f0e04045e57b49b
SHA512e1e7bd4d5a3f80d88b2b0da8b5922fb678b7c63e2e81a37bd01b582c0b5a4d881daaf66a1e2083bbbf0581d42d0eabb8268f9fa5404c3d454fdd68f398d57a87
-
Filesize
529KB
MD54fca50afec28e70724fcbb9eb581c6b5
SHA1ac98c2ca6865fa0ecf66192f4504965d189179cd
SHA256fea6aca8fb47df3789a38508b619ddd48818a081955f53ed7eb67230500d8f29
SHA5120daff8a6a81a8d31e0b51db7a2d430dcf16a7b5c2feb12ea96afa3028f85090bea415f5419c512dc529efe6bcaeb7d243ffe7f01d767b73f7d994929e248f584
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
1.4MB
MD585a4bac92fe4ff5d039c8913ffd612d8
SHA1d639bce7bcef59dfa67d67e4bd136fb1cfba2333
SHA256416264057dcf0e658046aee3665762203640d4c35851afe0962562a15164f26d
SHA5121aca1cb35fa04600038e183bf628872dcefee526334df3f40afe384908baeffb351719bfd2dbd5368fcc4f3641f8575f87a03a828bc68f2ee4741737a6b4a0f6
-
Filesize
106KB
MD503787a29b0f143635273fb2d57224652
SHA1294f3693d41b7f563732c1660d2ce0a53edcae60
SHA256632a80a9deae6512eebcf8b74e93d6f2b92124ebce4e76301c662f36e697a17c
SHA5124141d89abd8139e1d3054dcb0cd3f35a52a40c69aac4d1d2ec785ff6536ecf84a5e688faeb68ba9ed9ed44c0654d4295c6d3641b5286320ee54106b66fbbcecd
-
Filesize
627KB
MD5d06aa46e65c291cbf7d4c8ae047c18c5
SHA1d7ef87b50307c40ffb46460b737ac5157f5829f0
SHA2561cd9a6908f8a5d58487e6cfea76a388a927f1569ba2b2459f25fffaf8180230f
SHA5128d5f6605a38e7c45a44127438bf7d6bf6a54aacb0b67b3669eb9609fc1084145f827a8341ce6b1a544198b5633d9f92561bd9f9cc82b52473db0926787a06ea4
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD575186dd43b55256f06c3df7272ac3d23
SHA16552c5009c53806ce34b55a15d6609aa91e005bd
SHA256c9149e325c582409da636059e3512fbb887116c31857350513bb766017c13398
SHA512ff9f12f39dd26c568f1366daf5a9b16f8fc7be81c68f39ac4de2aee6413295ea5d954578c61ea67fb0916f3b151e6e5d605805cc1a0240d3e26012a70c249ad0
-
Filesize
576KB
MD51384af973876359bac03a3ba409f7e1b
SHA1c5450eb99bd41c2d30bb93220afeb1eb8d277b5d
SHA25669b9e9a21374c1e1a997c7aa038d4d96d59bbf3dc536e3ecfd003c0f5f4412f0
SHA51223c8d072aaedf3ade8e9880e103949d59a0a2af94578f010f7d79b3b9899b18cb5f944104aed951dd2c51f3c08d564fd6b957dfbc155515dfa9bc3e6e37df7f0
-
Filesize
456B
MD5b8f0b475f6d24c00445ee8e41bef5612
SHA100f735fa5c0c62e49911cc1c191594b2a1511a5d
SHA256cead1703b09c656985fe26c7c73917cf3a6217955594f71dcacbf60fd8726c22
SHA5127207d978bc7df278b33952a3c949adb2bb4b75d8186c37c876c17e3b0702aa4a265768fdc2af1e2d4010706fea419400e11c199c8e932a4e40ce68d5d8b8d158
-
Filesize
717KB
MD52ab6043018d45bf4188af3cafb3509b5
SHA185f8865e53882f23ee4eed9936a5541c14c98649
SHA2562cef1a754f1e1d19ac2a62462fe9652d6bb5f2bbe802c1b088d437077396223d
SHA5124dfa91d69ca2be0c1f75a09980479da8262b913deac6a1e0e19b43232393a80559586cf9196c6510ad82140ffdfef28a7e0c6a418a7b905c5be734f82b7c1a7d
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
320KB
MD5061f2b617af3ee73f7b065c2cd169b97
SHA1d9798abdb6aedb4b8593115d7911cbfb32bce4f2
SHA25652772775f9ac9c2dbc6c2e4a8cfb4bbab2f7de1f9ac705a634e78edf2987cacb
SHA512e1dbbc3a58ae6d0765edd5347e5af58635f463aca580e26937b15d048a5863cde05c3e80a35c96bc62a70d44c8b66fdb4d325c849cff676d5fe0ad62676da44c
-
Filesize
128KB
MD55de419f89025ec79495d1815f331a4dc
SHA1ff1165ebd796ba40063b8a2693ac5b4f67aa28e3
SHA25649dda37ef4ff129d2cf2cfe0612bc285f8eb0150a0b1e08b7c6af03cc0a367c7
SHA5125b7f019921aaae24d7f4af1c9e846ec6362cffd61813470d5fc37f2ed1aeccebd02e24258418e1ffb32d79365db6517d30a75d0055a8584037f9f937b1c5e0fa
-
Filesize
634KB
MD5ac4595f867a704aa3ca38ad8789d513b
SHA1eec0c61399b2e6b35f75fffdd20c738346ef31c4
SHA25605a3c52c4875e74f50f71ca5bdeaa5d38214bd594e762d37fb23ac3ac2d3478d
SHA5124526494d217a2ae4874fb80cd9ee586067d16a0cc6f1110a6895db0a8117b7e70f03c70930e1b820c3d02d6805d411c836207551c5f81c09bcc2e932b6a0cd56
-
Filesize
872KB
MD5aa17d9161d079e9fc32141d132085319
SHA185009286b39316f2c42a29c057c02b6b0632735c
SHA2562a67046c63c7c8c4286fa92f199e88993598dfe5229782e0c1de426cb76deee6
SHA512eb599f25c393e18bbeae6030dd27b0a3f6b681f13bf50a3913d7df68ad61c319adb6937b098eb20529bfebcd1ad515b953e7e1ae41c09f5fae0049fa58479363
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.8MB
MD528636401da782ddf74e654e6d946af76
SHA10f080abd03c143f54bb0cbc7ac682b0c828a000c
SHA2563d7ba99d7b360819146cd6223b2d668e8b1a661023f5b36932860bc84271eecd
SHA512ddf9fe38abe2662d77422875607a9dae6a7b949236cb47730754ea69129daabf270df5edde6b3ec31929c394129c389058c81193c573baa3dfa9941bc3e9b298