Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 07:03
Behavioral task
behavioral1
Sample
670d1014ec5713d005f8ddfefc495a9e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
670d1014ec5713d005f8ddfefc495a9e.exe
Resource
win10v2004-20240709-en
General
-
Target
670d1014ec5713d005f8ddfefc495a9e.exe
-
Size
47KB
-
MD5
670d1014ec5713d005f8ddfefc495a9e
-
SHA1
91362eaf33dc55e4d970fbefbda975be32628d6b
-
SHA256
70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd
-
SHA512
175827b48f35899e89fcbdacd2e98b378b92abc8e7a1c225441f57a46d02fea838104e3d6480a137f401c72e2d7979ff3db7a74d5c52e84a0733246f0fa5384f
-
SSDEEP
768:EuwpFTAY3IQWUe9jqmo2qLPzXR8myUdPIvfc2C0b2lnNPVPUXHyk/UQsS25BDZ8x:EuwpFTA4/2KRx0vfb9bgnTUXHmpS2nd+
Malware Config
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
PWhSiRkcxVoa
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
redline
diamotrix
176.111.174.140:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2388-159-0x00000000001E0000-0x0000000000232000-memory.dmp family_redline behavioral1/files/0x000500000001a4a4-157.dat family_redline -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-15.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts relog.exe -
Executes dropped EXE 7 IoCs
pid Process 2792 svchost.exe 1564 nbevmi.exe 2388 8C0A.tmp.uIZtAux.exe 2992 gipdyp.exe 2764 8F84.tmp.svchost.exe 2892 servisis.exe 1432 servisis.exe -
Loads dropped DLL 4 IoCs
pid Process 2708 cmd.exe 2632 powershell.exe 2632 powershell.exe 1748 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000700000001a498-164.dat upx behavioral1/memory/2992-169-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2764-177-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2764-179-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2992-182-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2892-190-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/2892-191-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/1432-205-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral1/memory/1432-206-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Mozilla = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Service_Mozilla.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_{65816AE947551497239002} = "C:\\Users\\Admin\\AppData\\Roaming\\{65816AE947551497239002}\\Service_{65816AE947551497239002}.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{65816AE947551497239002}\\{65816AE947551497239002}.exe" nbevmi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Adobe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Service_Adobe.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Identities = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Service_Identities.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Macromedia = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Service_Macromedia.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Media Center Programs = "C:\\Users\\Admin\\AppData\\Roaming\\Media Center Programs\\Service_Media Center Programs.exe" relog.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service_Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Service_Microsoft.exe" relog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 2632 powershell.exe 1748 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 2956 1564 nbevmi.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gipdyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8C0A.tmp.uIZtAux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servisis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8F84.tmp.svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servisis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 670d1014ec5713d005f8ddfefc495a9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2872 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe 2316 schtasks.exe 1584 schtasks.exe 2404 schtasks.exe 980 schtasks.exe 3064 schtasks.exe 2940 schtasks.exe 1476 schtasks.exe 1792 schtasks.exe 2840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 670d1014ec5713d005f8ddfefc495a9e.exe 2280 670d1014ec5713d005f8ddfefc495a9e.exe 2632 powershell.exe 2792 svchost.exe 2632 powershell.exe 2632 powershell.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 1184 Explorer.EXE 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe 2956 relog.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2280 670d1014ec5713d005f8ddfefc495a9e.exe Token: SeDebugPrivilege 2792 svchost.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeIncreaseQuotaPrivilege 1564 nbevmi.exe Token: SeSecurityPrivilege 1564 nbevmi.exe Token: SeTakeOwnershipPrivilege 1564 nbevmi.exe Token: SeLoadDriverPrivilege 1564 nbevmi.exe Token: SeSystemProfilePrivilege 1564 nbevmi.exe Token: SeSystemtimePrivilege 1564 nbevmi.exe Token: SeProfSingleProcessPrivilege 1564 nbevmi.exe Token: SeIncBasePriorityPrivilege 1564 nbevmi.exe Token: SeCreatePagefilePrivilege 1564 nbevmi.exe Token: SeBackupPrivilege 1564 nbevmi.exe Token: SeRestorePrivilege 1564 nbevmi.exe Token: SeShutdownPrivilege 1564 nbevmi.exe Token: SeDebugPrivilege 1564 nbevmi.exe Token: SeSystemEnvironmentPrivilege 1564 nbevmi.exe Token: SeRemoteShutdownPrivilege 1564 nbevmi.exe Token: SeUndockPrivilege 1564 nbevmi.exe Token: SeManageVolumePrivilege 1564 nbevmi.exe Token: 33 1564 nbevmi.exe Token: 34 1564 nbevmi.exe Token: 35 1564 nbevmi.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe Token: SeDebugPrivilege 2956 relog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1620 2280 670d1014ec5713d005f8ddfefc495a9e.exe 31 PID 2280 wrote to memory of 1620 2280 670d1014ec5713d005f8ddfefc495a9e.exe 31 PID 2280 wrote to memory of 1620 2280 670d1014ec5713d005f8ddfefc495a9e.exe 31 PID 2280 wrote to memory of 1620 2280 670d1014ec5713d005f8ddfefc495a9e.exe 31 PID 2280 wrote to memory of 2708 2280 670d1014ec5713d005f8ddfefc495a9e.exe 33 PID 2280 wrote to memory of 2708 2280 670d1014ec5713d005f8ddfefc495a9e.exe 33 PID 2280 wrote to memory of 2708 2280 670d1014ec5713d005f8ddfefc495a9e.exe 33 PID 2280 wrote to memory of 2708 2280 670d1014ec5713d005f8ddfefc495a9e.exe 33 PID 1620 wrote to memory of 2784 1620 cmd.exe 35 PID 1620 wrote to memory of 2784 1620 cmd.exe 35 PID 1620 wrote to memory of 2784 1620 cmd.exe 35 PID 1620 wrote to memory of 2784 1620 cmd.exe 35 PID 2708 wrote to memory of 2872 2708 cmd.exe 36 PID 2708 wrote to memory of 2872 2708 cmd.exe 36 PID 2708 wrote to memory of 2872 2708 cmd.exe 36 PID 2708 wrote to memory of 2872 2708 cmd.exe 36 PID 2708 wrote to memory of 2792 2708 cmd.exe 37 PID 2708 wrote to memory of 2792 2708 cmd.exe 37 PID 2708 wrote to memory of 2792 2708 cmd.exe 37 PID 2708 wrote to memory of 2792 2708 cmd.exe 37 PID 2792 wrote to memory of 1236 2792 svchost.exe 39 PID 2792 wrote to memory of 1236 2792 svchost.exe 39 PID 2792 wrote to memory of 1236 2792 svchost.exe 39 PID 2792 wrote to memory of 1236 2792 svchost.exe 39 PID 1236 wrote to memory of 2632 1236 cmd.exe 41 PID 1236 wrote to memory of 2632 1236 cmd.exe 41 PID 1236 wrote to memory of 2632 1236 cmd.exe 41 PID 1236 wrote to memory of 2632 1236 cmd.exe 41 PID 2632 wrote to memory of 1564 2632 powershell.exe 42 PID 2632 wrote to memory of 1564 2632 powershell.exe 42 PID 2632 wrote to memory of 1564 2632 powershell.exe 42 PID 2632 wrote to memory of 1564 2632 powershell.exe 42 PID 1564 wrote to memory of 2940 1564 nbevmi.exe 43 PID 1564 wrote to memory of 2940 1564 nbevmi.exe 43 PID 1564 wrote to memory of 2940 1564 nbevmi.exe 43 PID 1564 wrote to memory of 2956 1564 nbevmi.exe 45 PID 1564 wrote to memory of 2956 1564 nbevmi.exe 45 PID 1564 wrote to memory of 2956 1564 nbevmi.exe 45 PID 1564 wrote to memory of 2956 1564 nbevmi.exe 45 PID 2956 wrote to memory of 2316 2956 relog.exe 46 PID 2956 wrote to memory of 2316 2956 relog.exe 46 PID 2956 wrote to memory of 2316 2956 relog.exe 46 PID 2956 wrote to memory of 1476 2956 relog.exe 48 PID 2956 wrote to memory of 1476 2956 relog.exe 48 PID 2956 wrote to memory of 1476 2956 relog.exe 48 PID 2956 wrote to memory of 1584 2956 relog.exe 50 PID 2956 wrote to memory of 1584 2956 relog.exe 50 PID 2956 wrote to memory of 1584 2956 relog.exe 50 PID 2956 wrote to memory of 2404 2956 relog.exe 52 PID 2956 wrote to memory of 2404 2956 relog.exe 52 PID 2956 wrote to memory of 2404 2956 relog.exe 52 PID 2956 wrote to memory of 980 2956 relog.exe 54 PID 2956 wrote to memory of 980 2956 relog.exe 54 PID 2956 wrote to memory of 980 2956 relog.exe 54 PID 2956 wrote to memory of 1792 2956 relog.exe 56 PID 2956 wrote to memory of 1792 2956 relog.exe 56 PID 2956 wrote to memory of 1792 2956 relog.exe 56 PID 2956 wrote to memory of 3064 2956 relog.exe 59 PID 2956 wrote to memory of 3064 2956 relog.exe 59 PID 2956 wrote to memory of 3064 2956 relog.exe 59 PID 2956 wrote to memory of 1184 2956 relog.exe 21 PID 2956 wrote to memory of 1184 2956 relog.exe 21 PID 2792 wrote to memory of 2380 2792 svchost.exe 61 PID 2792 wrote to memory of 2380 2792 svchost.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\670d1014ec5713d005f8ddfefc495a9e.exe"C:\Users\Admin\AppData\Local\Temp\670d1014ec5713d005f8ddfefc495a9e.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp399.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2872
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\nbevmi.exe"' & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\nbevmi.exe"'6⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\nbevmi.exe"C:\Users\Admin\AppData\Local\Temp\nbevmi.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "SystemServicesTools" /tr "C:\Users\Admin\AppData\Roaming\{65816AE947551497239002}\{65816AE947551497239002}.exe" /sc onstart /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Windows\system32\relog.exeC:\Windows\system32\relog.exe8⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "OBuSfAoJg9" /tr "C:\Users\Admin\AppData\Roaming\Adobe\Service_Adobe.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2316
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RXW41U06Uz" /tr "C:\Users\Admin\AppData\Roaming\Identities\Service_Identities.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1476
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RXW41U06Uz" /tr "C:\Users\Admin\AppData\Roaming\Macromedia\Service_Macromedia.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1584
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RXW41U06Uz" /tr "C:\Users\Admin\AppData\Roaming\Media Center Programs\Service_Media Center Programs.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2404
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RXW41U06Uz" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Service_Microsoft.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:980
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "UueBOpDtop" /tr "C:\Users\Admin\AppData\Roaming\Mozilla\Service_Mozilla.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1792
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "UueBOpDtop" /tr "C:\Users\Admin\AppData\Roaming\{65816AE947551497239002}\Service_{65816AE947551497239002}.exe" /sc onstart /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:3064
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\gipdyp.exe"' & exit5⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\gipdyp.exe"'6⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\gipdyp.exe"C:\Users\Admin\AppData\Local\Temp\gipdyp.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /xml "C:\Users\Admin\AppData\Roaming\WinZIP_32\version.xml" /tn WPDR\Config_Error\Version /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8C0A.tmp.uIZtAux.exe"C:\Users\Admin\AppData\Local\Temp\8C0A.tmp.uIZtAux.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\8F84.tmp.svchost.exe"C:\Users\Admin\AppData\Local\Temp\8F84.tmp.svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {96CDD2B8-C5D2-413D-80A0-44024AC92417} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]1⤵PID:1636
-
C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exeC:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exeC:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD58d14c4ba7260c61ecde30d97fd3c124a
SHA1f60a7243a5160ff0dd60c37e1de43b81cead3549
SHA2566985ec7f67fabd26633c991be04ce5f899224a56bb078ba186b4be21f9e4714d
SHA512b068decea7ec68d2b4347493d9e4b8cc4fb0c3c5f5ecc2a52be6eb35d28e75d3de1636efe0b67cce825e8d08d3fb82d137b1d6eb1225662fb8c3dff9616dcc4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
321KB
MD56ddd28445b8fc2485cb72f22d1adc936
SHA1403c02d952120aafc6fb659a0ce0b99b1384442c
SHA256d73a9c06d72b25fc9cc1d3883ba52ba949c91297d20f8cff37481d9b442a7ef7
SHA5129abc68fab4c2a37f6cf07e2d1d7baccf26da411969b6dca4508776b9f57e3ed228dbc1a50e6dc4784791bdb86423d1f20c0f4d118c20d23951906a14ebd4682b
-
Filesize
322KB
MD561c5a8e414a47b8cc2c69e1ac4370a35
SHA1d6d66b31e7ebe3bd032a33fbe35fed2720fae964
SHA2564da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b
SHA512b1d732a280ea6f9e0eca5802016292e9c373a6e6d2c48404bbe00eb67a791427945ec3d1998ffdd8bda603adb9ee6c9312cf2976ed3567ab0a2c7f8494079c92
-
Filesize
150B
MD5b64ba8ae8b4a374aa1e23fc0c5a0bcb1
SHA1a6c4667bf488577bfb610ab94a489697393113c8
SHA256bfd9b4f57e80c558d88e81cf3aab6f518ce1070d1bbfa6cdf576f74fa61267c2
SHA5120312f2cb61e814889ced651c6589e7b03bf69931244cd11e8447aea0ee25bcc87d02cb1ba9b360c8f6360d9755fc324457443dd621f7547f0449f851c58561ed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD575abe523562b23a7d707c0345a7d5fa5
SHA17111287a22984b267ae4bb1bf5b1dab87cf5a4e1
SHA256c9d0f9ce18dffd345a161f4c6a3d263b783a3d7e672bc199357c2727061c4967
SHA51247b10405c76e0a6ff3e0eae4e1e0d5e8990053a020079d98ea3b8f79310ca7293fffab2d384a29f0f91febf750e2427ad5a9ece6603f442d6cab444c1fb78468
-
Filesize
1KB
MD52b29aa25ee90747f05e920706e4dfc4f
SHA12ec04aa0574178e5b5245362fdb5b1cfbf4ec637
SHA25693e469a8135addc4822f19a7afb7d02baea8242626188ce3e2b039862fc67511
SHA5122a3f6bda5c957eed82b5fdf39bb33d109c68e39a1e096c944bfe725f027757efa87bc44ea037f9baf47426d0335a12639ff67c626aec3fc1c5c430b2efbf44fb
-
Filesize
47KB
MD5670d1014ec5713d005f8ddfefc495a9e
SHA191362eaf33dc55e4d970fbefbda975be32628d6b
SHA25670c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd
SHA512175827b48f35899e89fcbdacd2e98b378b92abc8e7a1c225441f57a46d02fea838104e3d6480a137f401c72e2d7979ff3db7a74d5c52e84a0733246f0fa5384f
-
Filesize
1KB
MD5ee9d791fd900430e4d594e5bde5c096a
SHA125dd0ac5926d1d02bf4c9fe60d5aff6b602c9b7d
SHA25674c6900b084deaf2ac76ee2113cfe73509e751c588707395fa2731e9bc154ccd
SHA512cd1c18139594002e96c7094ff731812d9afb45fb34735731fb65eaecbd7918c2379fa52b8eea551ac9c51589827619f898a9a0ac95ee1ad8c0e94b589403efeb