Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe
Resource
win10v2004-20240709-en
General
-
Target
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe
-
Size
3.2MB
-
MD5
b49ab1057d8a84fcfab28e98cfbf7330
-
SHA1
b5740a5eeef81280e7b7c9556487d3d5e21725f0
-
SHA256
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4
-
SHA512
d2ba08fee9f409d9b994fa66ac2db1b28f87590ced2461bde6f776bb0289fc2dbdea1ff725bdfca12dd4caadfc15560b2dc5a5fb60578dbe517e60de7d2d6149
-
SSDEEP
98304:+9ckJgZJBx32c8a3TiHPBeZRuyO7AqY3UkWcT:+mRDiHPBeZBOc
Malware Config
Extracted
redline
MAD
185.189.14.66:4090
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1868 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1168 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1724 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 3824 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3068 3824 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Stealer.exe family_redline behavioral2/memory/4132-120-0x0000000000770000-0x000000000078E000-memory.dmp family_redline -
SectopRAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4192-7-0x0000000000400000-0x00000000009C1000-memory.dmp family_sectoprat C:\Users\Admin\AppData\Roaming\Stealer.exe family_sectoprat behavioral2/memory/4192-119-0x0000000000400000-0x00000000009C1000-memory.dmp family_sectoprat behavioral2/memory/4132-120-0x0000000000770000-0x000000000078E000-memory.dmp family_sectoprat -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RXwVhS.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fontreviewdriverRuntimeCrtwinSessionNet.execaad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exeRater.exeRXwVhS.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation fontreviewdriverRuntimeCrtwinSessionNet.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation Rater.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation RXwVhS.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 5 IoCs
Processes:
RXwVhS.exeStealer.exeRater.exefontreviewdriverRuntimeCrtwinSessionNet.exeexplorer.exepid process 2372 RXwVhS.exe 4132 Stealer.exe 4616 Rater.exe 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe 4912 explorer.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
fontreviewdriverRuntimeCrtwinSessionNet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\System32\\normaliz\\conhost.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\Microsoft.PowerShell.Operation.Validation\\explorer.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files (x86)\\Microsoft\\Temp\\taskhostw.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\System32\\html\\backgroundTaskHost.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Documents and Settings\\OfficeClickToRun.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\zipcontainer\\winlogon.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\System32\\mfc110jpn\\backgroundTaskHost.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\fontreviewdriverRuntimeCrt\\services.exe\"" fontreviewdriverRuntimeCrtwinSessionNet.exe -
Drops file in System32 directory 8 IoCs
Processes:
fontreviewdriverRuntimeCrtwinSessionNet.exedescription ioc process File created C:\Windows\System32\mfc110jpn\eddb19405b7ce1 fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\normaliz\conhost.exe fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\normaliz\088424020bedd6 fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\html\backgroundTaskHost.exe fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\html\eddb19405b7ce1 fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\zipcontainer\winlogon.exe fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\zipcontainer\cc11b995f2a76d fontreviewdriverRuntimeCrtwinSessionNet.exe File created C:\Windows\System32\mfc110jpn\backgroundTaskHost.exe fontreviewdriverRuntimeCrtwinSessionNet.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exepid process 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe -
Drops file in Program Files directory 64 IoCs
Processes:
RXwVhS.exefontreviewdriverRuntimeCrtwinSessionNet.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE RXwVhS.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe RXwVhS.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe RXwVhS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe RXwVhS.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\7a0fd90576e088 fontreviewdriverRuntimeCrtwinSessionNet.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe RXwVhS.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\chrome_pwa_launcher.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe RXwVhS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe RXwVhS.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe RXwVhS.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe RXwVhS.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe RXwVhS.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.106\chrome_installer.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE RXwVhS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe RXwVhS.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe RXwVhS.exe File opened for modification C:\Program Files\7-Zip\7zG.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe RXwVhS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe RXwVhS.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe RXwVhS.exe File opened for modification C:\Program Files\Windows Mail\wab.exe RXwVhS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe RXwVhS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exeRXwVhS.exeStealer.exeRater.exeWScript.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RXwVhS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
Processes:
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exeRater.exefontreviewdriverRuntimeCrtwinSessionNet.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings Rater.exe Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings fontreviewdriverRuntimeCrtwinSessionNet.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1868 schtasks.exe 1168 schtasks.exe 2864 schtasks.exe 3692 schtasks.exe 1724 schtasks.exe 2996 schtasks.exe 3068 schtasks.exe 2344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
fontreviewdriverRuntimeCrtwinSessionNet.exepid process 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Stealer.exefontreviewdriverRuntimeCrtwinSessionNet.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4132 Stealer.exe Token: SeDebugPrivilege 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe Token: SeDebugPrivilege 4912 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exepid process 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exeRater.exeRXwVhS.exeWScript.execmd.exefontreviewdriverRuntimeCrtwinSessionNet.execmd.exedescription pid process target process PID 4192 wrote to memory of 2372 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe RXwVhS.exe PID 4192 wrote to memory of 2372 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe RXwVhS.exe PID 4192 wrote to memory of 2372 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe RXwVhS.exe PID 4192 wrote to memory of 4132 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Stealer.exe PID 4192 wrote to memory of 4132 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Stealer.exe PID 4192 wrote to memory of 4132 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Stealer.exe PID 4192 wrote to memory of 4616 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Rater.exe PID 4192 wrote to memory of 4616 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Rater.exe PID 4192 wrote to memory of 4616 4192 caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe Rater.exe PID 4616 wrote to memory of 2472 4616 Rater.exe WScript.exe PID 4616 wrote to memory of 2472 4616 Rater.exe WScript.exe PID 4616 wrote to memory of 2472 4616 Rater.exe WScript.exe PID 2372 wrote to memory of 3880 2372 RXwVhS.exe cmd.exe PID 2372 wrote to memory of 3880 2372 RXwVhS.exe cmd.exe PID 2372 wrote to memory of 3880 2372 RXwVhS.exe cmd.exe PID 2472 wrote to memory of 4264 2472 WScript.exe cmd.exe PID 2472 wrote to memory of 4264 2472 WScript.exe cmd.exe PID 2472 wrote to memory of 4264 2472 WScript.exe cmd.exe PID 4264 wrote to memory of 1408 4264 cmd.exe fontreviewdriverRuntimeCrtwinSessionNet.exe PID 4264 wrote to memory of 1408 4264 cmd.exe fontreviewdriverRuntimeCrtwinSessionNet.exe PID 1408 wrote to memory of 4896 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe cmd.exe PID 1408 wrote to memory of 4896 1408 fontreviewdriverRuntimeCrtwinSessionNet.exe cmd.exe PID 4896 wrote to memory of 2908 4896 cmd.exe w32tm.exe PID 4896 wrote to memory of 2908 4896 cmd.exe w32tm.exe PID 4896 wrote to memory of 4912 4896 cmd.exe explorer.exe PID 4896 wrote to memory of 4912 4896 cmd.exe explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe"C:\Users\Admin\AppData\Local\Temp\caad395aeff17ecc47ae5b0989cc8c1338af1c6cd405af7af8cb3e9533be0ab4.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\RXwVhS.exeC:\Users\Admin\AppData\Local\Temp\RXwVhS.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\20875cc9.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Users\Admin\AppData\Roaming\Stealer.exe"C:\Users\Admin\AppData\Roaming\Stealer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4132 -
C:\Users\Admin\AppData\Roaming\Rater.exe"C:\Users\Admin\AppData\Roaming\Rater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\fontreviewdriverRuntimeCrt\aUIG46NqqfwTd5cOGgGlZ.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\fontreviewdriverRuntimeCrt\QZXIUNz.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\fontreviewdriverRuntimeCrt\fontreviewdriverRuntimeCrtwinSessionNet.exe"C:\fontreviewdriverRuntimeCrt\fontreviewdriverRuntimeCrtwinSessionNet.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RemFwb7QGw.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2908
-
C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\explorer.exe"C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\explorer.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Temp\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\html\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Documents and Settings\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\zipcontainer\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\mfc110jpn\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1724
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\fontreviewdriverRuntimeCrt\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\normaliz\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
187B
MD5f06acca3139790942eb03b44dd06d42b
SHA1d2ae6a940d7fe4a07f642d9c522b5e87f887510e
SHA256200e89ece4f8a7fa91055fd9f2b3a8defc791190fe279dc6296d490da8c3628f
SHA512e6edcad3dbcd61b795137f6487e4987480b82fd6ca7ebb18802373281b5621910631032b42ea7e0b9506bf0a5fa1f9cda554dfd19ea4ad6500197f217a43af1b
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3
-
Filesize
267B
MD56515e47d39a70cbcc1f52fe5325d3c84
SHA160eaf5a9f451bbe4a5939d14025a39aee9ae21a4
SHA256ae89eb7fd879cb38a00647c1cbc6854d30ef0bd0e26572f5a688bd3d63b0fe14
SHA512b4748e23766ca4be7e3cb6db55d656a5fe8d4da0b718d3f72f2d1ab5ee92ba17c43e125297d566b1a92e153b30e6c8006c3cd93dc776f43b6733b7c522754bf7
-
Filesize
1.5MB
MD5bcd17a8616855eb0c5a78f71fca10ba7
SHA1a5eca5659dee5e5349b437640500acd197d8079e
SHA2562fd0b5b2b36e993fb73c6788e7bd7a0e3d5576094c098cd7ae56fa0790668f3e
SHA51224e8521a5c757cbd06d6d3789fe04eea0ba7c97b70bc1ac0da7cc56350e1bc721f470544ff51865ae556c3dedfa662bb76c75fa03a22e467c1380fe7e4e3a834
-
Filesize
95KB
MD58cec900f08763b810c3e4133bc0dc834
SHA1c547853fc95d46b46bd16dcb8e9cc555eb9a20ab
SHA256abd30ac692e2bfb96036bdd9ed4b230418fe1e291c9cc57b2391992f38094592
SHA512e8dd2a87f46ac67daf8175f344006a0efd14b6e9f09d36deeb5738b5a41de0c6cd39db1f41a2c3812f6cae7b0e50df44c86f9fc25a373b02a92131f7e3183897
-
Filesize
75B
MD5a4a6baa7c5632664c21cba413b8be602
SHA193f5b688cdd19ea0d6f0435fe290db46064b3a84
SHA2569b67a341b4e4bd174717ddc01e03016ddf57d04e31f9468ba262e3325021b013
SHA5129dd387acb8efec40199434de03d31b92bfc3e0ece6712819c3ecebe9bcad18597164cb8c56f1b28be48d156ee5620ac984f49c9f0ec901b259aedb3068814192
-
Filesize
210B
MD5dffd872be659b76b5e8d2998f40338d8
SHA1194fa1edcdf6dc8b589a95deb35a8ceb9055036e
SHA256a49a72b1e8cc6b7ab9b30d564c757064b11184f10d305c7b5f6e66f558a32e0e
SHA51233b7979274be7be149ce210a0e65938ec9ce30d5b5bd09f80d80dc3c62d09b174644898ecb06c763f71ab5ab09e299bba05e9f25a4f1792b1503c04187dfd7a7
-
Filesize
1.2MB
MD5e86e6dcddab6bf719197f12c99247b19
SHA17c9ad558e0484a57f2e4f81a9f91a34ca9d3926c
SHA256eaafe8afd63c54fb58e983191998713a9417e74066a6aa89c08790ef9e824daa
SHA5122e702d46610d7dc6f35097b1337d631aeab1d674d5aa120b70be68c54d1a984d2094ae0fd535cbfa161573b6fa9795650f4da6d8584d5ceef971606ffb27e9da