Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe
Resource
win10v2004-20240426-en
General
-
Target
5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe
-
Size
1.8MB
-
MD5
74cd4f517b8acbe4944edea47a1c9071
-
SHA1
3158bccfb035095c27936239c0d3091d4ad5189b
-
SHA256
5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09
-
SHA512
cfe4ecd98854d6af07e663be12e198d2d11e1635ca02905b36f13dc233ade3ca2ff2ca53c4c780a202e3131990a88acb76a1c6811d0409c6c9b407a7b1430786
-
SSDEEP
49152:CSCEi3mNv++cFSKpnmWvE6BkwCLV+Bhk:CS7Dv+6EnmWvEAkw4V+Bh
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
redline
1
185.215.113.67:40960
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0005000000018701-205.dat family_redline behavioral1/memory/2596-216-0x0000000000DA0000-0x0000000000DF2000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a9ed56e27.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e831575c4.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2920 powershell.exe 628 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a9ed56e27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e831575c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e831575c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a9ed56e27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Executes dropped EXE 19 IoCs
pid Process 2876 explortu.exe 2976 explortu.exe 1652 3a9ed56e27.exe 1504 9e831575c4.exe 2404 axplont.exe 888 buildjudit.exe 2260 stub.exe 2472 33333.exe 2596 fileosn.exe 1188 lumma1234.exe 2084 Newoff.exe 980 toolspub1.exe 1784 gold.exe 1612 FirstZ.exe 3048 swizzzz.exe 2052 Newoff.exe 480 Process not Found 2144 reakuqnanrkn.exe 2416 Newoff.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine 3a9ed56e27.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine 9e831575c4.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Wine axplont.exe -
Loads dropped DLL 36 IoCs
pid Process 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 2876 explortu.exe 2876 explortu.exe 2876 explortu.exe 2876 explortu.exe 1652 3a9ed56e27.exe 2404 axplont.exe 888 buildjudit.exe 2260 stub.exe 2404 axplont.exe 2404 axplont.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2404 axplont.exe 2404 axplont.exe 2404 axplont.exe 2264 WerFault.exe 2264 WerFault.exe 2264 WerFault.exe 2404 axplont.exe 2084 Newoff.exe 2084 Newoff.exe 2404 axplont.exe 2404 axplont.exe 1432 WerFault.exe 1432 WerFault.exe 1432 WerFault.exe 2084 Newoff.exe 2084 Newoff.exe 2404 axplont.exe 2404 axplont.exe 2392 WerFault.exe 2392 WerFault.exe 2392 WerFault.exe 480 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\9e831575c4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\9e831575c4.exe" explortu.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 pastebin.com 23 pastebin.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe FirstZ.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe reakuqnanrkn.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 2876 explortu.exe 2976 explortu.exe 1652 3a9ed56e27.exe 1504 9e831575c4.exe 2404 axplont.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2876 set thread context of 2976 2876 explortu.exe 29 PID 2144 set thread context of 1580 2144 reakuqnanrkn.exe 112 PID 2144 set thread context of 2772 2144 reakuqnanrkn.exe 114 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\axplont.job 3a9ed56e27.exe File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\Tasks\explortu.job 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2292 sc.exe 2224 sc.exe 2732 sc.exe 1644 sc.exe 2932 sc.exe 1112 sc.exe 2772 sc.exe 1516 sc.exe 1968 sc.exe 3064 sc.exe 1580 sc.exe 1028 sc.exe 1700 sc.exe 2544 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2644 2472 WerFault.exe 37 2264 1188 WerFault.exe 41 1432 1784 WerFault.exe 48 2392 3048 WerFault.exe 52 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2416 schtasks.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 00279dd7c1b1da01 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs explorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 fileosn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 fileosn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 2876 explortu.exe 2976 explortu.exe 1652 3a9ed56e27.exe 1504 9e831575c4.exe 2404 axplont.exe 1612 FirstZ.exe 2920 powershell.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 1612 FirstZ.exe 2144 reakuqnanrkn.exe 628 powershell.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2144 reakuqnanrkn.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe 2772 explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2920 powershell.exe Token: SeShutdownPrivilege 2204 powercfg.exe Token: SeShutdownPrivilege 2280 powercfg.exe Token: SeShutdownPrivilege 2476 powercfg.exe Token: SeShutdownPrivilege 3008 powercfg.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeShutdownPrivilege 1284 powercfg.exe Token: SeShutdownPrivilege 2460 powercfg.exe Token: SeShutdownPrivilege 2444 powercfg.exe Token: SeShutdownPrivilege 1608 powercfg.exe Token: SeLockMemoryPrivilege 2772 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 1652 3a9ed56e27.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2876 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 28 PID 2164 wrote to memory of 2876 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 28 PID 2164 wrote to memory of 2876 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 28 PID 2164 wrote to memory of 2876 2164 5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe 28 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 2976 2876 explortu.exe 29 PID 2876 wrote to memory of 1652 2876 explortu.exe 31 PID 2876 wrote to memory of 1652 2876 explortu.exe 31 PID 2876 wrote to memory of 1652 2876 explortu.exe 31 PID 2876 wrote to memory of 1652 2876 explortu.exe 31 PID 2876 wrote to memory of 1504 2876 explortu.exe 32 PID 2876 wrote to memory of 1504 2876 explortu.exe 32 PID 2876 wrote to memory of 1504 2876 explortu.exe 32 PID 2876 wrote to memory of 1504 2876 explortu.exe 32 PID 1652 wrote to memory of 2404 1652 3a9ed56e27.exe 33 PID 1652 wrote to memory of 2404 1652 3a9ed56e27.exe 33 PID 1652 wrote to memory of 2404 1652 3a9ed56e27.exe 33 PID 1652 wrote to memory of 2404 1652 3a9ed56e27.exe 33 PID 2404 wrote to memory of 888 2404 axplont.exe 35 PID 2404 wrote to memory of 888 2404 axplont.exe 35 PID 2404 wrote to memory of 888 2404 axplont.exe 35 PID 2404 wrote to memory of 888 2404 axplont.exe 35 PID 888 wrote to memory of 2260 888 buildjudit.exe 36 PID 888 wrote to memory of 2260 888 buildjudit.exe 36 PID 888 wrote to memory of 2260 888 buildjudit.exe 36 PID 2404 wrote to memory of 2472 2404 axplont.exe 37 PID 2404 wrote to memory of 2472 2404 axplont.exe 37 PID 2404 wrote to memory of 2472 2404 axplont.exe 37 PID 2404 wrote to memory of 2472 2404 axplont.exe 37 PID 2472 wrote to memory of 2644 2472 33333.exe 38 PID 2472 wrote to memory of 2644 2472 33333.exe 38 PID 2472 wrote to memory of 2644 2472 33333.exe 38 PID 2472 wrote to memory of 2644 2472 33333.exe 38 PID 2404 wrote to memory of 2596 2404 axplont.exe 39 PID 2404 wrote to memory of 2596 2404 axplont.exe 39 PID 2404 wrote to memory of 2596 2404 axplont.exe 39 PID 2404 wrote to memory of 2596 2404 axplont.exe 39 PID 2404 wrote to memory of 1188 2404 axplont.exe 41 PID 2404 wrote to memory of 1188 2404 axplont.exe 41 PID 2404 wrote to memory of 1188 2404 axplont.exe 41 PID 2404 wrote to memory of 1188 2404 axplont.exe 41 PID 1188 wrote to memory of 2264 1188 lumma1234.exe 43 PID 1188 wrote to memory of 2264 1188 lumma1234.exe 43 PID 1188 wrote to memory of 2264 1188 lumma1234.exe 43 PID 1188 wrote to memory of 2264 1188 lumma1234.exe 43 PID 2404 wrote to memory of 2084 2404 axplont.exe 44 PID 2404 wrote to memory of 2084 2404 axplont.exe 44 PID 2404 wrote to memory of 2084 2404 axplont.exe 44 PID 2404 wrote to memory of 2084 2404 axplont.exe 44 PID 2084 wrote to memory of 2416 2084 Newoff.exe 45 PID 2084 wrote to memory of 2416 2084 Newoff.exe 45 PID 2084 wrote to memory of 2416 2084 Newoff.exe 45 PID 2084 wrote to memory of 2416 2084 Newoff.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe"C:\Users\Admin\AppData\Local\Temp\5326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Users\Admin\1000004002\3a9ed56e27.exe"C:\Users\Admin\1000004002\3a9ed56e27.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\onefile_888_133614584659300000\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 726⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 686⤵
- Loads dropped DLL
- Program crash
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe" /F6⤵
- Creates scheduled task(s)
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe"6⤵
- Executes dropped EXE
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:1708
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵
- Drops file in Windows directory
PID:1436
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:1580
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:1028
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"7⤵
- Launches sc.exe
PID:1700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"7⤵
- Launches sc.exe
PID:2932
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:1516
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"7⤵
- Launches sc.exe
PID:2544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"5⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 726⤵
- Loads dropped DLL
- Program crash
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"5⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 966⤵
- Loads dropped DLL
- Program crash
PID:2392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\9e831575c4.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\9e831575c4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1962AE41-8BF0-4957-88FC-F3ADF4FC65C6} S-1-5-21-3691908287-3775019229-3534252667-1000:UOTHCPHQ\Admin:Interactive:[1]1⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exeC:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe2⤵
- Executes dropped EXE
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exeC:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe2⤵
- Executes dropped EXE
PID:2416
-
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2200
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1364
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2292
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2224
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1580
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5c165996ca2a03c5c04a1af3415011f3f
SHA1ed0d3c849cc0319fa5e595464988b1791f98ed73
SHA2562fba8eea1a026e381ab112213f6fe09173ea37b39e9e65bdbf2b5d995dfbfa8c
SHA5120035a59dec68f398edd338d819b79dea1ca5acf6d7658ac2b40b1340324d82c49cc88c75c88d81fa1352937ea4fded1277c741cf09abf70020190af92fc88a08
-
Filesize
10.7MB
MD5cc7933b503e061ddde7158e108f19cc3
SHA141b74dc86cc1c4dde7010d3f596aacccf00b3133
SHA256049f48024f31d86c5d8bf56c3da1d7be539c877ad189fb0c5aa9a228601d19eb
SHA51287892a6f3e41ea43157cf13cc6402044ce41fd3d7eb7e456fced894c88d33786a80fa626c1b58436eba94997490256d2675598ba2e54b52affa64f5491c880a2
-
Filesize
2.1MB
MD5208bd37e8ead92ed1b933239fb3c7079
SHA1941191eed14fce000cfedbae9acfcb8761eb3492
SHA256e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494
SHA512a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715
-
Filesize
2.3MB
MD57154f7f38c806cfdcf8a593a1a9d29da
SHA17594597c61090519126c598b29dc3d3c0886c3a9
SHA2563361fe4b6f365b1df2b53472e005ab365ad94be87888f659bdfda3af24dcdf12
SHA512b5acca76aa38024e54a8f78922c160d3c43e53924c26aab81a2627260104ccfedbaf301fcee385d59a15a1bfd3d05b3ac0d3016d8d8b178b23f34e8f2304c6e8
-
Filesize
304KB
MD584bf36993bdd61d216e83fe391fcc7fd
SHA1e023212e847a54328aaea05fbe41eb4828855ce6
SHA2568e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa
SHA512bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf
-
Filesize
518KB
MD5c4ffab152141150528716daa608d5b92
SHA1a48d3aecc0e986b6c4369b9d4cfffb08b53aed89
SHA256c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475
SHA512a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
1.2MB
MD50b7e08a8268a6d413a322ff62d389bf9
SHA1e04b849cc01779fe256744ad31562aca833a82c1
SHA256d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65
SHA5123d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4
-
Filesize
778KB
MD505b11e7b711b4aaa512029ffcb529b5a
SHA1a8074cf8a13f21617632951e008cdfdace73bb83
SHA2562aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa
SHA512dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff
-
Filesize
316KB
MD590639f893099ececc76450b1f65abd11
SHA15ae29b4bfdffa6982fd1a70461a46868cc108845
SHA25607440021c21067958af8808c382520d359ba8dd23a39a02892aa1e1cd0fdef1a
SHA51200c83a9bbbe792068f1ae1a9e48da263f492b031d1e73bd73c4d137fbc4497bdcfd562d08f02e31f3e6439840f62d4bab1723976f82c34b37f80bd0f939abc9b
-
Filesize
2.5MB
MD5ffada57f998ed6a72b6ba2f072d2690a
SHA16857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA5121de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
1.8MB
MD574cd4f517b8acbe4944edea47a1c9071
SHA13158bccfb035095c27936239c0d3091d4ad5189b
SHA2565326e0e7a15ab2e5392db6c221d9003146f13b0ff6aad6c2ef3725fdc8b44a09
SHA512cfe4ecd98854d6af07e663be12e198d2d11e1635ca02905b36f13dc233ade3ca2ff2ca53c4c780a202e3131990a88acb76a1c6811d0409c6c9b407a7b1430786
-
Filesize
17.9MB
MD55ad46542eebe9910891770d619d7c4fa
SHA138b3d062740d4a350c3329f4e5d7627e4a980ef3
SHA2566b0281ff5ec47dfabd801ecde7e55513e556ca6763a557bfb8f2c07b0e739bd5
SHA512426aa5a0453dc0ad2494d43fdfa7d6c35f19770026650db413234859c34e9a1371272942e96d8741594a47832c4fb4391c217911bc65c6434d621f01995d1e64