Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
f44d23b0b845ca4388424f9d5be32890.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f44d23b0b845ca4388424f9d5be32890.exe
Resource
win10v2004-20240226-en
General
-
Target
f44d23b0b845ca4388424f9d5be32890.exe
-
Size
283KB
-
MD5
f44d23b0b845ca4388424f9d5be32890
-
SHA1
d46eac4684455e34a396eba79ddb01441359ebb6
-
SHA256
067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46
-
SHA512
a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede
-
SSDEEP
3072:c+tpp4K1PAppyBA1Q8EkKXU1iKL4i2Dva2ICXIIKcKU1KpVT/wV9tmX3m:cud14pEWC5/Hi2KCY5mUpVTEy
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://kamsmad.com/tmp/index.php
http://souzhensil.ru/tmp/index.php
http://teplokub.com.ua/tmp/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
20.218.68.91:7690
Extracted
lumma
https://resergvearyinitiani.shop/api
https://associationokeo.shop/api
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exef44d23b0b845ca4388424f9d5be32890.exeschtasks.exedescription ioc pid Process 4648 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe 528 schtasks.exe -
Glupteba payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2616-318-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4268-150-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
explorgu.exe9404.exeA26A.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9404.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ A26A.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid Process 92 4944 rundll32.exe 95 1984 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 2072 netsh.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorgu.exe9404.exeA26A.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9404.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9404.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion A26A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion A26A.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
InstallSetup_four.exeexplorgu.exe6C36.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation InstallSetup_four.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 6C36.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3448 -
Executes dropped EXE 21 IoCs
Processes:
A26A.exeA76C.exeD2A5.exeD2A5.exeexplorgu.exeosminog.exegoldprime123.exe6C36.exe71B5.exeInstallSetup_four.exe288c47bbc1871b439df19ff4df68f076.exe71B5.tmpemailboxorganizer.exeemailboxorganizer.exe9404.exeu1lk.0.exeA74E.exeu1lk.1.exe288c47bbc1871b439df19ff4df68f076.execsrss.exeinjector.exepid Process 828 A26A.exe 4920 A76C.exe 2004 D2A5.exe 4940 D2A5.exe 5096 explorgu.exe 924 osminog.exe 436 goldprime123.exe 2252 6C36.exe 1640 71B5.exe 2072 InstallSetup_four.exe 2616 288c47bbc1871b439df19ff4df68f076.exe 3340 71B5.tmp 1164 emailboxorganizer.exe 4936 emailboxorganizer.exe 5032 9404.exe 852 u1lk.0.exe 3108 A74E.exe 4128 u1lk.1.exe 4692 288c47bbc1871b439df19ff4df68f076.exe 4452 csrss.exe 4984 injector.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
A26A.exeexplorgu.exe9404.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Wine A26A.exe Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Wine 9404.exe -
Loads dropped DLL 6 IoCs
Processes:
regsvr32.exeD2A5.exerundll32.exerundll32.exe71B5.tmprundll32.exepid Process 2792 regsvr32.exe 4940 D2A5.exe 4284 rundll32.exe 4944 rundll32.exe 3340 71B5.tmp 1984 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4940-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4940-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4940-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4940-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4940-60-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4940-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/files/0x000700000002325f-394.dat upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
D2A5.exe288c47bbc1871b439df19ff4df68f076.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" D2A5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
A76C.exedescription ioc Process File opened for modification \??\PHYSICALDRIVE0 A76C.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
A26A.exeexplorgu.exe9404.exepid Process 828 A26A.exe 5096 explorgu.exe 5032 9404.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
D2A5.exeosminog.exegoldprime123.exedescription pid Process procid_target PID 2004 set thread context of 4940 2004 D2A5.exe 106 PID 924 set thread context of 2836 924 osminog.exe 114 PID 436 set thread context of 4268 436 goldprime123.exe 115 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 3 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exeA26A.exedescription ioc Process File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\Tasks\explorgu.job A26A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3304 2072 WerFault.exe 122 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
A74E.exef44d23b0b845ca4388424f9d5be32890.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A74E.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A74E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f44d23b0b845ca4388424f9d5be32890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A74E.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1lk.0.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1lk.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1lk.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 528 schtasks.exe 4648 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f44d23b0b845ca4388424f9d5be32890.exepid Process 3916 f44d23b0b845ca4388424f9d5be32890.exe 3916 f44d23b0b845ca4388424f9d5be32890.exe 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 3448 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
f44d23b0b845ca4388424f9d5be32890.exeA74E.exepid Process 3916 f44d23b0b845ca4388424f9d5be32890.exe 3108 A74E.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
goldprime123.exepowershell.exeRegAsm.exepowershell.exe288c47bbc1871b439df19ff4df68f076.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 436 goldprime123.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 3876 powershell.exe Token: SeDebugPrivilege 4268 RegAsm.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 3980 powershell.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 2616 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2616 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 3136 powershell.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 2400 powershell.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 2872 powershell.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 2164 powershell.exe Token: SeShutdownPrivilege 3448 Token: SeCreatePagefilePrivilege 3448 Token: SeDebugPrivilege 4472 powershell.exe Token: SeShutdownPrivilege 3448 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
71B5.tmppid Process 3340 71B5.tmp 3448 3448 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u1lk.1.exepid Process 4128 u1lk.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeD2A5.exeexplorgu.exeosminog.exegoldprime123.exerundll32.exerundll32.exe6C36.exedescription pid Process procid_target PID 3448 wrote to memory of 828 3448 99 PID 3448 wrote to memory of 828 3448 99 PID 3448 wrote to memory of 828 3448 99 PID 3448 wrote to memory of 4920 3448 100 PID 3448 wrote to memory of 4920 3448 100 PID 3448 wrote to memory of 4920 3448 100 PID 3448 wrote to memory of 3028 3448 102 PID 3448 wrote to memory of 3028 3448 102 PID 3028 wrote to memory of 2792 3028 regsvr32.exe 103 PID 3028 wrote to memory of 2792 3028 regsvr32.exe 103 PID 3028 wrote to memory of 2792 3028 regsvr32.exe 103 PID 3448 wrote to memory of 2004 3448 105 PID 3448 wrote to memory of 2004 3448 105 PID 3448 wrote to memory of 2004 3448 105 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 2004 wrote to memory of 4940 2004 D2A5.exe 106 PID 5096 wrote to memory of 924 5096 explorgu.exe 108 PID 5096 wrote to memory of 924 5096 explorgu.exe 108 PID 5096 wrote to memory of 924 5096 explorgu.exe 108 PID 5096 wrote to memory of 436 5096 explorgu.exe 110 PID 5096 wrote to memory of 436 5096 explorgu.exe 110 PID 5096 wrote to memory of 436 5096 explorgu.exe 110 PID 924 wrote to memory of 1892 924 osminog.exe 112 PID 924 wrote to memory of 1892 924 osminog.exe 112 PID 924 wrote to memory of 1892 924 osminog.exe 112 PID 924 wrote to memory of 1888 924 osminog.exe 113 PID 924 wrote to memory of 1888 924 osminog.exe 113 PID 924 wrote to memory of 1888 924 osminog.exe 113 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 924 wrote to memory of 2836 924 osminog.exe 114 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 436 wrote to memory of 4268 436 goldprime123.exe 115 PID 5096 wrote to memory of 4284 5096 explorgu.exe 116 PID 5096 wrote to memory of 4284 5096 explorgu.exe 116 PID 5096 wrote to memory of 4284 5096 explorgu.exe 116 PID 4284 wrote to memory of 4944 4284 rundll32.exe 117 PID 4284 wrote to memory of 4944 4284 rundll32.exe 117 PID 4944 wrote to memory of 1804 4944 rundll32.exe 118 PID 4944 wrote to memory of 1804 4944 rundll32.exe 118 PID 3448 wrote to memory of 2252 3448 120 PID 3448 wrote to memory of 2252 3448 120 PID 3448 wrote to memory of 2252 3448 120 PID 4944 wrote to memory of 3876 4944 rundll32.exe 121 PID 4944 wrote to memory of 3876 4944 rundll32.exe 121 PID 2252 wrote to memory of 2072 2252 6C36.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f44d23b0b845ca4388424f9d5be32890.exe"C:\Users\Admin\AppData\Local\Temp\f44d23b0b845ca4388424f9d5be32890.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3916
-
C:\Users\Admin\AppData\Local\Temp\A26A.exeC:\Users\Admin\AppData\Local\Temp\A26A.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:828
-
C:\Users\Admin\AppData\Local\Temp\A76C.exeC:\Users\Admin\AppData\Local\Temp\A76C.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4920
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\B131.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\B131.dll2⤵
- Loads dropped DLL
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\D2A5.exeC:\Users\Admin\AppData\Local\Temp\D2A5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\D2A5.exeC:\Users\Admin\AppData\Local\Temp\D2A5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:1804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\270530367132_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\6C36.exeC:\Users\Admin\AppData\Local\Temp\6C36.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\u1lk.0.exe"C:\Users\Admin\AppData\Local\Temp\u1lk.0.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\u1lk.1.exe"C:\Users\Admin\AppData\Local\Temp\u1lk.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵PID:4600
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:4528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
PID:4648
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 15883⤵
- Program crash
PID:3304
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:1916
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2072
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
PID:4452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
PID:528
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2352
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:4984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\71B5.exeC:\Users\Admin\AppData\Local\Temp\71B5.exe1⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\is-DD05A.tmp\71B5.tmp"C:\Users\Admin\AppData\Local\Temp\is-DD05A.tmp\71B5.tmp" /SL5="$8011A,1714247,56832,C:\Users\Admin\AppData\Local\Temp\71B5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3340 -
C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe"C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe" -i3⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe"C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe" -s3⤵
- Executes dropped EXE
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\9404.exeC:\Users\Admin\AppData\Local\Temp\9404.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5032
-
C:\Users\Admin\AppData\Local\Temp\A74E.exeC:\Users\Admin\AppData\Local\Temp\A74E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2072 -ip 20721⤵PID:3236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5a6f412432fcf05d9111b79301b09beef
SHA1a6f6df51d30617dd16fae3afd0042b01230dfbb7
SHA256cc430f9090c6b76b804364b371efa46ec85943722b452f0cd65793c2aab4ebfa
SHA5120b0fbb49fd6c59a9bd0cd0a4f418dbe7c7bae76ee1bf62b439ee5d1416f7ccdc88f1c0f2acd1e2f1dbc20f5dceff2998100c85953311fbcc8bb4460fd51f3171
-
Filesize
1.8MB
MD58ef043feed945aa688c633cf3946b22d
SHA151acd9b792103e04a810bb8bdd69e338fa75507c
SHA256b3cc4ccd39447f529977e89ae27dfb265a09122bf50be13af52f75e6300b0f3a
SHA51273f37e12285c408cfd568bff29c002143d6f3845992829a3cc29ee5b2b9679100393b0bd8b0ac275b2380fdc7b50e0245f83252ec61e27cfd974a2e8a9009d07
-
Filesize
1.2MB
MD59f86c86e14a6832e5f7519075a5a1739
SHA177db6622bb7605e9c7b9a26dc6af92938453e176
SHA256fda28a12d2f640785e655f8e2c3fdaac8ca69b576ab15ff13c5228b33d63250b
SHA51259ec164cc1015c7c1d1dae79429d499db96aae3e3fd3983e89a09f9c204d9a4a117b1b8c2d26bba03717f671e8c2c4d3621f1135df291013702c1903c035fcc9
-
Filesize
448KB
MD5d97d41ab937f28d0494ef562855bca54
SHA1c251c3699b9fa48f6b98e341db27a17f2de724fd
SHA256ade934c88c28038eeedc30d62f82d99d4670c27568b5fcac2c2f63cc7aff441a
SHA51212f04344a2663e03d6456bd7ec8f219526ae92255e5eb8f6010c3cbd89b9096bc82c7aee380f077f1cdebfb6faf289fc319eb71fb88a0a32f6755cad5c1b9a24
-
Filesize
318KB
MD569c8535d268d104e0b48f04617980371
SHA1a835c367b6f9b9e63605c6e8aaa742f9db7dcf40
SHA2563c74e8c9c3694e4036fea99eb08ba0d3502ad3fe2158432d0efdfaacd9763c35
SHA51293f35aa818391d06c4662796bec0dced2dc7a28b666c5c4bf6a6f68898ed52b77fa2ac7dd031b701b1ab8ae396e8941ade4ef0159765419788034742534a0c9e
-
Filesize
64KB
MD52963fbb109421642b9db85a52b174bff
SHA1fb0e3bb18b352492cd99ffe7a0c20ffc52ac0659
SHA2566501b692d3d471efd9dc995ff5959f47ed72e105b3920482b36e666225f7051c
SHA512312323f3ffcccf9fd6e467795666e5f45df48d275ec0600b82e1f1146e93e3830fbf69be048b69697d5154098dafb0989b5995aea33e685b7f39eb48d2418f31
-
Filesize
555KB
MD5e8947f50909d3fdd0ab558750e139756
SHA1ea4664eb61ddde1b17e3b05e67d5928703a1b6f1
SHA2560b01a984b362772a49cc7e99af1306a2bb00145b03ea8eca7db616c91f6cf445
SHA5127d7f389af526ee2947693983bf4c1cf61064cfe8c75a9708c6e0780b24f5eb261a907eeb6fedfaefcd08d8cddc9afb04c1701b85992456d793b5236a5a981f58
-
Filesize
1.8MB
MD55362a0f2c084029070b5f14c9537c635
SHA1e4ca2e259be387a04ea359d1bf064acdb9bb9c8f
SHA256bafdf87110ae7a53811a6474a8bacf781a02d7cb473e80799a00f0c29bf613cd
SHA512e41358182f2e7bf0af2308b90d31a58272cc0383e36caa61dd07f407f7ec26257ac4800272a57fb5bad4ecec2683eae062eb15192c322b75aa4b0629d3499ee9
-
Filesize
1.3MB
MD573ed54d505b1235091284fd2766578c3
SHA1fd5593cfece10c796c34842f32b02d0f4a333093
SHA256f587969e97c00332d9a44ed8c6f1cb25fffaaabb285df17ff21ed86f2003137b
SHA512aafc0f415108bd8d3ebb8da2f5cdfbb899e13e95281c3523f1534ba587276c0a99c853a35ac29da3b8e81ec72a71e9d645d2b6bb3ed24de08859822f113fc119
-
Filesize
1.1MB
MD5a364cf0aebf8819d767277d4da81b1ca
SHA12692be08767f57fe2d73f450a42c37ab5b648ad0
SHA256a6d8b2e2ecb7891a561d3b961e8da8f85e9752e7f5a7caddc84a3ce49797448e
SHA51207401ac82955911d5306394652eb5a9cfa6f8e88286dd59049fb5ad5980bb739b3b1bb65e4acd3c2cd2597e81ff583800abc7637eb17458a6bdc8acaef1e21a0
-
Filesize
4.1MB
MD5b869cd2b17a48a042c543f97b5ff7e2f
SHA1325559575cdba97275743c3077be2780b20e8558
SHA25630487d60a6dc7d5a6da51e624ae8586c9906547fff22ba533df1b53a4ad94728
SHA5121706d77d8dd3ead8a1da0f58daaba8737cdccf4563fdc98878d5922f6b0f0ce78d3176e2233380a3942b671146b2d9fa7d4d504ced6d5e17c27e8b5033a018d6
-
Filesize
2.6MB
MD5c63047bd54d6fe5f1e767bdd972d5632
SHA18b735fe171834d13ee767b48d23f9f25c6d365fd
SHA2561b11737404b8c0327069d9e2c5d85ab89d15bbed4b0643a473c461740cd95d87
SHA512c30d5993bd553df1296f929d5589a045406e9f493597e128059cc8ed303165a1972ae37d787dad57e35f9932898359cb8bdd92fd9718f370fcf0c65041589439
-
Filesize
2.6MB
MD5bf8fd3b864f132ab72858bd29cc32345
SHA11bf4938f2a89badab1772f213b91a7d5a00a3a95
SHA256886dba28612a64d8294f485718623bb3a4adc4e981b87e9904cac27f853ef7e4
SHA5123f8675a54725e2a25e81e105564d2773f73610425719c0de2daa6cdbf6c22ccf11b32e8e94634589c9d92817326cdadfc627f86b1e1419efa94f91fdc9144c58
-
Filesize
2.3MB
MD5b99c489a0874bfdba4ec9ad3e223a57d
SHA11400a01df4e2fe6875aaf8dcbfaa7b788ee3696c
SHA2564fb82c8b2c2d28e3128f5be83df6ba74c22c41708e486cc03d55d96ba3e817d0
SHA5120afdc5b192ac39b384ea14de2857b676d705833846e1298c453de587be908450b24c098fef3a254a2679ddd453719c959b09b7fa9db87879e203806f6302fa53
-
Filesize
1.9MB
MD53382cac53272ce4d00b106f99b8d226b
SHA1de6ab208cbb8712b6eb634c32a15c4dba496cb9e
SHA25681e3171f398298da0f6975a646f71a754483b0518c43810e6b61eda121207baa
SHA5129cee3238dfb867c26a7445f20ee7782ff26dd27246023e480095cebec5634ba0269087eed60f41678ada6415e329bfcfb2a2a0454c2e429f1ef20c5b61aaf10e
-
Filesize
2.0MB
MD5e8b5e79bfcf6676adbad4b286df73d89
SHA19ee8ef9956a6a6f25cc887f442a597cca2a61575
SHA256985e179ac7076905f3c0e12c02399feb49d450c6d4d701ff4fd364de2eb38b77
SHA512a9a8aff7e1f065b2270d04061fc58c52564e574246bcb63b9e7d9475a59b70e956222d975326c63d897a6b41d332185ae56fe5f04d79331865792d965ebf020b
-
Filesize
704KB
MD52e129938dd42805040aafe12a4edcff0
SHA1c2d12f7f8a37c5a6307d83d9a09615c8426f2b8a
SHA2562862f184cf62d24a2a2610222e19db4d9f68ff9afd166a6fd39217cf51c1fea9
SHA512376042b640ab9f473e649b034ee404fe77d45fb9131a64e77f7557bc8ec629064c8850fda251632c766cf58cac98d4ac2e5800046dba53f27f4b60b6cd1acd04
-
Filesize
1.2MB
MD5868e7641b3369342a316f816ef2ef5dd
SHA1842e75b0d23f12ca65b7336ecc2e6d86e0b6702b
SHA2560d5cdd39cb846a8b4f60db61bde59adc75d8d28b8174e6595f27bcf6a23babff
SHA512c6fc1a2b84287bfd84b36bc6380a20323a9932b7b4e2b1289820864a33467db7946681db9698a7aa04a20a12db59d01e68ab199a5ab43dbf0c5a840e72da925d
-
Filesize
1.8MB
MD53bf261c0a00e880ee85c3e5d53f46e1e
SHA10e22830cd59a76ba4e7da643d1a4054deea4c7e5
SHA256d0f4716356c11256ce372336dee85883a2696134f28b7b123e6fb76a6bf7fa3a
SHA512538243d1b37f2b74c3fa5ab2d04ca379f743b758c268f11b5b16e2797427b3029ecf54896b9b5c0e67a7ae0c0de0c29cdb1f7f6ebb54aa059a4b1f3fbcab0d55
-
Filesize
283KB
MD566901f8020ccd8b99cb1000ba1b12644
SHA1852615fdbcc56969a83c66964fc98fb1a4970313
SHA256209308a7011b49365b1e6172b040a0ee3a0c56706ad9ab62f94537091a8d9b83
SHA512aa2263357c27b2973a500495c005b9e6ca5efb0e6df2018db131906af233a7a4f41cfc1fe37422d1180f5934bc379b20f362f0197967d7c48c648731aaa07194
-
Filesize
554KB
MD5a1b5ee1b9649ab629a7ac257e2392f8d
SHA1dc1b14b6d57589440fb3021c9e06a3e3191968dc
SHA2562bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65
SHA51250ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b
-
Filesize
2.8MB
MD5b0fb18cfcac1983582e7fd67b2843ce8
SHA1ca29cf7cee80be38c5d667d5e8c00e6ea11b3294
SHA2564132c2587cfe85b944d95835d8d0bf92a08a0f831ea26a45c826146048347f45
SHA5124d9e1b14ef1a8adc15d38846c0a4e1d762e76fd944c76621ef6ac3a8482d14e40cfd4d7a14853d7a99cca2a99aa438eba996e842f1172f5f9a8f34ba1d97daf9
-
Filesize
2.5MB
MD5d9b5c7a308bf08b3591530a4300e99a4
SHA1632a46d19f626826a9d9c9ff681fd5023788b600
SHA256f61f23af4d4ff1992af7014c4d66ee84d638eab8d96e6cd2679a23908b68757c
SHA5126454cbe1e1f1492be4b1a1ae49a7c460bbfc26fc0d52742febd31102fa19ce3c0406fe4c501103949ffc343cb111ae4e2d95b00669c8147cdab68aee294863d2
-
Filesize
1024KB
MD500839fca0325f7a370700a5c31609312
SHA1965404242c2790255367af086411a17a4191df99
SHA2564960a71016af937d794e0ffae50d00e4cd807b7ba42e7957d774f655a7b2de2b
SHA5126a7234675fc32a7b52d17c61cef21cd3f6bb8827ebb8e9578fa15c48a5a1bf0a588c161b4aa6b7766461e230b83ef77d2fa4d17df5dcbb22f5d3b9ac0fc13c3b
-
Filesize
1.4MB
MD51ba929001f7c19ece2084485c306cac1
SHA15cb85947ddbd73b1b0e893b9c3df5e6f6ac562ea
SHA256a7b094f34eca754acbde6cb1112ec13a8718b585900f87e68cd1d2b0c41253ef
SHA51242b1ac766c08316118f21b23edb7d18cca77ed868b8f14724c99be2b8a1060542ec25f0d0b778f406e40787719413e0c5e7e9e50ac184a7973f23c771341aa9f
-
Filesize
1.8MB
MD5996c2b1fb60f980ea6618aeefbe4cebf
SHA1a8553f7f723132a1d35f7a57cae1a2e267cbc2ac
SHA256f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50
SHA5124af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056
-
Filesize
331KB
MD54d07092a87d4212cd8b2bf4d7576c1a0
SHA1bf5fe8140ff117b171efda94b25a5cd52e6c276d
SHA256c659350d81f9bed61a7c300cf55ad211230a337a624424c0379f589de2bb20a1
SHA512d1fe5eb758db5a34bd846c08e5240e0473b72b2604b846b5cfefa10c3b2ed7b0e948ccc26fddafa646ee526082b1445454f740767faa7488268082505b144bb4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
690KB
MD54df57aaf92a50f25127408e03415e9ae
SHA18f7670cfae2f405be830c8ec5f06856358d301a1
SHA256d247810adf596b210b373af971bfeeeebea4f574cf2175d87d4899dcfa6e405c
SHA512a2bbb20f3d41b86f01455640c188b2c80d2bf8559ffd335e4cbeac7d70b8d88da3f75432e19a3597ffb79c183c32e1f071f0d259b277caf9173cf60479d312b5
-
Filesize
384KB
MD55949dd8368b9f6b1c2a0df7f759822df
SHA11c2057aef29a43a61d220e56a218da075989d43c
SHA256cb90ef41a6623abe92fdd1ee5f6a2077982470f56c4cf15b825a6f179da0f3ab
SHA5126acbfc35224c1c82bf4faac7f16ce2139d27b965a2b0722de4fc76caec5df6ca59c6ff243b9ee55d530b8ee67bf0ab4b7db69fb12c08f2ba065ce45d637b0d56
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
282KB
MD554e0220b6f9b4f8f64382b71c6033595
SHA11f599189588a7a174a6b8a4587ae0df5c15bdd6f
SHA25647bccced008024236587fbe59d8419a52888f7b50b01cc6c7dc92101a0885607
SHA5120c4e27554ee5a090f8e8e1fa0b901cc5cc90fb6f1a3fb68c4a991096d8ea53a07e452d1ad119b046107deffe34173b21a5ff2f0062b98ae9b23945ea05ad8708
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52b7d7a4bed93489928b2b8165ea263d8
SHA1bc5720e8f7897c141f5ce13de4a98c9c9c32eb03
SHA2568972f18c1ee6447da6764101bf94adaf2fcd0f5b9bf605f113711a5fdb7b57fc
SHA51235ae3663e9444f151ac4375fc0ab2e53673a0ba9995f657d7b9edcba9b26cbc3bf69a7ac62c31d68f7dbdba069a1402c53d39e8c61099320c0add987091addf3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD541f68dd3f615c629735e5113426b861e
SHA15f49a51db4b1c9ec6cf7c71270d7f2362a25ff99
SHA256c61fcef7453d4184cb706cef0aac0f203273050dc01965ecd0f2ba5cb95eb986
SHA5120a7a250615a99e4920afb210926fede70868f5c42c7a78aed44cacbf7333bf8c2402e02acc8afae2e6bd4729339f1f9422a73ce5956d405a3570bc88e8ffb8a5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5145ad7df7d57adee1a7d712919f31c66
SHA1afc2494c83ce3a1dfd12e7bb44054cc76106219e
SHA256e3a4de21fb6900f3ec170a4fa816d7ba896d902956f9743f2a2b81f102461d5e
SHA5125cce5c14f8fb760855592d0bfcd6d0c2b423371b155602592b0c157420327645db0de8a67d7949808a29cf8ebfe0b882061848dedf01b9e7a84e1239b08dd106
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD522b76c491bf4f562d6e47c0b57e1014b
SHA170f2c85c38c4e0fe2ef2d6d2854eb422ae34540a
SHA2567ec2c04d7ee1f790b0773565296d549a8484f1a22f8c29c8ff8b6ce7274972a5
SHA512126daeaa9f25b49c82fd5bf91ef9b1a3d02b00b228d04cab502cee58e8eeab440c34a87cda3bd533887867e0fad5e1b21044b383bb2e135910fb4c41d9497cd8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cfe7df95b564602fae46dc720701b69c
SHA1b1a96f520140af7d7f75844bb48745f3d228f628
SHA25677b587da0519ef9622aec4099dcebaf7ad562eb93857f352bf0dcce724ed5d27
SHA512895f20d3574f36a36e5dc3615b542a3c3661d09ae27e106045138192f15b6e5e836ffd9d5de61c95686ecae220ad7f6d75521fe0ef91e426524687b47cec52a9