Resubmissions
03-07-2024 19:58
240703-yp6tssxbqc 10Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-07-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win11-20240419-en
General
-
Target
Setup.exe
-
Size
12.5MB
-
MD5
3ba515e7df4c8918a967f4043cd8c72b
-
SHA1
3659a765f502297fb92a9d14b08e5b8d91bc8603
-
SHA256
5234a3b9c46390f23a13c401cd294dadc63944ed57a19b26ff4e7211442e0482
-
SHA512
010d639a231724425e791afccc7fabacd9b20269665706434c28eba6192af5b424a792755ff1503c0e0afcdd05c5b470d59f57f706f843157c42212e0bb40d8c
-
SSDEEP
393216:Y9XWBQ/bXZmSUGkVAqYwm9MlpcghwvWLT0Z:Y9GBmZkVAqYweMbIWfo
Malware Config
Extracted
redline
MergedALL
51.195.206.227:38719
Extracted
redline
telegramone
163.5.160.27:51523
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\mergedALL.exe family_redline C:\Users\Admin\AppData\Local\Temp\fix.exe family_redline behavioral4/memory/2904-66-0x0000000000050000-0x00000000000A0000-memory.dmp family_redline behavioral4/memory/2196-107-0x0000000000DE0000-0x0000000000DFE000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\fix.exe family_sectoprat behavioral4/memory/2196-107-0x0000000000DE0000-0x0000000000DFE000-memory.dmp family_sectoprat -
XMRig Miner payload 9 IoCs
Processes:
resource yara_rule behavioral4/memory/1056-269-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-273-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-274-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-272-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-271-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-275-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-268-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-284-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral4/memory/1056-285-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1684 powershell.exe 2284 powershell.exe 1716 powershell.exe 4084 powershell.exe 2668 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 10 IoCs
Processes:
hamburger.exeNotepad.exemergedALL.exeetc test.exefix.exeNotepad.exeNotepad.exeNotepad.exetubpxzvwmyfr.exeesfowblknspo.exepid process 4816 hamburger.exe 3176 Notepad.exe 2904 mergedALL.exe 2544 etc test.exe 2196 fix.exe 2300 Notepad.exe 2308 Notepad.exe 4700 Notepad.exe 2832 tubpxzvwmyfr.exe 2972 esfowblknspo.exe -
Loads dropped DLL 16 IoCs
Processes:
Notepad.exeNotepad.exepid process 2300 Notepad.exe 2300 Notepad.exe 2300 Notepad.exe 2300 Notepad.exe 2300 Notepad.exe 2300 Notepad.exe 2300 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe 4700 Notepad.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral4/memory/1056-267-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-269-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-273-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-274-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-272-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-271-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-263-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-266-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-275-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-265-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-268-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-264-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-284-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral4/memory/1056-285-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Notepad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\Update64 = "C:\\Users\\Admin\\Notepad.exe" Notepad.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
Processes:
hamburger.exeetc test.exepowershell.exetubpxzvwmyfr.exepowershell.exeesfowblknspo.exedescription ioc process File opened for modification C:\Windows\system32\MRT.exe hamburger.exe File opened for modification C:\Windows\system32\MRT.exe etc test.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe tubpxzvwmyfr.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\MRT.exe esfowblknspo.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tubpxzvwmyfr.exeesfowblknspo.exedescription pid process target process PID 2832 set thread context of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 set thread context of 1056 2832 tubpxzvwmyfr.exe conhost.exe PID 2972 set thread context of 1512 2972 esfowblknspo.exe conhost.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 224 sc.exe 3748 sc.exe 3932 sc.exe 1860 sc.exe 3816 sc.exe 4924 sc.exe 2908 sc.exe 4596 sc.exe -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Notepad.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1496 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exemergedALL.exehamburger.exepowershell.exetubpxzvwmyfr.exepowershell.exeetc test.exepowershell.exeesfowblknspo.exepowershell.execonhost.exepid process 1684 powershell.exe 1684 powershell.exe 2904 mergedALL.exe 2904 mergedALL.exe 2904 mergedALL.exe 2904 mergedALL.exe 2904 mergedALL.exe 4816 hamburger.exe 2284 powershell.exe 2284 powershell.exe 4816 hamburger.exe 4816 hamburger.exe 4816 hamburger.exe 4816 hamburger.exe 4816 hamburger.exe 2832 tubpxzvwmyfr.exe 1716 powershell.exe 1716 powershell.exe 2544 etc test.exe 4084 powershell.exe 4084 powershell.exe 2544 etc test.exe 2544 etc test.exe 2544 etc test.exe 2544 etc test.exe 2544 etc test.exe 2972 esfowblknspo.exe 2668 powershell.exe 2668 powershell.exe 2832 tubpxzvwmyfr.exe 2832 tubpxzvwmyfr.exe 2832 tubpxzvwmyfr.exe 2972 esfowblknspo.exe 2972 esfowblknspo.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe 1056 conhost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exefix.exetaskkill.exemergedALL.exepowershell.exepowershell.exepowershell.exepowershell.execonhost.exedescription pid process Token: SeDebugPrivilege 1684 powershell.exe Token: SeDebugPrivilege 2196 fix.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 2904 mergedALL.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeLockMemoryPrivilege 1056 conhost.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
Setup.exeNotepad.exeNotepad.execmd.exeNotepad.execmd.execmd.exetubpxzvwmyfr.execmd.exeesfowblknspo.execmd.exedescription pid process target process PID 3516 wrote to memory of 1684 3516 Setup.exe powershell.exe PID 3516 wrote to memory of 1684 3516 Setup.exe powershell.exe PID 3516 wrote to memory of 1684 3516 Setup.exe powershell.exe PID 3516 wrote to memory of 4816 3516 Setup.exe hamburger.exe PID 3516 wrote to memory of 4816 3516 Setup.exe hamburger.exe PID 3516 wrote to memory of 3176 3516 Setup.exe Notepad.exe PID 3516 wrote to memory of 3176 3516 Setup.exe Notepad.exe PID 3516 wrote to memory of 2904 3516 Setup.exe mergedALL.exe PID 3516 wrote to memory of 2904 3516 Setup.exe mergedALL.exe PID 3516 wrote to memory of 2904 3516 Setup.exe mergedALL.exe PID 3516 wrote to memory of 2544 3516 Setup.exe etc test.exe PID 3516 wrote to memory of 2544 3516 Setup.exe etc test.exe PID 3516 wrote to memory of 2196 3516 Setup.exe fix.exe PID 3516 wrote to memory of 2196 3516 Setup.exe fix.exe PID 3516 wrote to memory of 2196 3516 Setup.exe fix.exe PID 3176 wrote to memory of 2300 3176 Notepad.exe Notepad.exe PID 3176 wrote to memory of 2300 3176 Notepad.exe Notepad.exe PID 2300 wrote to memory of 780 2300 Notepad.exe cmd.exe PID 2300 wrote to memory of 780 2300 Notepad.exe cmd.exe PID 780 wrote to memory of 1496 780 cmd.exe taskkill.exe PID 780 wrote to memory of 1496 780 cmd.exe taskkill.exe PID 780 wrote to memory of 2308 780 cmd.exe Notepad.exe PID 780 wrote to memory of 2308 780 cmd.exe Notepad.exe PID 2308 wrote to memory of 4700 2308 Notepad.exe Notepad.exe PID 2308 wrote to memory of 4700 2308 Notepad.exe Notepad.exe PID 1576 wrote to memory of 1728 1576 cmd.exe wusa.exe PID 1576 wrote to memory of 1728 1576 cmd.exe wusa.exe PID 3516 wrote to memory of 2712 3516 cmd.exe wusa.exe PID 3516 wrote to memory of 2712 3516 cmd.exe wusa.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 484 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 1056 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 1056 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 1056 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 1056 2832 tubpxzvwmyfr.exe conhost.exe PID 2832 wrote to memory of 1056 2832 tubpxzvwmyfr.exe conhost.exe PID 2848 wrote to memory of 5108 2848 cmd.exe wusa.exe PID 2848 wrote to memory of 5108 2848 cmd.exe wusa.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 2972 wrote to memory of 1512 2972 esfowblknspo.exe conhost.exe PID 4532 wrote to memory of 4016 4532 cmd.exe wusa.exe PID 4532 wrote to memory of 4016 4532 cmd.exe wusa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAcQByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAYgBtACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAegBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAagBuACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\hamburger.exe"C:\Users\Admin\AppData\Local\Temp\hamburger.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4816 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1728
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "UPFRTHSI"3⤵
- Launches sc.exe
PID:3816 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "UPFRTHSI" binpath= "C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe" start= "auto"3⤵
- Launches sc.exe
PID:1860 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:3932 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "UPFRTHSI"3⤵
- Launches sc.exe
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\Notepad.exe"C:\Users\Admin\AppData\Local\Temp\Notepad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Notepad.exe"C:\Users\Admin\AppData\Local\Temp\Notepad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\activate.bat4⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\system32\taskkill.exetaskkill /f /im "Notepad.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Users\Admin\Notepad.exe"Notepad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\Notepad.exe"Notepad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\mergedALL.exe"C:\Users\Admin\AppData\Local\Temp\mergedALL.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\etc test.exe"C:\Users\Admin\AppData\Local\Temp\etc test.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2712
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBKZWAPS"3⤵
- Launches sc.exe
PID:224 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBKZWAPS" binpath= "C:\ProgramData\rstywrmdprzs\esfowblknspo.exe" start= "auto"3⤵
- Launches sc.exe
PID:4596 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4924 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBKZWAPS"3⤵
- Launches sc.exe
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\fix.exe"C:\Users\Admin\AppData\Local\Temp\fix.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exeC:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5108
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:484
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
C:\ProgramData\rstywrmdprzs\esfowblknspo.exeC:\ProgramData\rstywrmdprzs\esfowblknspo.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4016
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
18KB
MD5dba6d0734957784cf090efe66ad6d28e
SHA16ecab66765f00ad31099cee3767afa70786ec6c4
SHA25618769daa9f7cbfd08e1c9bd8794fc7b59a0880143869ad89a7a40a68c6dd9cbf
SHA512a2aff55ee15f207f8f4af3dc1b866567e4b26b6880f4c414a6f4982553abb141c7b1f491b448ce848ffa7e630049cd0b16a83a2f6d09ff5a21f6e64cea9d190e
-
Filesize
944B
MD56344564097353c8e7e68991fffa80d88
SHA12ac4d108a30ec3fbd2938b0563eb912415ea7c62
SHA256d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da
SHA512e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303
-
Filesize
7.0MB
MD5150f7378fd18d19ecc002761fa112de5
SHA1a5ef247183d14dcd0d9b112306c1965c38720a1e
SHA256b3bfd7d408a13096897fe8cbaff158cb8ff34f6d2d2269b25a1a268daeef387c
SHA512dd3739f3e7736c6d6319dbf71346addfdab60d668c84b91d9c87bdf5ee7c6ea085b49a314c52338cb196cceb212067fdbf804da91d9f517a34e1b0978ceebb6d
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD559d60a559c23202beb622021af29e8a9
SHA1a405f23916833f1b882f37bdbba2dd799f93ea32
SHA256706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e
SHA5122f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1
-
Filesize
122KB
MD52a834c3738742d45c0a06d40221cc588
SHA1606705a593631d6767467fb38f9300d7cd04ab3e
SHA256f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089
SHA512924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117
-
Filesize
246KB
MD5f930b7550574446a015bc602d59b0948
SHA14ee6ff8019c6c540525bdd2790fc76385cdd6186
SHA2563b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544
SHA51210b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee
-
Filesize
64KB
MD5b0262bd89a59a3699bfa75c4dcc3ee06
SHA1eb658849c646a26572dea7f6bfc042cb62fb49dc
SHA2564adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67
SHA5122e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1
-
Filesize
155KB
MD5b71dbe0f137ffbda6c3a89d5bcbf1017
SHA1a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f
SHA2566216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a
SHA5129a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358
-
Filesize
81KB
MD59c6283cc17f9d86106b706ec4ea77356
SHA1af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6
SHA2565cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027
SHA51211fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124
-
Filesize
35KB
MD5c1654ebebfeeda425eade8b77ca96de5
SHA1a4a150f1c810077b6e762f689c657227cc4fd257
SHA256aa1443a715fbf84a84f39bd89707271fc11a77b597d7324ce86fc5cfa56a63a9
SHA51221705b991e75efd5e59b8431a3b19ae5fcc38a3e7f137a9d52acd24e7f67d61758e48abc1c9c0d4314fa02010a1886c15ead5bca8dca1b1d4ccbfc3c589d342e
-
Filesize
1.3MB
MD5630153ac2b37b16b8c5b0dbb69a3b9d6
SHA1f901cd701fe081489b45d18157b4a15c83943d9d
SHA256ec4e6b8e9f6f1f4b525af72d3a6827807c7a81978cb03db5767028ebea283be2
SHA5127e3a434c8df80d32e66036d831cbd6661641c0898bd0838a07038b460261bf25b72a626def06d0faa692caf64412ca699b1fa7a848fe9d969756e097cba39e41
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
Filesize
29KB
MD58a273f518973801f3c63d92ad726ec03
SHA1069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f
SHA256af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca
SHA5127fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8
-
Filesize
1.1MB
MD504f35d7eec1f6b72bab9daf330fd0d6b
SHA1ecf0c25ba7adf7624109e2720f2b5930cd2dba65
SHA256be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab
SHA5123da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.5MB
MD5e4e8f85ee773cd79bd76dd7798baf957
SHA1112f53467d2946f2bcf4c55bb4177f25120cda13
SHA256a0a9aa62080c1a543e11e5853fcd6964e598b59a0a7c24de7a7f1d951177e564
SHA51299a1dd206181ef20c572a1a1ed9354cc2f70424a4493cd2e67648b54483f90e0bf291764e4731943c6ed73ab872b3fa8410c0368295d5a025330792a17f19dad
-
Filesize
95KB
MD51f327a277466f1bb04aa5cfcd279c0f7
SHA19bcb7bbac28992b9c7c35ba0573dce7db32ca18f
SHA256e8432406bc918c6ce0d245a3bc5bb8c021b218593f94b5d09ebcda7e549f1fc0
SHA51282c750475dc42d974c3fd33a4329bce7e99a5c15bf88fe4e802627b321b6c91f78e8be4b82e72380ee34c4de407878d17b18af26d7f5667104fdc55020f68a9d
-
Filesize
2.5MB
MD509af9e57d30e6929c115811dfa9c3b7e
SHA1caf9281f7001f92524005c60a34f33543315df52
SHA2563b031ddbb05570ca3ffefa93abbd1cb2891897a34ea9b4a29612858b66a146f2
SHA512023849985162db69160f559002586dbdb4148747f13fa1ff617e75b0f972c778f9f3d6a033dd3fb429d78aa3c20b264d83dc44274d6c0743a3ed1cf88fb045f8
-
Filesize
297KB
MD52359b2a186e08a38296305861dea4231
SHA141716e2710daaebba6f03d009064a149da90c526
SHA256f36f4c7bfb509bcfc5cdfb6eb28149bfca1b6ab3eb001bf74ef1e35f5edce9d6
SHA5126ebcb5f9c3b6d76c59221d1442d4c39cc7a1108ae7ef63f3173cff0fcb5356e622369d2925c0d1992aec3a2605641a69e44891c804d320cbe36e164705d19c54
-
Filesize
89B
MD5d58c7fcb7af4dba94dd8918ef29d5ec3
SHA19671c90d94b89d1845c3710d2d5435cdf08ba249
SHA25644d51facca088638f287e709658abaf3f96e0ae25c0c61c47a9af85e764a29b1
SHA5123294add7249a6c12ab192d5236060364f1e57c1d093b469530fe793403646e6dc2d5b9afe4032745019ba62902803cf91c8ce894b6795e4f7e5fe9d654790edb