Analysis Overview
SHA256
d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5
Threat Level: Known bad
The file d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5 was found to be: Known bad.
Malicious Activity Summary
OutSteel
Reads user/profile data of web browsers
Enumerates connected drives
AutoIT Executable
Suspicious use of SetThreadContext
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-10 14:23
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-10 14:23
Reported
2024-04-10 14:26
Platform
win7-20240221-en
Max time kernel
142s
Max time network
146s
Command Line
Signatures
OutSteel
Reads user/profile data of web browsers
Enumerates connected drives
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3000 set thread context of 1664 | N/A | C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe | C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
"C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe"
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A
Network
| Country | Destination | Domain | Proto |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp |
Files
memory/3000-0-0x0000000000200000-0x00000000002BA000-memory.dmp
memory/3000-1-0x00000000744E0000-0x0000000074BCE000-memory.dmp
memory/3000-2-0x0000000004D60000-0x0000000004DA0000-memory.dmp
memory/3000-3-0x0000000000530000-0x0000000000546000-memory.dmp
memory/1664-4-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3000-6-0x00000000744E0000-0x0000000074BCE000-memory.dmp
memory/1664-7-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-8-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-9-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-11-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-15-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-19-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-27-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-31-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-36-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-39-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-43-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-47-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-51-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-59-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-63-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-67-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/1664-81-0x0000000000400000-0x00000000004E2000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-10 14:23
Reported
2024-04-10 14:26
Platform
win10v2004-20240226-en
Max time kernel
139s
Max time network
152s
Command Line
Signatures
OutSteel
Reads user/profile data of web browsers
Enumerates connected drives
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 940 set thread context of 3316 | N/A | C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe | C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
"C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe"
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Users\Admin\AppData\Local\Temp\d6e2a79bc87d48819fabe332dd3539f572605bb6091d34ae7d25ae0934b606b5.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4336 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:8
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 13.107.253.64:443 | tcp | |
| US | 8.8.8.8:53 | 99.58.20.217.in-addr.arpa | udp |
| RU | 45.146.165.91:8080 | tcp | |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp | |
| RU | 45.146.165.91:8080 | tcp |
Files
memory/940-0-0x0000000000420000-0x00000000004DA000-memory.dmp
memory/940-1-0x0000000074410000-0x0000000074BC0000-memory.dmp
memory/940-2-0x0000000005510000-0x0000000005AB4000-memory.dmp
memory/940-3-0x0000000004EA0000-0x0000000004F32000-memory.dmp
memory/940-4-0x0000000005000000-0x0000000005010000-memory.dmp
memory/940-5-0x0000000004F70000-0x0000000004F7A000-memory.dmp
memory/940-6-0x0000000074410000-0x0000000074BC0000-memory.dmp
memory/940-7-0x0000000005000000-0x0000000005010000-memory.dmp
memory/940-8-0x00000000051C0000-0x0000000005236000-memory.dmp
memory/940-9-0x0000000005150000-0x000000000516E000-memory.dmp
memory/940-10-0x00000000054D0000-0x00000000054E6000-memory.dmp
memory/3316-11-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-12-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-14-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/940-15-0x0000000074410000-0x0000000074BC0000-memory.dmp
memory/3316-16-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-17-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-19-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-24-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-23-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-27-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-31-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-35-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-40-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-39-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-43-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-47-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-51-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-52-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-55-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-56-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-67-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-68-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-75-0x0000000000400000-0x00000000004E2000-memory.dmp
memory/3316-89-0x0000000000400000-0x00000000004E2000-memory.dmp