Analysis
-
max time kernel
163s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe
Resource
win10v2004-20240226-en
General
-
Target
457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe
-
Size
1.5MB
-
MD5
b8a26d9c386ec312fd8470f0b728873d
-
SHA1
7fa5f682d9366c13c1ebfccd8b6c4ab4335ecc88
-
SHA256
457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e
-
SHA512
722d78ff2e3a77030c50b268c84e77339d86044f0c7eae20470d232f14d65c1a58a92889b9eeaa97908d65907d934ffbdda81a2f505ff3309a61b63540e18ee8
-
SSDEEP
24576:myab630MZL5fUEHJspwjRtFwMccpgrCp0tu69yL0FnhVQyNZQ:1abEdZ9fnp44TfcLAevQyNZ
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
homed
109.107.182.133:19084
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023260-37.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3644-52-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 6Tj9qG2.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 5Bu5nb8.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 14 IoCs
pid Process 4136 yR0rS90.exe 1692 cz2ma34.exe 2692 nJ5uI86.exe 3504 NP2Fo34.exe 3016 1ei47FO5.exe 4908 2xf6670.exe 3244 3Sc60zr.exe 3772 4UQ856Vq.exe 1376 5Bu5nb8.exe 4364 explothe.exe 3812 6Tj9qG2.exe 4036 explothe.exe 208 explothe.exe 3652 vcrgwiu -
resource yara_rule behavioral1/files/0x0004000000022d20-76.dat upx behavioral1/memory/3812-78-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/3812-82-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" NP2Fo34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yR0rS90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cz2ma34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nJ5uI86.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3016 set thread context of 1536 3016 1ei47FO5.exe 100 PID 3244 set thread context of 5100 3244 3Sc60zr.exe 104 PID 3772 set thread context of 3644 3772 4UQ856Vq.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4808 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{49F6530E-A7AC-4778-AA6C-A72772767CC5} msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5100 AppLaunch.exe 5100 AppLaunch.exe 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found 3164 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5100 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1536 AppLaunch.exe Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found Token: SeShutdownPrivilege 3164 Process not Found Token: SeCreatePagefilePrivilege 3164 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3164 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4136 4716 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe 95 PID 4716 wrote to memory of 4136 4716 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe 95 PID 4716 wrote to memory of 4136 4716 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe 95 PID 4136 wrote to memory of 1692 4136 yR0rS90.exe 96 PID 4136 wrote to memory of 1692 4136 yR0rS90.exe 96 PID 4136 wrote to memory of 1692 4136 yR0rS90.exe 96 PID 1692 wrote to memory of 2692 1692 cz2ma34.exe 97 PID 1692 wrote to memory of 2692 1692 cz2ma34.exe 97 PID 1692 wrote to memory of 2692 1692 cz2ma34.exe 97 PID 2692 wrote to memory of 3504 2692 nJ5uI86.exe 98 PID 2692 wrote to memory of 3504 2692 nJ5uI86.exe 98 PID 2692 wrote to memory of 3504 2692 nJ5uI86.exe 98 PID 3504 wrote to memory of 3016 3504 NP2Fo34.exe 99 PID 3504 wrote to memory of 3016 3504 NP2Fo34.exe 99 PID 3504 wrote to memory of 3016 3504 NP2Fo34.exe 99 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3016 wrote to memory of 1536 3016 1ei47FO5.exe 100 PID 3504 wrote to memory of 4908 3504 NP2Fo34.exe 101 PID 3504 wrote to memory of 4908 3504 NP2Fo34.exe 101 PID 3504 wrote to memory of 4908 3504 NP2Fo34.exe 101 PID 2692 wrote to memory of 3244 2692 nJ5uI86.exe 102 PID 2692 wrote to memory of 3244 2692 nJ5uI86.exe 102 PID 2692 wrote to memory of 3244 2692 nJ5uI86.exe 102 PID 3244 wrote to memory of 4532 3244 3Sc60zr.exe 103 PID 3244 wrote to memory of 4532 3244 3Sc60zr.exe 103 PID 3244 wrote to memory of 4532 3244 3Sc60zr.exe 103 PID 3244 wrote to memory of 5100 3244 3Sc60zr.exe 104 PID 3244 wrote to memory of 5100 3244 3Sc60zr.exe 104 PID 3244 wrote to memory of 5100 3244 3Sc60zr.exe 104 PID 3244 wrote to memory of 5100 3244 3Sc60zr.exe 104 PID 3244 wrote to memory of 5100 3244 3Sc60zr.exe 104 PID 3244 wrote to memory of 5100 3244 3Sc60zr.exe 104 PID 1692 wrote to memory of 3772 1692 cz2ma34.exe 105 PID 1692 wrote to memory of 3772 1692 cz2ma34.exe 105 PID 1692 wrote to memory of 3772 1692 cz2ma34.exe 105 PID 3772 wrote to memory of 2272 3772 4UQ856Vq.exe 108 PID 3772 wrote to memory of 2272 3772 4UQ856Vq.exe 108 PID 3772 wrote to memory of 2272 3772 4UQ856Vq.exe 108 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 3772 wrote to memory of 3644 3772 4UQ856Vq.exe 109 PID 4136 wrote to memory of 1376 4136 yR0rS90.exe 110 PID 4136 wrote to memory of 1376 4136 yR0rS90.exe 110 PID 4136 wrote to memory of 1376 4136 yR0rS90.exe 110 PID 1376 wrote to memory of 4364 1376 5Bu5nb8.exe 112 PID 1376 wrote to memory of 4364 1376 5Bu5nb8.exe 112 PID 1376 wrote to memory of 4364 1376 5Bu5nb8.exe 112 PID 4716 wrote to memory of 3812 4716 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe 113 PID 4716 wrote to memory of 3812 4716 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe 113 PID 4716 wrote to memory of 3812 4716 457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe 113 PID 4364 wrote to memory of 4808 4364 explothe.exe 114 PID 4364 wrote to memory of 4808 4364 explothe.exe 114 PID 4364 wrote to memory of 4808 4364 explothe.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe"C:\Users\Admin\AppData\Local\Temp\457c1c09953a40ae6f672b1f59c3850869b22e5dcc5932fee87986b64310236e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yR0rS90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yR0rS90.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cz2ma34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cz2ma34.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nJ5uI86.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nJ5uI86.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\NP2Fo34.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\NP2Fo34.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ei47FO5.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ei47FO5.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xf6670.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2xf6670.exe6⤵
- Executes dropped EXE
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Sc60zr.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Sc60zr.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4UQ856Vq.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4UQ856Vq.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Bu5nb8.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5Bu5nb8.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F5⤵
- Creates scheduled task(s)
PID:4808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit5⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"6⤵PID:4668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E6⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"6⤵PID:2448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E6⤵PID:4108
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Tj9qG2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Tj9qG2.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3812 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E961.tmp\E962.tmp\E963.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6Tj9qG2.exe"3⤵PID:3720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login4⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/4⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵PID:3804
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4712 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:2636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=5740 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:1596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5876 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:4296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5676 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:4360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5488 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:11⤵PID:3480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6248 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:3620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6420 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6536 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:2760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6476 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:2696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6740 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:208
-
C:\Users\Admin\AppData\Roaming\vcrgwiuC:\Users\Admin\AppData\Roaming\vcrgwiu1⤵
- Executes dropped EXE
PID:3652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5dec89e5682445d71376896eac0d62d8b
SHA1c5ae3197d3c2faf3dea137719c804ab215022ea6
SHA256c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668
SHA512b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186
-
Filesize
45KB
MD53e1db5a81d291b1fe024f4c86c26b98d
SHA1342de6d9fab3c85aa6b3f20f104dcd34845f32d0
SHA2566c1bada4bd7e760026fa1d36e7028ee36de55d3afe9c9b631537ae4f931391fc
SHA512a049d28b935080609ee0b3a58c2a6e37f615bb5195ca3e77b2019093970e21b99c6c3bb0e622cd1dfa61c4244078a8ce29d4d2ffa98f8475b960b5287fb5e0a0
-
Filesize
1.4MB
MD535c2fb3a3c860b9f76acd792adbff057
SHA1acbb098873a2c46efa35eb25f7c193bcb1f0c90c
SHA256662d229dc3f089e6ff44b630d1cb101adbc706b2fff1f58f5b1a9d7d5654a53f
SHA512d5ae8eebfee094e794fd083fcd4beeab10f9e662041e0ac0f52f8709551de9448c1cbe3e8f11cfad86d4752a79f63cf0bb1dfd1bfb9d8ef34b5c35eaf6cd4f61
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
1.2MB
MD53da1d31bfeb550de5d9feda578a36fcd
SHA180e99b978f6acd12aa3cfc67d8ac6df7da4d32d6
SHA2565a8a0b340354f36382ebe079dcaa96928d0cac4ebab8a67949cbed73dceb93d0
SHA5123cdb6ce8a24951b9b5a0be566f0478a80af6ba4ad195f4fdaca0f9f6f25d3c707d41a69404a85406d6fb18a7fbb2c06624c17e8c7a55076ef1ce73569242f9b3
-
Filesize
1.1MB
MD5408142150615ac9ec9fffa52a667cab7
SHA158e136f41fc5b754b0372e34679f41b4ca931fd9
SHA256693bede9cea5901b6b60bbf4d78c08d00bc9b3a3c06a431f86a3f96f569260a8
SHA5125e28bdbbacc34bcddf37df672fcbfc85f7b165e4eabf2b63fbb0b3eeaf923b6819c9272962835d0af8c6b83ebff9263ecdfc2a42b27624a2c1097fdd323396da
-
Filesize
819KB
MD569fb3b64e2c03370d349df94b925cdbe
SHA1245f12d9f976c61525cd3e07e07e1eec05760be8
SHA256667f36cce8a195f774691764be989aa928f2b46d0784a5391a52db6194493840
SHA512c7bcd2827a07da66cf11734fbd94cd6331ad29bb585306c7a13b1eb9be81a30aebd9e3ef8f459dd7168394e85acd181287080822ab7af0ce0efd12ac0f4285bd
-
Filesize
897KB
MD52e3f17e7e9001ff7b7cf8ab412462a48
SHA12a49c0e715ecd73ccd9d0fcfb21de36cc3ee03ba
SHA256674e07c8188ea9be50a002c9850c7704541b44b35adc7528216dc73dd4a531b8
SHA512d42e8a4801f1c73733b37efb5ae17f321bd5463829ab9283566f38882624e284ff4c7c53b212c35ca53f9de825625a455393012ffbdc0e4caebd178fc716ee27
-
Filesize
458KB
MD5b80b7d29f16f409c10f5737f1c84c48e
SHA12d4f496281f93e18b5e89a362b1aad6cc5dc7909
SHA2566cd448d69295644625810e1127ca819670c33846c8e705f66a4298442ed2e3d0
SHA512de0a8ffae8fcb8d44effb4d3d84e689ed21cab10f98ac6ce8d5a56785b25df006dd12e1b26919f6c8105b452a882b0502c1d540c30fcb7764fce204e35c58ea0
-
Filesize
875KB
MD573d86751a127f28504b4239773c328be
SHA1a7b5a37edc0841e9a269b827bb0bf28ae0d8c330
SHA256e0923f519bbf0f9c43922d26954359eed1c352db6deda6e655f838a44d655030
SHA512464df937ab7ed3a7af81f18d5238019b4268a78dfd8b9d0df6a459c5fd19dfa480c441ce2f20f8b63dcba806e6fc646beaa6b778b52fedee7077739634bad3e0
-
Filesize
180KB
MD50635bc911c5748d71a4aed170173481e
SHA16d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b
SHA256a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1
SHA51250ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc